Hi [[ session.user.profile.firstName ]]

COVID-19 THREAT INTELLIGENCE BRIEFING

An Update on the COVID-19 Threat Landscape.

As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

Attend this webcast to learn:

- How threat actors are exploiting COVID-19 — their motivation and intent
- The latest tactics, techniques and procedures adversaries are using to reach their objectives
- The sectors and geographical regions being targeted by COVID-19 exploits
- Steps you can take to proactively address these emerging threats
Recorded May 7 2020 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adam Meyers: Vice President of Intelligence
Presentation preview: COVID-19 THREAT INTELLIGENCE BRIEFING

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • L'évolution du ransomware Recorded: Sep 15 2020 57 mins
    Christophe Viaud, Sales Engineer, Crowdstrike
    Les grandes entreprises sont plus à risque d'être visées par des demandes de rançons très élevées.
    En ces temps difficiles, les cybercriminels intensifient leurs attaques par ransomware dans l'espoir de profiter des entreprises au moment où elles sont le plus vulnérables. Ainsi, ils s'en prennent non seulement aux réseaux d'entreprise mais également à vos systèmes domestiques.Comme les pirates innovent sans cesse et à un rythme toujours plus rapide, il est clair que les tactiques des ransomwares déployées dans le cadre des campagnes menées par les cybercriminels et autres cyberpirates à la solde d'États-nations se font plus sophistiquées.
    Celui-ci aborde les sujets suivants:

    - L'évolution de la stratégie des ransomwares, auparavant déployés «au petit bonheur la chance», vers des attaques ciblées visant à obtenir des gains financiers plus importants
    - Les tactiques, techniques et procédures utilisées par les cybercriminels actuels et leur sophistication croissante
    - Le perfectionnement des attaques par ransomware,au-delà des simples e-mails de phishing et fenêtres pop-up de sites web
    - Les mesures à prendre pour bloquer la progression d'une attaque par ransomware
  • Demystifying Threat Intelligence Recorded: Sep 8 2020 61 mins
    Scott Jarkoff, Director, Strategic Threat Advisory Group for APJ
    Today’s security professionals recognize that threat intelligence is a critical component in their cyber toolkit, enabling them to proactively respond and pre-empt advanced threats. Yet many of these same professionals are having a difficult time understanding the array of threat intelligence solutions and how to best utilise them within their organisations.

    This webcast addresses these challenges and highlights the importance of leveraging threat intelligence as a critical part of an effective cybersecurity strategy.

    Join CrowdStrike’s Director, Strategic Threat Advisory Group for APJ, Scott Jarkoff, to learn how to get the most value out of threat intelligence by effectively applying it across your organization — from security operations to executive leadership.
  • SIMPLIFYING ENTERPRISE SECURITY WITH A UNIQUE CYBERSECURITY ECOSYSTEM Recorded: Aug 25 2020 54 mins
    Fernando Montenegro Principal Analyst, Information Security - 451 Research, Andy Horwitz VP, CrowdStrike Store
    Enterprises are finding their security readiness and flexibility tested as they respond to rapid changes in how customers and employees behave, buy and work. Many organizations have had to rethink their IT strategy and accelerate their digital transformation plans to adopt cloud-native technologies.

    As a cloud-delivered cybersecurity company, CrowdStrike has garnered unique experience in what it takes to build and secure customer environments at scale. The CrowdStrike® Store is a cybersecurity ecosystem of trusted applications that extends the power of the CrowdStrike Falcon® platform’s single-agent architecture and rich data telemetry to provide frictionless consumption of new security capabilities.

    The CrowdStrike Store offers a strategic choice of complementary vendors and capabilities that can be enabled at the click of a button. The Store offerings allow enterprises to simplify and optimize their security stack, making CrowdStrike the only true security platform rather than an add-on to an organization’s already complex security stack.

    Attend this session to learn:

    How the security market landscape is changing and the effect this is having on buying trends
    The key requirements that can help simplify a security buyer’s purchasing decisions
    What the CrowdStrike Store offers and how it is addressing security buyers’ concerns
    How the CrowdStrike platform leverages third-party apps to help address specific customer pain points
  • SIMPLIFYING ENTERPRISE SECURITY WITH A UNIQUE CYBERSECURITY ECOSYSTEM EMEA Recorded: Aug 25 2020 54 mins
    Fernando Montenegro Principal Analyst, Information Security - 451 Research, Andy Horwitz VP, CrowdStrike Store
    Enterprises are finding their security readiness and flexibility tested as they respond to rapid changes in how customers and employees behave, buy and work. Many organizations have had to rethink their IT strategy and accelerate their digital transformation plans to adopt cloud-native technologies.

    As a cloud-delivered cybersecurity company, CrowdStrike has garnered unique experience in what it takes to build and secure customer environments at scale. The CrowdStrike® Store is a cybersecurity ecosystem of trusted applications that extends the power of the CrowdStrike Falcon® platform’s single-agent architecture and rich data telemetry to provide frictionless consumption of new security capabilities.

    The CrowdStrike Store offers a strategic choice of complementary vendors and capabilities that can be enabled at the click of a button. The Store offerings allow enterprises to simplify and optimize their security stack, making CrowdStrike the only true security platform rather than an add-on to an organization’s already complex security stack.

    Attend this session to learn:

    How the security market landscape is changing and the effect this is having on buying trends
    The key requirements that can help simplify a security buyer’s purchasing decisions
    What the CrowdStrike Store offers and how it is addressing security buyers’ concerns
    How the CrowdStrike platform leverages third-party apps to help address specific customer pain points
  • Cybersecurity Unleashes Digital Transformation at ECI Recorded: Aug 13 2020 42 mins
    Brian Winters Chief Information Officer - ECI Software Solutions, Saxxon McCarty Director, Falcon Complete - CrowdStrike
    As organizations pivot to the cloud, and remote work moves from a novelty to the new reality, digital transformation is occurring more rapidly than ever. Join Brian Winters, CIO of ECI Software Solutions, and CrowdStrike’s Saxxon McCarty for an in-depth conversation centered on how ECi remains nimble and secure in this era of continuous change.

    In this session, Brian and Saxxon address these crucial topics:

    What IS the digital transformation? What is its effect on cybersecurity organizations?
    Why is it critical for organizations of all sizes to have a cybersecurity strategy that adapts rapidly?
    What strategy, products and services have helped ECI reduce the risk of a breach as it pivoted to the cloud and embraced remote work? How has partnering with CrowdStrike removed barriers?
    What trends and challenges are on the horizon that will drive the next wave of change? How is ECI adapting its cybersecurity strategy today to be ready for tomorrow’s business challenges?
  • Securing Cloud Workloads and Containers Recorded: Jul 16 2020 30 mins
    Jackie Castelli Director Products - CrowdStrike and Rachel Scobey Technical Marketing Manager - CrowdStrike
    As more and more organizations are moving to the cloud, private, public and hybrid cloud infrastructures are expanding rapidly. But that expansion also increases the attack surface and opens the door to new threat vectors, making securing cloud workloads a critical need.

    As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Join us to learn how the 100% cloud-native CrowdStrike Falcon® platform can make your cloud migration more secure by protecting cloud workloads and containers in a fast and easy way.

    Register and attend this session to:

    Find out what CrowdStrike has learned from securing its own cloud infrastructure
    Learn about CrowdStrike’s approach to securing cloud workloads
    Understand how the CrowdStrike® Falcon platform protects cloud workloads
    See a demo of how Falcon secures containers
  • Securing Cloud Workloads and Containers-EMEA Recorded: Jul 16 2020 30 mins
    Jackie Castelli Director Products - CrowdStrike and Rachel Scobey Technical Marketing Manager - CrowdStrike
    As more and more organizations are moving to the cloud, private, public and hybrid cloud infrastructures are expanding rapidly. But that expansion also increases the attack surface and opens the door to new threat vectors, making securing cloud workloads a critical need.

    As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Join us to learn how the 100% cloud-native CrowdStrike Falcon® platform can make your cloud migration more secure by protecting cloud workloads and containers in a fast and easy way.

    Register and attend this session to:

    Find out what CrowdStrike has learned from securing its own cloud infrastructure
    Learn about CrowdStrike’s approach to securing cloud workloads
    Understand how the CrowdStrike® Falcon platform protects cloud workloads
    See a demo of how Falcon secures containers
  • Perspectives on cybersecurity after the pandemic Recorded: Jul 16 2020 60 mins
    Ajay Kumar & Valerian Rossigneux
    The global lockdown to stem the spread of COVID-19 has created tremendous upheaval in our personal and professional lives. Some regions that were among the first hit and first to react to the outbreak are beginning to see past the current pandemic toward a return to “normal” — but what will that new “normal” look like?

    In this live webinar, our security experts will provide you with guidance on your security approach and cyber defences, particularly at this time, when circumstances require changes in the security posture of many organisations.

    - Incident response and proactive cyber defence services, Ajay Kumar, Regional Head - Services Sales, Asia

    - Endpoint and cloud workload protection capabilities, Valerian Rossigneux, Solution Architect Manager, CrowdStrike Asia

    - Q&A
  • Securing Cloud Workloads and Containers-APAC Recorded: Jul 16 2020 30 mins
    Jackie Castelli Director Products - CrowdStrike and Rachel Scobey Technical Marketing Manager - CrowdStrike
    As more and more organizations are moving to the cloud, private, public and hybrid cloud infrastructures are expanding rapidly. But that expansion also increases the attack surface and opens the door to new threat vectors, making securing cloud workloads a critical need.

    As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Join us to learn how the 100% cloud-native CrowdStrike Falcon® platform can make your cloud migration more secure by protecting cloud workloads and containers in a fast and easy way.

    Register and attend this session to:

    Find out what CrowdStrike has learned from securing its own cloud infrastructure
    Learn about CrowdStrike’s approach to securing cloud workloads
    Understand how the CrowdStrike® Falcon platform protects cloud workloads
    See a demo of how Falcon secures containers
  • Leadership in the new normal Recorded: Jul 14 2020 47 mins
    Shawn Henry, CrowdStrike President and CSO
    On Tuesday 14th July, 14:00 BST, the ISF will be joined by Shawn Henry, CrowdStrike President and CSO, and former FBI Executive Assistant Director.

    Shawn will discuss cybersecurity as an enterprise business risk and why strong leadership is critical in the face of a crisis. After over 30 years in Security, with 20 years of cybersecurity experience, Shawn has been personally involved in investigating and managing the response for some of the biggest cyber breaches in US history. Hear examples from the front lines of cyber incident response, key components of strong leadership during an incident, and effective strategies to manage a crisis.

    Throughout this webinar you will learn:

    •Why strong leadership is critical in the face of a crisis
    •The key components of strong leadership when faced with an incident
    •Stories from the front line of cyber incident response
    •Effective strategies in crisis management
  • THE EVOLUTION OF RANSOMWARE (AEST) Recorded: Jun 30 2020 58 mins
    Jason Rivera: Director of Strategic Threat Advisory Group. Josh Burgess: Lead Technical Strategic Advisor
    Threat Intelligence Observations for 2020 and Beyond
    The exponential growth of ransomware has made it a pervasive and constant threat to end users across the globe. Regardless of your business size, industry or location, preventing ransomware is critical to the health of your organization, both from a financial perspective as well as for your brand reputation.

    In this CrowdCast, you’ll hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

    Watch this webcast to learn about:

    - The ransomware cyber threat landscape
    - Using strategic, operational and tactical assessments to shine lights on points of exposure
    - How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • THE EVOLUTION OF RANSOMWARE (PDT) Recorded: Jun 25 2020 58 mins
    Jason Rivera: Director of Strategic Threat Advisory Group. Josh Burgess: Lead Technical Strategic Advisor
    Threat Intelligence Observations for 2020 and Beyond
    The exponential growth of ransomware has made it a pervasive and constant threat to end users across the globe. Regardless of your business size, industry or location, preventing ransomware is critical to the health of your organization, both from a financial perspective as well as for your brand reputation.

    In this CrowdCast, you’ll hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

    Watch this webcast to learn about:

    - The ransomware cyber threat landscape
    - Using strategic, operational and tactical assessments to shine lights on points of exposure
    - How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • Customer Case Study: Maersk Recorded: Jun 25 2020 31 mins
    Andy Powell
    Andy Powell CISO of Maersk, the shipping giant involved in around 20% of the word trade will share his experiences in how to develop a resilient global cyber security organisation across the globe using effective technologies and how making informed cyber security decisions can help avoid a worst case scenario.
  • Customer Case Study: SIG Plc Recorded: Jun 25 2020 22 mins
    Carl Baron
    Carl Baron CISO of SIG, a major international supplier of specialist construction products will talk about his experience working with CrowdStrike from initial implementation and deployment to his plans for future.
  • TalkTalk’s approach to maturing endpoint security Recorded: Jun 25 2020 30 mins
    Colin Hardy
    Colin Hardy, Head of Instrusions and Investigations of Talk Talk, will share their approach to maturing endpoint security; choosing the right solution, embracing automation and keeping pace with an ever-advancing threat landscape.
  • Why we opted for CrowdStrike's Falcon Complete and wider benefits Recorded: Jun 25 2020 28 mins
    Simon Davies
    Simon Davies, Information Security & Governance Manager of Dialog, will experience their wider findings findings and benefits they have achieved from Crowdstrike's Falcon Complete.
  • E Crime from the Front Line Recorded: Jun 25 2020 34 mins
    Josh Burgess
    Whist cyber incidents and compromises are now regularly making headline news, organizations are behind the curve more often than not! They typically are only responding and not predicting the next attack. If the attacker is always ahead of the target then how can you ever be in a winning position?

    Employing research and intelligence resources to better understand who the attacker is and how they operate will allow organizations to better understand their risk. The goal of this session is to understand the importance of knowing not just the specific attack but a larger perspective on the attacker performing it and the relativity to your own organization.
  • The state of cyber: Insights and perspectives from the CTO office Recorded: Jun 25 2020 30 mins
    Michael Sentonas
    The Cybersecurity landscape is ever evolving, but one thing remains constant: Cyber adversaries continue to be relentless and innovative in their attempts to find gaps in your organisations security and leverage them for their own gain. Join CrowdStrike’s CTO Michael Sentonas for the opening keynote of the CrowdStrike Forum as he guides us through the most recent trends and observations seen in cyber threat activity. Michael will share best practices for protecting sensitive information from global criminal groups and nation-states along with examples of successful cybersecurity strategies that are enabling organisations to gain the upper hand against adversaries.
  • Security Operation and Architecture Recorded: Jun 25 2020 62 mins
    Scott Jarkoff, Lead, Strategic Threat Advisory Group, CrowdStrike Asia Pacific & Japan Valerian Rossigneux, Sale Engineering
    This session will discuss how to effectively differentiate appropriate next-generation solutions to solve these pain points and provide proactive risk mitigation techniques in responding to a massive, destructive campaign.

    Part 1: Assaulting Asia: How eCrime and Nation State Threat Adversaries are Attacking Asia

    Part 2: Light at the End of the Threat Adversary Activity Tunnel

    Part 3: Falcon In Action
  • Unifying A Security Cloud Ecosystem Recorded: Jun 25 2020 63 mins
    Lee Dolsen, Melvin Tan, Karunanand Menon
    In this session, you will experience CrowdStrike trusted partner applications–Zscaler, Netskope and Okta, bringing their technologies to Falcon users to optimize their security stack, and provides real-time access to rich endpoint telemetry.
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: COVID-19 THREAT INTELLIGENCE BRIEFING
  • Live at: May 7 2020 5:00 pm
  • Presented by: Adam Meyers: Vice President of Intelligence
  • From:
Your email has been sent.
or close