Hi [[ session.user.profile.firstName ]]


An Update on the COVID-19 Threat Landscape.

As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

Attend this webcast to learn:

- How threat actors are exploiting COVID-19 — their motivation and intent
- The latest tactics, techniques and procedures adversaries are using to reach their objectives
- The sectors and geographical regions being targeted by COVID-19 exploits
- Steps you can take to proactively address these emerging threats
Recorded May 7 2020 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adam Meyers: Vice President of Intelligence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Identity Protection: A Key Element for Modern Threat Hunters [EMEA] Aug 19 2021 9:00 am UTC 34 mins
    Andrew Harris (Sr. Director, Public Sector Technology Strategy), Phil Meneses (Regional Sales Engineer)
    While companies have embraced more endpoint and multifactor authentication (MFA) solutions in their security architecture, they don’t always see incidents as they happen — especially those involving service accounts and lateral movement. Recent attacks targeting identity and supply chain automation have made it clear that the next level of preparedness and risk mitigation must include reviewing and strengthening identity security tools.

    “Defense in depth” means finding the right controls from the endpoint all the way to the domain controller, but most security stacks are missing identity controls beyond an MFA checkbox. In addition, Golden SAML attacks such as those seen in Sunburst show that MFA isn’t a silver bullet, either. Good security requires not only automated responses to threats as they arise, but also deterministic threat detection (i.e., signature matching) and behavior anomaly detection (i.e., user/credential live actions). Our experts will demonstrate CrowdStrike Falcon® identity protection products that achieve both.

    Demo 1: Falcon Identity Threat Detection
    • Insights and analytics across your enterprise
    • Seeing live threats and events as they happen — no logs!
    • Threat hunting: can it be the “easy” button?

    Demo 2: Falcon Zero Trust
    • Seeing Zero Trust policy challenges against live events
    • Integrating with MFA and SSO to extend the reach of each into legacy and the cloud alike
    • Adding security without making employees miserable
  • Understanding The United States’ Zero Trust Mandate Aug 18 2021 7:00 pm UTC 54 mins
    James Yeager (CrowdStrike), Ajit Sancheti (CrowdStrike), Richard Wong (Frost & Sullivan)
    The U.S. White House “Executive Order on Improving the Nation’s Cybersecurity” (EO), released May 12, has far-ranging and fast-moving implications for all industries — not just government agencies — and in particular prioritizes the application of Zero Trust.

    In this CrowdCast tailored especially for cybersecurity leaders, Zero Trust experts examine and explain the EO, including its Zero Trust mandate and what it means for both government and non-government organizations.

    After viewing this webcast security leaders will understand:
    • How the EO impacts all industries (including those based outside the U.S.)
    • The critical deadlines the EO imposes
    • What technologies are required to meet the Zero Trust mandate
    • How to approach the Zero Trust mandate in a manageable, phased manner
    • How non-government organizations benefit from this guidance

    • Mr. James Yeager, VP of Public Sector & Healthcare (CrowdStrike)
    • Mr. Ajit Sancheti, VP of Identity Protection
    • Mr. Richard Wong, SVP, Global Head of Security Market Advisory, Frost & Sullivan
    • Moderated by: Mr. Kapil Raina, VP Zero Trust & Identity Marketing
  • The Maturation of Cloud-Native Security: Securing Modern Apps and Infrastructure Aug 13 2021 6:30 pm UTC 55 mins
    David Puzas (Product Marketing Leader, CrowdStrike), Doug Cahill (VP/Group Director, Cybersecurity — ESG)
    More than ever, organizations are grappling with how to secure cloud-native applications. Composed of a combination of containers, virtual machines, APIs and serverless functions, protecting these applications from development to runtime requires reworking the approach many organizations take toward security.

    In a new survey from CrowdStrike and Enterprise Strategy Group (ESG), 88% of respondents said their cybersecurity program needs to evolve to secure their cloud-native applications and use of public cloud infrastructure, with many citing challenges around maintaining visibility and consistency across disparate environments.

    Join ESG’s VP and Group Director of Cybersecurity Doug Cahill and CrowdStrike’s Cloud Security Product Marketing Leader David Puzas as they discuss:
    • The cloud-native threat landscape and the need for an integrated defense-in-depth strategy
    • Cloud-native security challenges and how maturity gaps result in inconsistency, misconfigurations and visibility gaps
  • Deconstructing The Round 3 MITRE ATT&CK Evaluation Aug 11 2021 7:00 pm UTC 32 mins
    Michael Sentonas (Chief Technology Officer), Andrew Munchbach (Vice President of Sales Engineering)
    MITRE Engenuity’s ATT&CK Evaluation program represents one of the industry’s most in-depth assessments of how endpoint protection solutions behave when subjected to complex, real-world threats. MITRE Engenuity shares a wealth of data on performance of nearly 30 vendors, but how should we make sense of it all? More importantly, how do security teams find and use this data to stop intrusions before they become a breach?

    Join CrowdStrike CTO Michael Sentonas and VP of Sales Engineering Andrew Munchbach for a walkthrough of the evaluation, with firsthand insights from the team who executed it. Michael and Andrew will provide an in-depth overview of MITRE’s Round 3 evaluation, what it says about the EDR market, and what it means for the CrowdStrike Falcon platform.

    Join this call to learn more about:
    • What the MITRE ATT&CK Evaluation is, and what it can tell us about modern EDR solutions
    • What a Falcon analyst would experience when faced with an attack like the simulated intrusion by CARBON SPIDER (Carbanak)
    • How we should interpret the results of ATT&CK Evaluation Round 3, and what important insights we can take away
    • The key capabilities that are most critical for protecting against similar adversary tradecraft today and tomorrow
  • Gut gesichert in die Cloud–Und ist das überhaupt wichtig? Aug 11 2021 8:00 am UTC 60 mins
    Nikolei Steinhage, Sr. Sales Engineer
    Mit der steigenden Nachfrage nach Cloud-Technologien gewinnt auch die Frage immer mehr an Bedeutung, wie sich diese effizient vor feindlichen Zugriffen schützen lassen.

    In diesem Webcast gehen wir dieser Frage auf den Grund und sprechen über die Herausforderungen, die die Cloud-Transformation mit sich bringt. Erfahren Sie, wie Sie den Überblick über sämtliche Workloads behalten können, um Angriffe sowie Fehlkonfigurationen früh zu erkennen, aufzuhalten bzw. zu berichtigen und anschließend zu untersuchen. Lernen Sie weiterhin, wie sich Cloud-Infrastrukturen in die bestehende Infrastruktur integrieren lassen und wie CrowdStrike Sie und ihr Team dabei unterstützen kann.
  • Customer Case Study: Med-el Aug 5 2021 1:45 pm UTC 22 mins
    Tobias Kilga, Head of Corporate Information Technology, MED-EL
    From Antivirus to Endpoint Detection and Response. Tobias Kilga, Head of Corporate Information Technology at MED-EL, will share their experience of transitioning to a cloud delivered security solution and how CrowdStrike has supported his team to overcome the daily threat of cyberattacks to their business.
  • Customer Case Study: Coventry University Aug 5 2021 1:00 pm UTC 35 mins
    Steve Rogers, Enterprise Cloud, Infrastructure and Security Architect, Coventry University
    Steve Rogers is an Enterprise Cloud, Infrastructure and Security Architect at Coventry University, a major higher education institution in the United Kingdom with over 29,000 students and campuses across Coventry, London, Scarborough China and Singapore. In this case study Steve will explain Coventry University’s journey to a world class security posture why securing the end point for both staff and students alike was critical path to security maturity for the organisation.
  • Customer Case Study: Softserve Aug 5 2021 12:30 pm UTC 18 mins
    Adriyan Pavlykevych, CISO, Softserve | Michael Kropyva, InfoSec Associate Director - InfoSec, Softserve
    Adriyan Pavlykevych (CISO at Softserve) and Michael Kropyva (InfoSec Associate Director, InfoSec at Softserve) will share an overview of the security challenges faced by the organisation, the goals for improving their security posture, the implementation journey and the benefits from the solutions that have been implemented.
  • Customer Case Study: General Finance Aug 5 2021 12:00 pm UTC 23 mins
    Graziano Callegaro, IT Director, Generalfinance S.p.A.
    Learn from this Italian banking company how they moved from legacy antivirus to a modern cybersecurity solution that provides them with 24/7 detection & response by experts, clear understanding after true positives, tailored reports, thorough support throughout and fast deployment.
  • Customer Case Study: Entain Group Aug 5 2021 10:45 am UTC 19 mins
    Luke Davis, Security Operations, Entain
    Luke Davis, Security Operations at Entain, one of the worlds largest sports betting and gaming groups will discuss how Entain have moved to a SaaS first approach and how CrowdStrike have supported their journey Entain has matured as a business. Luke will also explain why and how CrowdStrike’s Falcon Platform was selected as the solution of choice.
  • Customer Case Study: Randstad Aug 5 2021 10:15 am UTC 26 mins
    Martijn Nykerk, Global CISO, Randstad
    Martijn Nykerk, Global CISO at Randstad, will deliver a case study on their experience in transitioning to CrowdStrike, reviewing how they selected, implemented and deployed the solution.
  • Alliance Case Study: EY Aug 5 2021 9:45 am UTC 31 mins
    Leanne Salisbury, Senior Manager, Cybersecurity | Bence Hovarth, Director, Technology Consulting - Cybersecurity
    Human ingenuity is driving cyber threat evolution, harnessing artificial intelligence and automation along with sharing knowledge and capabilities. Collaborations between adversary groups are creating an increase in professionalization across the networks of cyber adversaries. Members are learning from the outcomes of their attacks and the responses from their victims. Humans are very good at learning from others, what worked and what didn’t. The lines are blurring between threat actor groups, ideology and intent are no longer important distinguishing factors. If an attack style works and the technical resources are available, they will be used. In this presentation, we will explore this growing trend, the potential impacts for organizations and how they can prepare.

    The views reflected in this article are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.
  • Keynote: Ken Greene Aug 5 2021 9:00 am UTC 32 mins
    Ken Greene, Strategic Alliances Director, Humio
    In this session, Ken will review the Security Detection challenges facing organisations and how these result in blind-spots that present cyber and operational risk. Ken will consider the implications of this for cyber defence teams and how changing trends in technology and customer processes can have both a positive and negative impact on Security Detection.

    Ken will propose ideas for how organisations can build more flexible and comprehensive security detection foundations to meet the challenges of unknown, future cyber threats.
  • Keynote: Adam Meyers Aug 5 2021 8:30 am UTC 26 mins
    Adam Meyers, Senior Vice President of intelligence, CrowdStrike
    Adam Meyers, Senior Vice President of intelligence at CrowdStrike, discusses how organisations can protect themselves from the next wave of cyber adversaries by presenting the EMEA Threat Landscape.
  • Keynote: Amol Kurkami Aug 5 2021 8:00 am UTC 27 mins
    Amol Kulkarni, Chief Product Officer, CrowdStrike
    Your organisation uses new technologies to increase its productivity. Attackers use the latest technologies to improve their rate of success. But.. do you use new technologies to protect your organization?

    With the deployment of new cloud technologies and most of the workforce still working remotely, the attack surface of many companies has increased significantly in the past year. This calls for a comprehensive security strategy that can protect all workloads, regardless of whether they are workstations, servers or cloud workloads. A zero-trust approach to protecting user data should be a given.

    Hear from CrowdStrike’s Chief Product Officer Amol Kulkarni as he shares how a robust, integrated and wholesome security strategy can be implemented in your environment and how it can evolve to ensure your organization remains secure.
  • Schattenwirtschaft e-Crime - Ein Blick in das e-Crime Ökosystem Recorded: Aug 4 2021 61 mins
    Jörg Schauff, Strategic Threat Advisor, EMEA
    Tauchen Sie mit unserem Threat Intelligence Experten Jörg Schauff in die Tiefen des Deep- und Darknet ein und erfahren Sie mehr über den Aufbau des e-Crime Ökosystems und wie Sie sich schützen können.

    In diesem Webcast lernen Sie mehr über das hinter Ransomware stehende kriminelle Ökosystem und erfahren zudem, wie das Wissen um Bedrohungen Sie davor schützen kann, Opfer dieser Angreifer zu werden.

    Anhand von Beispielen aus der Praxis zeigen wir Ihnen, wie Sie auch besonders raffinierte Ransomware-Bedrohungen besser analysieren, verstehen und erfolgreich bekämpfen können.

    U. a. erfahren Sie:
    • mehr über Angreifertaktiken wie Erpressung, „Leak-Sites“ und die Nutzung von sozialen Medien, Untergrundforen und Messaging-Apps,
    • wie Angreifer ihre Entwicklungsanstrengungen verstärken und neuartige Methoden einsetzen, um eine Erkennung zu verhindern und Verteidiger irrezuführen,
    • wie CrowdStrike mit einem vollständigen Portfolio an Intelligence-Werkzeugen, wie z. B. das Ausspionieren von Angreifern, technische Intelligence und digitale Risikoüberwachung, dagegen vorgeht.
  • Bedrohungslandschaft im Gesundheitswesen Recorded: Jul 28 2021 51 mins
    Jörg Schauff, Threat Intelligence Advisor, CrowdStrike
    Bedrohungslandschaft im Gesundheitswesen: eCrime-Angriffe können im jahr 2020 tödlich verlaufen

    Lesen Sie den CrowdStrike Global Threat Report 2020 mit Infos und Tipps zum Schutz vor sich ändernden Cyberbedrohungen.

    eCrime-Angriffe haben im Jahr 2020 exponentiell zugenommen. Insbesondere Ransomware-Angriffe verzeichnen in verschiedenen Branchen Spitzenwerte. Zwar haben bestimmte kriminelle Syndikate zugesichert, wegen der schweren COVID-19-Erkrankungen von Angriffen auf das Gesundheitswesen abzusehen, doch die durch das Corona-Virus verursachte Verunsicherung liefert Bedrohungsakteuren einen neuen Köder für ihre böswilligen Aktivitäten. Einige Gegner nutzten diese Gelegenheit, um im gesamten Gesundheitssystem Chaos zu stiften und Angriffe durchzuführen. In bestimmten Fällen mit tödlichen Folgen.

    Erfahren Sie in unserem Webcast von CrowdStrikes Threat Intel Experten Jörg Schauff mehr über die jüngsten nationalstaatlichen und e-Crime-Angriffe, die sich gegen Gesundheitsdienstleister weltweit richten. Des Weiteren stellen wir Ihnen Konzepte vor, die Sie für Ihr Unternehmen nutzen können, um wachsam zu bleiben und sich gegenüber den genannten Aktivitäten zu schützen.
  • Cybersecurity Risk for SMB - Defending Your Business From Big Threats [EMEA] Recorded: Jul 15 2021 34 mins
    Patrick Magat, Services Director (EMEA), CrowdStrike
    In a small or medium-sized business, you probably wear many different hats: VP of logistics one day, head of social media the next, and IT trouble-shooter the day after that.

    Are you comfortable wearing the Chief Information Security Officer hat for your business?

    Though most reporting on cyberattacks focuses on the impacts to large companies, the truth is that small businesses are not immune. eCrime groups know that small businesses rarely have the resources to defend themselves in the same way as large enterprises, which can make them lucrative targets for ransomware and cyber extortion.

    The threats are real, and the days of protecting your organization with simple antivirus and a firewall aregone. What can you do when you lack a full staff of cybersecurity experts to defend your business?

    In this webinar, CrowdStrike’s Patrick Magat will examine the cyber threats that target small businesses, sharing real-world examples plucked from the CrowdStrike case files. This will set the stage for a discussion of the building blocks of a successful cyber defence, and practical guidance for defending your business.

    Join this webinar to learn about:
    • Common cybersecurity misconceptions for small business
    • Real-world case studies of cyber intrusions and what could have been done to stop them
    • The basic structure of a successful cybersecurity program, including next-generation prevention, threat hunting, investigation and real-time response
    • How small businesses are using managed services to see, stop and prevent determined attackers, skipping the burden of building and managing a program themselves
  • Keynote Recorded: Jul 8 2021 25 mins
    Adam Mayers, Senior Vice President of intelligence at CrowdStrike
    Adam Meyers, Senior Vice President of intelligence at CrowdStrike, discusses how organisations can protect themselves from the next wave of cyber adversaries by presenting the EMEA Threat Landscape.
  • Security without Borders for Mission-Critical Resilience [APJ] Recorded: Jul 8 2021 136 mins
    Michael Sentonas (Global Chief Technology Officer), Jagdish Mahapatra (Vice President)
    Missed this year's 2021 CrowdStrike Asia Virtual Summit? Join us again in this replay of the main session and hear from leaders from CrowdStrike discussing this year's cybersecurity trends in Asia.

    • Welcome Message from Jagdish Mahapatra, Vice President, CrowdStrike Asia
    • Business Leaders in Dialogue: Leadership Vision in Cyber Security: Zero Trust - Taking Security Beyond the Perimeter
    • CXO Circle: Rethinking Security & Digital Risk Strategy
    • Resilience and Real-Time Protection with an Extensible, Platform-Based Security Strategy
    • Keynote Closing from Shawn Henry, President of Crowdstrike Services and Chief Security Officer

    This session is presented by:
    • Michael Sentonas, Global Chief Technology Officer, CrowdStrike
    • Sherif El-Nabawi, Vice President, Sales Engineering, CrowdStrike APJ
    • Jagdish Mahapatra, Vice President, CrowdStrike Asia
    • Kristin Lovejoy, Principal, EY Technology Consulting: Global Cybersecurity Leader
    • Ryan Kalember, Executive Vice President, Cybersecurity Strategy, Proofpoint, Inc.
    • Allan Tan, Group Editor-in-Chief, CXOCIETY
    • Abid Adam, Chief Risk & Compliance Officer (GCRCO), Axiata Group
    • Tithirat Siripattanalert, Chief Information Security Officer & Chief Data Officer, True Digital Group
    • Anil Bhandari, Chief General Manager & Chief Information Security Officer, State Bank of India
    • Tim Tudor, Chief Executive Officer, ECU Worldwide
    • P Ramakrishna, Chief Executive officer, CIO AcademyAsia
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Live at: May 7 2020 9:00 am
  • Presented by: Adam Meyers: Vice President of Intelligence
  • From:
Your email has been sent.
or close