Hi [[ session.user.profile.firstName ]]

Battling Unknown Malware With Machine Learning

Learn about the first signature-less engine to be integrated into VirusTotal

CrowdStrike recently made headlines by announcing that it is the first machine learning-based engine to be integrated into VirusTotal. VirusTotal is the premier nexus where all reputable AV vendors transparently publicize their detection results and share malware data for the greater good. The addition of CrowdStrike’s advanced machine learning engine to this anti-malware industry staple is a major leap forward for users who rely on VirusTotal capabilities to help defend their endpoints.

In this live CrowdCast, CrowdStrike’s Chief Scientist Dr. Sven Krasser offers an exclusive look “under the hood” of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe.

Topics will include:

•What CrowdStrike Falcon machine learning is and how it works
•How to interpret results of machine learning-based threat detection
•How users can benefit from the CrowdStrike Falcon machine learning engine
•How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform


Featured Speaker:

Dr. Sven Krasser
Chief Scientist, CrowdStrike

Dr. Sven Krasser is a recognized authority on network and host security. He currently serves as Chief Scientist for CrowdStrike, where he oversees the development of endhost and cloud-based Big Data technologies. Previously, Dr. Krasser was at McAfee where he led the data analysis and classification efforts for TrustedSource. He is the lead inventor of numerous key patented and patent-pending network and host security technologies and is the author of numerous publications on networking and security technologies.
Recorded Feb 13 2017 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Sven Krasser, Chief Scientist, CrowdStrike
Presentation preview: Battling Unknown Malware With Machine Learning

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Customer Case Study: Maersk Jun 25 2020 1:30 pm UTC 30 mins
    Andy Powell
    Andy Powell CISO of Maersk, the shipping giant involved in around 20% of the word trade will share his experiences in how to develop a resilient global cyber security organisation across the globe using effective technologies and how making informed cyber security decisions can help avoid a worst case scenario.
  • Customer Case Study: SIG Plc Jun 25 2020 12:45 pm UTC 30 mins
    Carl Baron
    Carl Baron CISO of SIG, a major international supplier of specialist construction products will talk about his experience working with CrowdStrike from initial implementation and deployment to his plans for future.
  • TalkTalk’s approach to maturing endpoint security Jun 25 2020 12:00 pm UTC 30 mins
    Colin Hardy
    Colin Hardy, Head of Instrusions and Investigations of Talk Talk, will share their approach to maturing endpoint security; choosing the right solution, embracing automation and keeping pace with an ever-advancing threat landscape.
  • Why we opted for CrowdStrike's Falcon Complete and wider benefits Jun 25 2020 11:15 am UTC 30 mins
    Simon Davies
    Simon Davies, Information Security & Governance Manager of Dialog, will experience their wider findings findings and benefits they have achieved from Crowdstrike's Falcon Complete.
  • E Crime from the Front Line Jun 25 2020 10:30 am UTC 30 mins
    Josh Burgess
    Whist cyber incidents and compromises are now regularly making headline news, organizations are behind the curve more often than not! They typically are only responding and not predicting the next attack. If the attacker is always ahead of the target then how can you ever be in a winning position?

    Employing research and intelligence resources to better understand who the attacker is and how they operate will allow organizations to better understand their risk. The goal of this session is to understand the importance of knowing not just the specific attack but a larger perspective on the attacker performing it and the relativity to your own organization.
  • Top of Mind - How to mitigate risk and sell security to your board Jun 25 2020 9:45 am UTC 30 mins
    Freddy Dezeure
    Join renowned Cybersecurity expert Freddy Dezeure as he discusses the three key things to put to the top of your mind when figuring out how to mitigate your cyber risk and provide assurance to your Board. Freddy will also consider questions such as “how has your environment changed and what does it mean to you?” as well as providing insightful and inspiring advice from the trenches.
  • The state of cyber: Insights and perspectives from the CTO office Jun 25 2020 9:00 am UTC 30 mins
    Michael Sentonas
    The Cybersecurity landscape is ever evolving, but one thing remains constant: Cyber adversaries continue to be relentless and innovative in their attempts to find gaps in your organisations security and leverage them for their own gain. Join CrowdStrike’s CTO Michael Sentonas for the opening keynote of the CrowdStrike Forum as he guides us through the most recent trends and observations seen in cyber threat activity. Michael will share best practices for protecting sensitive information from global criminal groups and nation-states along with examples of successful cybersecurity strategies that are enabling organisations to gain the upper hand against adversaries.
  • Security Operation and Architecture Jun 25 2020 7:45 am UTC 75 mins
    Scott Jarkoff, Lead, Strategic Threat Advisory Group, CrowdStrike Asia Pacific & Japan Valerian Rossigneux, Sale Engineering
    This session will discuss how to effectively differentiate appropriate next-generation solutions to solve these pain points and provide proactive risk mitigation techniques in responding to a massive, destructive campaign.

    Part 1: Assaulting Asia: How eCrime and Nation State Threat Adversaries are Attacking Asia

    Part 2: Light at the End of the Threat Adversary Activity Tunnel

    Part 3: Falcon In Action
  • Unifying A Security Cloud Ecosystem Jun 25 2020 7:45 am UTC 60 mins
    Punit Minocha, Melvin Tan, Karunanand Menon
    In this session, you will experience CrowdStrike trusted partner applications–Zscaler, Netskope and Okta, bringing their technologies to Falcon users to optimize their security stack, and provides real-time access to rich endpoint telemetry.
  • SIMPLIFYING SECURITY Jun 25 2020 6:00 am UTC 105 mins
    Amol Kulkarni, Jagdish Mahapatra, Sherif El-Nabawi, George Do, Anton Reynaldo Medina Bonifacio, Sanjay Kotha & Sheetal Mehta
    In this session, we will be joined by CrowdStrike Global and Regional Executives as well as a group of renowned CISOs, giving insights in various security aspects.
  • L'évolution du ransomware Jun 23 2020 1:00 pm UTC 60 mins
    Christophe Viaud, Sales Engineer, Crowdstrike
    Les grandes entreprises sont plus à risque d'être visées par des demandes de rançons très élevées.
    En ces temps difficiles, les cybercriminels intensifient leurs attaques par ransomware dans l'espoir de profiter des entreprises au moment où elles sont le plus vulnérables. Ainsi, ils s'en prennent non seulement aux réseaux d'entreprise mais également à vos systèmes domestiques.Comme les pirates innovent sans cesse et à un rythme toujours plus rapide, il est clair que les tactiques des ransomwares déployées dans le cadre des campagnes menées par les cybercriminels et autres cyberpirates à la solde d'États-nations se font plus sophistiquées.
    Celui-ci aborde les sujets suivants:

    - L'évolution de la stratégie des ransomwares, auparavant déployés «au petit bonheur la chance», vers des attaques ciblées visant à obtenir des gains financiers plus importants
    - Les tactiques, techniques et procédures utilisées par les cybercriminels actuels et leur sophistication croissante
    - Le perfectionnement des attaques par ransomware,au-delà des simples e-mails de phishing et fenêtres pop-up de sites web
    - Les mesures à prendre pour bloquer la progression d'une attaque par ransomware
  • Did someone say “Sophisticated and large scale cyber attack?” Jun 9 2020 1:00 pm UTC 30 mins
    Zeki Turedi
    2019, was once again a year in which cyber breaches were frequently reported within the UK media, most notably with catchphrases such as 'sophisticated', 'nation-state' and large-scale'. This webinar will expose the reality of today's threats from targeted attacks to the cybercriminal, as well as allow attendees to understand the current threat landscape, predictions for the future but also helpful recommendations everyone can use to make their IT environments secure against the adversary.

    - Understand the largest shifts in cyber activity in the last 12 months.
    - Delve into what are the most notable threats to organisations for 2020.
    - Recommendations which any organisation can use to better their security posture
  • The ever evolving Security Platform – Am I ready for tomorrow’s threat? Recorded: Jun 2 2020 30 mins
    Zeki Turedi
    In the last 24 months, the security industry has seen a great deal of consolidation, disappearance and evolution. In a world where threats are changing by the day, how can you make sure you stay relevant and prepared? Join Zeki Turedi as he guides us through understanding the evolution of the security platform and examines what a security platform requires today, to deal with the modern cyber-attacks of tomorrow.

    - Understand the true meaning behind the cyber buzz words.
    - Look deeper into what new technologies can advance cyber detection and protection
    - Have a better understanding on what is needed to protect your network from today’s and future threats
  • COVID-19 THREAT INTELLIGENCE BRIEFING Recorded: May 7 2020 55 mins
    Adam Meyers: Vice President of Intelligence
    An Update on the COVID-19 Threat Landscape.

    As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

    In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

    Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

    Attend this webcast to learn:

    - How threat actors are exploiting COVID-19 — their motivation and intent
    - The latest tactics, techniques and procedures adversaries are using to reach their objectives
    - The sectors and geographical regions being targeted by COVID-19 exploits
    - Steps you can take to proactively address these emerging threats
  • COVID-19 THREAT INTELLIGENCE BRIEFING Recorded: May 7 2020 55 mins
    Adam Meyers: Vice President of Intelligence
    An Update on the COVID-19 Threat Landscape.

    As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

    In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

    Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

    Attend this webcast to learn:

    - How threat actors are exploiting COVID-19 — their motivation and intent
    - The latest tactics, techniques and procedures adversaries are using to reach their objectives
    - The sectors and geographical regions being targeted by COVID-19 exploits
    - Steps you can take to proactively address these emerging threats
  • COVID-19 THREAT INTELLIGENCE BRIEFING Recorded: May 7 2020 55 mins
    Adam Meyers: Vice President of Intelligence
    An Update on the COVID-19 Threat Landscape.

    As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

    In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

    Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

    Attend this webcast to learn:

    - How threat actors are exploiting COVID-19 — their motivation and intent
    - The latest tactics, techniques and procedures adversaries are using to reach their objectives
    - The sectors and geographical regions being targeted by COVID-19 exploits
    - Steps you can take to proactively address these emerging threats
  • Cybersecurity in the Time of COVID-19: Keys to Securing a Remote Workforce Recorded: Apr 30 2020 56 mins
    Adam Meyers: Senior Vice President of Intelligence, Mike Sentonas: Chief Technology Officer
    As the world works to prevent the spread of the COVID-19 virus, more and more companies are recommending remote work for employees. However, rapidly transitioning large groups of employees to a remote workforce model comes with several significant challenges to IT teams, the network, architectures and even suppliers. At the same time, cyber adversaries are not taking a holiday, and are displaying new tactics and techniques designed to exploit this growing wave of confusion and chaos.

    Join CrowdStrike experts for this important webcast: Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce. CrowdStrike cybersecurity experts are uniquely qualified to help organizations make this transition smoothly. First, the cloud-native CrowdStrike Falcon® platform and lightweight agent are ideally suited to supporting and securing remote workers. Second, since the beginning of the company, CrowdStrike has supported its own broad and widely dispersed workforce, giving us a deep institutional knowledge of how to do this securely and effectively.

    During this webcast, CrowdStrike experts will examine the keys to supporting and securing a remote workforce and offer tips on how to streamline your transition during this difficult time. The CrowdStrike Intelligence team will provide insights into how threat actors are taking advantage of the COVID-19 crisis to infiltrate organizations and achieve their nefarious objectives. You will also hear about some special, limited-time programs that CrowdStrike is initiating to help customers stay secure and agile as they make the transition to supporting remote workers.
  • Cybersecurity in the Time of COVID-19: Keys to Securing a Remote Workforce Recorded: Apr 30 2020 56 mins
    Adam Meyers: Senior Vice President of Intelligence, Mike Sentonas: Chief Technology Officer
    As the world works to prevent the spread of the COVID-19 virus, more and more companies are recommending remote work for employees. However, rapidly transitioning large groups of employees to a remote workforce model comes with several significant challenges to IT teams, the network, architectures and even suppliers. At the same time, cyber adversaries are not taking a holiday, and are displaying new tactics and techniques designed to exploit this growing wave of confusion and chaos.

    Join CrowdStrike experts for this important webcast: Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce. CrowdStrike cybersecurity experts are uniquely qualified to help organizations make this transition smoothly. First, the cloud-native CrowdStrike Falcon® platform and lightweight agent are ideally suited to supporting and securing remote workers. Second, since the beginning of the company, CrowdStrike has supported its own broad and widely dispersed workforce, giving us a deep institutional knowledge of how to do this securely and effectively.

    During this webcast, CrowdStrike experts will examine the keys to supporting and securing a remote workforce and offer tips on how to streamline your transition during this difficult time. The CrowdStrike Intelligence team will provide insights into how threat actors are taking advantage of the COVID-19 crisis to infiltrate organizations and achieve their nefarious objectives. You will also hear about some special, limited-time programs that CrowdStrike is initiating to help customers stay secure and agile as they make the transition to supporting remote workers.
  • Making 60-minute Remediation a Reality Recorded: Aug 1 2019 54 mins
    Austin Murphy: Vice President of Managed Services - CrowdStrike, Con Mallon: Senior Product Director - CrowdStrike
    How to leverage technology + expertise to respond within the "breakout time" window.

    Speed is an imperative in cybersecurity and it is one of the themes in the CrowdStrike® 2019 Global Threat Report, which highlights the critical importance of speed in staying ahead of today’s rapidly evolving threats. One of the focuses of this year’s report is “breakout time” — the window of time from when an adversary first compromises an endpoint machine to when they begin moving laterally throughout your network to reach their objective. For some adversaries, it only takes an average of 18 minutes. This begs an important question — are you and your organization able to respond at the same pace as the attacker?

    To help organizations be better prepared for today’s sophisticated adversaries, CrowdStrike has established the "1-10-60 rule” as a benchmark for the average speed needed to defeat the adversary and stop the breach: 1 minute to detect, 10 to investigate and 60 minutes to remediate.

    In this webcast, CrowdStrike VP of Managed Services Austin Murphy will discuss the 1-10-60 rule and explain why these key outcome-driven metrics are critical to your organization’s security readiness. He will also show you how CrowdStrike Falcon® Complete™ can instantly transform your security and ensure you can meet the 1-10-60 rule.

    Join this webcast to learn:

    - Why speed of detection, investigation and remediation are key factors for successful day-to-day security management
    - The important steps needed to improve your organization’s ability to rapidly detect, investigate and remediate threats
    - How Falcon Complete can fast-track your organization to a 1-10-60 rule posture and elevate your cybersecurity maturity to the highest possible level, regardless of your internal resources
  • 2019 Global Threat Report: Adversary Tradecraft and The Importance of Speed Recorded: Jul 29 2019 65 mins
    Adam Meyers: Vice President of Intelligence. Jennifer Ayers: Vice President of OverWatch and Security Response
    The 2019 CrowdStrike® Global Threat Report offers one the industry’s most comprehensive reports on today’s top cyber threats. The report combines CrowdStrike’s comprehensive global observations with real-world case studies. delivering deep insights on modern adversaries, and their tactics, techniques, and procedures (TTPs).

    Join us for a webcast featuring CrowdStrike VP of Intelligence Adam Meyers and VP of Falcon OverWatch™ Jennifer Ayers as they explore the global trends and observations revealed in the report. They will also offer actionable recommendations you can use to ensure your organization is ready to anticipate and defend against the most dangerous threats of tomorrow.

    Join this webcast to learn:

    - The most favored TTPs observed throughout 2018 as seen through the lense of MITRE ATT&CK™framework

    - Updates on global “breakout” time statistics, including observations on which adversaries showed the fastest tradecraft in 2018

    - How nation-state adversaries continue to target dissidents, regional adversaries and foreign powers to collect intelligence for decision-makers

    - How cybercriminals combine advanced, targeted attack techniques with ransomware to achieve massive financial payoffs via “Big Game Hunting”

    - How the eCrime ecosystem continues to evolve and mature, showing increased collaborations between highly sophisticated criminal actors
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Battling Unknown Malware With Machine Learning
  • Live at: Feb 13 2017 10:00 pm
  • Presented by: Dr. Sven Krasser, Chief Scientist, CrowdStrike
  • From:
Your email has been sent.
or close