Hi [[ session.user.profile.firstName ]]

How to make 60-minute Remediation a Reality

Speed is an imperative in cybersecurity and it is one of the themes in the CrowdStrike® 2019 Global Threat Report, which highlights the critical importance of speed in staying ahead of today’s rapidly evolving threats. One of the focuses of this year’s report is “breakout time” — the window of time from when an adversary first compromises an endpoint machine to when they begin moving laterally throughout your network to reach their objective. For some adversaries, it only takes an average of 18 minutes. This begs an important question — are you and your organization able to respond at the same pace as the attacker?

To help organizations be better prepared for today’s sophisticated adversaries, CrowdStrike has established the "1-10-60 rule” as a benchmark for the average speed needed to defeat the adversary and stop the breach: 1 minute to detect, 10 to investigate and 60 minutes to remediate.

In this webcast, CrowdStrike VP of Managed Services Austin Murphy will discuss the 1-10-60 rule and explain why these key outcome-driven metrics are critical to your organization’s security readiness. He will also show you how CrowdStrike Falcon® Complete™ can instantly transform your security and ensure you can meet the 1-10-60 rule.

Join this webcast to learn:

- Why speed of detection, investigation and remediation are key factors for successful day-to-day security management

- The important steps needed to improve your organization’s ability to rapidly detect, investigate and remediate threats

- How Falcon Complete can fast-track your organization to a 1-10-60 rule posture and elevate your cybersecurity maturity to the highest possible level, regardless of your internal resources
Recorded Apr 17 2019 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Austin Murphy: Vice President of Managed Services - CrowdStrike, Con Mallon: Senior Product Director - CrowdStrike
Presentation preview: How to make 60-minute Remediation a Reality

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security Operation and Architecture Jun 25 2020 7:45 am UTC 75 mins
    Scott Jarkoff, Lead, Strategic Threat Advisory Group, CrowdStrike Asia Pacific & Japan Valerian Rossigneux, Sale Engineering
    This session will discuss how to effectively differentiate appropriate next-generation solutions to solve these pain points and provide proactive risk mitigation techniques in responding to a massive, destructive campaign.

    Part 1: Assaulting Asia: How eCrime and Nation State Threat Adversaries are Attacking Asia

    Part 2: Light at the End of the Threat Adversary Activity Tunnel

    Part 3: Falcon In Action
  • Unifying A Security Cloud Ecosystem Jun 25 2020 7:45 am UTC 60 mins
    Punit Minocha, Melvin Tan, Karunanand Menon
    In this session, you will experience CrowdStrike trusted partner applications–Zscaler, Netskope and Okta, bringing their technologies to Falcon users to optimize their security stack, and provides real-time access to rich endpoint telemetry.
  • SIMPLIFYING SECURITY Jun 25 2020 6:00 am UTC 105 mins
    Amol Kulkarni, Jagdish Mahapatra, Sherif El-Nabawi, George Do, Anton Reynaldo Medina Bonifacio, Sanjay Kotha & Sheetal Mehta
    In this session, we will be joined by CrowdStrike Global and Regional Executives as well as a group of renowned CISOs, giving insights in various security aspects.
  • Did someone say “Sophisticated and large scale cyber attack?” Jun 9 2020 1:00 pm UTC 30 mins
    Zeki Turedi
    2019, was once again a year in which cyber breaches were frequently reported within the UK media, most notably with catchphrases such as 'sophisticated', 'nation-state' and large-scale'. This webinar will expose the reality of today's threats from targeted attacks to the cybercriminal, as well as allow attendees to understand the current threat landscape, predictions for the future but also helpful recommendations everyone can use to make their IT environments secure against the adversary.

    - Understand the largest shifts in cyber activity in the last 12 months.
    - Delve into what are the most notable threats to organisations for 2020.
    - Recommendations which any organisation can use to better their security posture
  • The ever evolving Security Platform – Am I ready for tomorrow’s threat? Jun 2 2020 1:00 pm UTC 30 mins
    Zeki Turedi
    In the last 24 months, the security industry has seen a great deal of consolidation, disappearance and evolution. In a world where threats are changing by the day, how can you make sure you stay relevant and prepared? Join Zeki Turedi as he guides us through understanding the evolution of the security platform and examines what a security platform requires today, to deal with the modern cyber-attacks of tomorrow.

    - Understand the true meaning behind the cyber buzz words.
    - Look deeper into what new technologies can advance cyber detection and protection
    - Have a better understanding on what is needed to protect your network from today’s and future threats
  • COVID-19 THREAT INTELLIGENCE BRIEFING Recorded: May 7 2020 55 mins
    Adam Meyers: Vice President of Intelligence
    An Update on the COVID-19 Threat Landscape.

    As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

    In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

    Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

    Attend this webcast to learn:

    - How threat actors are exploiting COVID-19 — their motivation and intent
    - The latest tactics, techniques and procedures adversaries are using to reach their objectives
    - The sectors and geographical regions being targeted by COVID-19 exploits
    - Steps you can take to proactively address these emerging threats
  • COVID-19 THREAT INTELLIGENCE BRIEFING Recorded: May 7 2020 55 mins
    Adam Meyers: Vice President of Intelligence
    An Update on the COVID-19 Threat Landscape.

    As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

    In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

    Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

    Attend this webcast to learn:

    - How threat actors are exploiting COVID-19 — their motivation and intent
    - The latest tactics, techniques and procedures adversaries are using to reach their objectives
    - The sectors and geographical regions being targeted by COVID-19 exploits
    - Steps you can take to proactively address these emerging threats
  • COVID-19 THREAT INTELLIGENCE BRIEFING Recorded: May 7 2020 55 mins
    Adam Meyers: Vice President of Intelligence
    An Update on the COVID-19 Threat Landscape.

    As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

    In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

    Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

    Attend this webcast to learn:

    - How threat actors are exploiting COVID-19 — their motivation and intent
    - The latest tactics, techniques and procedures adversaries are using to reach their objectives
    - The sectors and geographical regions being targeted by COVID-19 exploits
    - Steps you can take to proactively address these emerging threats
  • Cybersecurity in the Time of COVID-19: Keys to Securing a Remote Workforce Recorded: Apr 30 2020 56 mins
    Adam Meyers: Senior Vice President of Intelligence, Mike Sentonas: Chief Technology Officer
    As the world works to prevent the spread of the COVID-19 virus, more and more companies are recommending remote work for employees. However, rapidly transitioning large groups of employees to a remote workforce model comes with several significant challenges to IT teams, the network, architectures and even suppliers. At the same time, cyber adversaries are not taking a holiday, and are displaying new tactics and techniques designed to exploit this growing wave of confusion and chaos.

    Join CrowdStrike experts for this important webcast: Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce. CrowdStrike cybersecurity experts are uniquely qualified to help organizations make this transition smoothly. First, the cloud-native CrowdStrike Falcon® platform and lightweight agent are ideally suited to supporting and securing remote workers. Second, since the beginning of the company, CrowdStrike has supported its own broad and widely dispersed workforce, giving us a deep institutional knowledge of how to do this securely and effectively.

    During this webcast, CrowdStrike experts will examine the keys to supporting and securing a remote workforce and offer tips on how to streamline your transition during this difficult time. The CrowdStrike Intelligence team will provide insights into how threat actors are taking advantage of the COVID-19 crisis to infiltrate organizations and achieve their nefarious objectives. You will also hear about some special, limited-time programs that CrowdStrike is initiating to help customers stay secure and agile as they make the transition to supporting remote workers.
  • Cybersecurity in the Time of COVID-19: Keys to Securing a Remote Workforce Recorded: Apr 30 2020 56 mins
    Adam Meyers: Senior Vice President of Intelligence, Mike Sentonas: Chief Technology Officer
    As the world works to prevent the spread of the COVID-19 virus, more and more companies are recommending remote work for employees. However, rapidly transitioning large groups of employees to a remote workforce model comes with several significant challenges to IT teams, the network, architectures and even suppliers. At the same time, cyber adversaries are not taking a holiday, and are displaying new tactics and techniques designed to exploit this growing wave of confusion and chaos.

    Join CrowdStrike experts for this important webcast: Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce. CrowdStrike cybersecurity experts are uniquely qualified to help organizations make this transition smoothly. First, the cloud-native CrowdStrike Falcon® platform and lightweight agent are ideally suited to supporting and securing remote workers. Second, since the beginning of the company, CrowdStrike has supported its own broad and widely dispersed workforce, giving us a deep institutional knowledge of how to do this securely and effectively.

    During this webcast, CrowdStrike experts will examine the keys to supporting and securing a remote workforce and offer tips on how to streamline your transition during this difficult time. The CrowdStrike Intelligence team will provide insights into how threat actors are taking advantage of the COVID-19 crisis to infiltrate organizations and achieve their nefarious objectives. You will also hear about some special, limited-time programs that CrowdStrike is initiating to help customers stay secure and agile as they make the transition to supporting remote workers.
  • Making 60-minute Remediation a Reality Recorded: Aug 1 2019 54 mins
    Austin Murphy: Vice President of Managed Services - CrowdStrike, Con Mallon: Senior Product Director - CrowdStrike
    How to leverage technology + expertise to respond within the "breakout time" window.

    Speed is an imperative in cybersecurity and it is one of the themes in the CrowdStrike® 2019 Global Threat Report, which highlights the critical importance of speed in staying ahead of today’s rapidly evolving threats. One of the focuses of this year’s report is “breakout time” — the window of time from when an adversary first compromises an endpoint machine to when they begin moving laterally throughout your network to reach their objective. For some adversaries, it only takes an average of 18 minutes. This begs an important question — are you and your organization able to respond at the same pace as the attacker?

    To help organizations be better prepared for today’s sophisticated adversaries, CrowdStrike has established the "1-10-60 rule” as a benchmark for the average speed needed to defeat the adversary and stop the breach: 1 minute to detect, 10 to investigate and 60 minutes to remediate.

    In this webcast, CrowdStrike VP of Managed Services Austin Murphy will discuss the 1-10-60 rule and explain why these key outcome-driven metrics are critical to your organization’s security readiness. He will also show you how CrowdStrike Falcon® Complete™ can instantly transform your security and ensure you can meet the 1-10-60 rule.

    Join this webcast to learn:

    - Why speed of detection, investigation and remediation are key factors for successful day-to-day security management
    - The important steps needed to improve your organization’s ability to rapidly detect, investigate and remediate threats
    - How Falcon Complete can fast-track your organization to a 1-10-60 rule posture and elevate your cybersecurity maturity to the highest possible level, regardless of your internal resources
  • 2019 Global Threat Report: Adversary Tradecraft and The Importance of Speed Recorded: Jul 29 2019 65 mins
    Adam Meyers: Vice President of Intelligence. Jennifer Ayers: Vice President of OverWatch and Security Response
    The 2019 CrowdStrike® Global Threat Report offers one the industry’s most comprehensive reports on today’s top cyber threats. The report combines CrowdStrike’s comprehensive global observations with real-world case studies. delivering deep insights on modern adversaries, and their tactics, techniques, and procedures (TTPs).

    Join us for a webcast featuring CrowdStrike VP of Intelligence Adam Meyers and VP of Falcon OverWatch™ Jennifer Ayers as they explore the global trends and observations revealed in the report. They will also offer actionable recommendations you can use to ensure your organization is ready to anticipate and defend against the most dangerous threats of tomorrow.

    Join this webcast to learn:

    - The most favored TTPs observed throughout 2018 as seen through the lense of MITRE ATT&CK™framework

    - Updates on global “breakout” time statistics, including observations on which adversaries showed the fastest tradecraft in 2018

    - How nation-state adversaries continue to target dissidents, regional adversaries and foreign powers to collect intelligence for decision-makers

    - How cybercriminals combine advanced, targeted attack techniques with ransomware to achieve massive financial payoffs via “Big Game Hunting”

    - How the eCrime ecosystem continues to evolve and mature, showing increased collaborations between highly sophisticated criminal actors
  • Security at the speed of DevOps Recorded: Jun 19 2019 59 mins
    Scott Ward: Solutions Architect - Amazon Web Services (AWS), Alexi Papaleonardos: Principal Consultant - CrowdStrike
    Organizations are rapidly adopting DevOps as they retool their IT infrastructure. The speed and agility it delivers enables them to better serve their customers and compete more effectively in the marketplace. Far too often security is seen as an inhibitor — getting in the way of rapid delivery of new applications and the ability to scale infrastructure to meet business opportunity.

    In this session, experts from Amazon Web Services (AWS) and CrowdStrike will outline how to quickly deploy and scale while retaining control and preserving compliance when using the cloud. You’ll learn how you can adopt a DevOps model without sacrificing security by using automated compliance policies, fine-grained controls, and configuration management techniques.

    This webcast will cover these key topics and takeaways:

    - A review and discussion of the shared responsibility model to help you understand the tenets of security that’s “of” the cloud versus security “in” the cloud
    - Best practices in securing your cloud presence
    - Practical steps for how you should assess your infrastructure, management and compliance
  • Going Far Beyond Antivirus Recorded: Jun 13 2019 62 mins
    Dr. Sven Krasser: VP, Chief Scientist - CrowdStrike, Dan Larson: VP, Product Marketing - CrowdStrike
    An examination of three "must-have" capabilities for effective endpoint protection.

    Analysts have been redefining endpoint protection platforms (EPP) in light of the increasingly sophisticated threat actors targeting today's organizations. A recent report from the Enterprise Strategy Group (ESG), which found that 76 percent of organizations have either changed their AV vendor recently or are planning to do so soon, proves that organizations are aligned with this thinking. However, analysts also warn that organizations shouldn't just switch from vendor A to vendor B — they recommend moving beyond signature-based AV solutions to next-gen EPP that is truly capable of offering you better protection and performance.

    This webcast focuses on the three critical features you should look for in next-gen EPP and gives you an understanding of the cutting-edge technology that can take you "far beyond AV." Join a panel of CrowdStrike experts including VP and Chief Scientist Sven Krasser, VP of Product Marketing Dan Larson, Senior Engineering Manager Kirby Koster and Senior Director of OverWatch and Security Response Jennifer Ayers, as they take a deep dive into the must-haves that characterize true next-gen EPP.

    Join this webcast to learn:

    - The new definition of endpoint protection and the characteristics that separate the old from the new
    - The role of AI and ML in EPP and the factors that make these technologies most effective
    - How event stream processing powers behavioral analytics and why it’s crucial for EPP
    - Proactive threat hunting and its role in EPP
  • Stopping Breaches Faster: The 1/10/60 Minute Challenge Recorded: Jun 11 2019 53 mins
    Scott Taschler: Director of Products - CrowdStrike, Rachel Scobey: Technical Product Manager - CrowdStrike
    Breakout time, the time that it takes an intruder to jump from the machine that’s initially compromised and move laterally through your network, on average is 1h and 58m*. This is your critical window to take action and stop the breach. When an attack is in progress, we’re seeing world leading security teams take one minute to detect it, 10 minutes to understand it and one hour to contain it. Is your organisation ready to meet the 1/10/60 minute challenge?

    Attend this webcast to learn:

    -What breakout time is and what it means for defenders that are responding to attacks in real time
    -How the incident response process unfolds and the barriers that keep organisations from mounting a rapid and efficient response
    -The key steps you can take to improve your organisation’s ability to rapidly detect, investigate and remediate threats

    * The 2018 CrowdStrike® Global Threat Report
  • BECs - Are You Prepared? Recorded: May 8 2019 57 mins
    Bryan York: Director, Professional Services - CrowdStrike, David Hampton: Manager, Professional Services - CrowdStrike
    Business Email Compromises (BECs) are a growing problem across a multitude of industries. Threat actors are the spearhead of this new genre of cyber fraud, triggering losses that run into the billions of dollars.

    In this webcast, CrowdStrike experts will detail how to identify and defend against the threat posed by BECs. Experts will also discuss how to identify a BEC in the context of a broader compromise assessment focused on addressing current and past attackers.

    Join this session to learn:

    - How BEC works and the nature of the threat that it poses to your organization
    - Examples from real-life BEC attacks and responses
    - Insight into Office 365 BEC investigative methodologies and data sources
    - The role compromise assessments can play in your security hygiene and how it can help protect against BEC
  • Observations from the Front Lines of Threat Hunting Recorded: May 1 2019 47 mins
    Harlan Carvey: Senior Researcher - CrowdStrike, John Wunder: Principal Cybersecurity Engineer - MITRE
    The CrowdStrike® Falcon OverWatch™ threat hunting team has a unique vantage point on today’s threat landscape. The team’s new report, “Observations from the Front Lines of Threat Hunting,” provides this perspective with an in-depth discussion of today’s most sophisticated cyberattacks, compiled by expert hunters working at the forefront of cyber defense.

    Join MITRE’s John Wunder and CrowdStrike expert threat hunter Harlan Carvey as they discuss exploring the attacker trends observed in the wild and provide practical advice to improve your security posture today.

    Join this webcast to learn:

    - The prevalent tactics and techniques used by adversaries in 2018 and the trends you can expect to continue
    - How to improve your organization's defenses by analyzing the steps successful enterprises take to ensure their security
    - What the MITRE ATT&CK framework is and how it helps defenders understand and respond to new threats
  • A Day in the Life of a SOC Analyst Recorded: Apr 24 2019 49 mins
    Adam Meyers: VP Intelligence - CrowdStrike, Kurt Baker: Senior Director of Product Marketing for Intelligence - CrowdStrike
    Today’s Security Operation Center (SOC) teams are challenged by the volume and the growing sophistication of cyber threats. The typical SOC receives tens of thousands of alerts each week, yet, due to a lack of time and resources, only a small percentage will ever be investigated.

    This webcast looks at typical SOC activities, including the pitfalls and failures, and offers a new approach to alert investigation and response. Join CrowdStrike VP of Intelligence Adam Meyers to gain an understanding of how integrating and automating threat intelligence with endpoint protection can accelerate incident research, streamline the investigative process and drive better security responses.

    Join this webcast to hear CrowdStrike experts discuss:

    - How you can cut your incident investigation time from 8 hours to 10 minutes
    - How SOC teams can focus on the most relevant threats
    - How you can automatically investigate all incidents, learn from attacks, and accelerate your decision-making and response
    - How to get ahead of adversaries by understanding their motivations and tradecraft, enabling you to predict and anticipate their next move
  • How to make 60-minute Remediation a Reality Recorded: Apr 17 2019 54 mins
    Austin Murphy: Vice President of Managed Services - CrowdStrike, Con Mallon: Senior Product Director - CrowdStrike
    Speed is an imperative in cybersecurity and it is one of the themes in the CrowdStrike® 2019 Global Threat Report, which highlights the critical importance of speed in staying ahead of today’s rapidly evolving threats. One of the focuses of this year’s report is “breakout time” — the window of time from when an adversary first compromises an endpoint machine to when they begin moving laterally throughout your network to reach their objective. For some adversaries, it only takes an average of 18 minutes. This begs an important question — are you and your organization able to respond at the same pace as the attacker?

    To help organizations be better prepared for today’s sophisticated adversaries, CrowdStrike has established the "1-10-60 rule” as a benchmark for the average speed needed to defeat the adversary and stop the breach: 1 minute to detect, 10 to investigate and 60 minutes to remediate.

    In this webcast, CrowdStrike VP of Managed Services Austin Murphy will discuss the 1-10-60 rule and explain why these key outcome-driven metrics are critical to your organization’s security readiness. He will also show you how CrowdStrike Falcon® Complete™ can instantly transform your security and ensure you can meet the 1-10-60 rule.

    Join this webcast to learn:

    - Why speed of detection, investigation and remediation are key factors for successful day-to-day security management

    - The important steps needed to improve your organization’s ability to rapidly detect, investigate and remediate threats

    - How Falcon Complete can fast-track your organization to a 1-10-60 rule posture and elevate your cybersecurity maturity to the highest possible level, regardless of your internal resources
  • Fileless Attacks: Learn how to defend your organisation against them Recorded: Oct 12 2017 34 mins
    Zeki Turedi, Senior Systems Engineer, CrowdStrike
    Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks.

    Join CrowdStrike security experts as they discuss why so many of today's adversaries are abandoning yesterday's malware and relying on an evolving array of fileless exploits. You'll learn how fileless attacks are conceived and executed and why they are successfully evading the standard security measures employed by most organizations. You'll also receive guidance on the best practices for defending your organization against these stealthy, damaging attacks.

    Join this webcast to learn:
    - Best practices for defending your organization against fileless attacks
    - How a fileless attack is executed — see how an end-to-end attack unfolds
    - Why fileless attacks are having so much success evading legacy security solutions
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to make 60-minute Remediation a Reality
  • Live at: Apr 17 2019 9:00 am
  • Presented by: Austin Murphy: Vice President of Managed Services - CrowdStrike, Con Mallon: Senior Product Director - CrowdStrike
  • From:
Your email has been sent.
or close