Hi [[ session.user.profile.firstName ]]

The ever evolving Security Platform – Am I ready for tomorrow’s threat?

In the last 24 months, the security industry has seen a great deal of consolidation, disappearance and evolution. In a world where threats are changing by the day, how can you make sure you stay relevant and prepared? Join Zeki Turedi as he guides us through understanding the evolution of the security platform and examines what a security platform requires today, to deal with the modern cyber-attacks of tomorrow.

- Understand the true meaning behind the cyber buzz words.
- Look deeper into what new technologies can advance cyber detection and protection
- Have a better understanding on what is needed to protect your network from today’s and future threats
Recorded Jun 2 2020 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Zeki Turedi
Presentation preview: The ever evolving Security Platform – Am I ready for tomorrow’s threat?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Zero Trust - Myths & Realization Recorded: Nov 18 2020 19 mins
    Ronald Pool
    The sudden need to facilitate home working this year as a result of COVID-19 meant the corporate network expanded to wherever the user is based. The immediate requirement of basic business continuity resulted in security in many instances coming second on the priority list. Now, as we continue to embrace the new normal that the pandemic has driven and remote working is our safest physical environment it is critical that organisations consider their cyber safety as users work and collaborate from home.

    How do we know the users logged into company accounts are who they claim to be when they are working from anywhere? A Zero Trust architecture approach could be the best way to facilitate the most effective security posture for your business right now.The fundamental concept of Zero Trust is “don’t trust anybody or anything operating inside or outside your network at any time.” That sounds very pragmatic, but what are the options in this vast playing field full of different definitions?

    The Bigger Picture
    The technologies that support Zero Trust are moving into the mainstream.
    Ronald Pool (cybersecurity specialist, CrowdStrike) will present his broad knowledge of Zero Trust Security during this webinar. He will share his views on the basis of current techniques and provide concrete examples and case studies throughout the session.
    Whether you are a rookie or an advanced Zero Trust expert, this webinar is a must-watch for anyone interested in this popular topic.

    Join to hear about:

    ●A firm understanding of Zero-Trust
    ●Components of a Zero Trust Architecture
    ●Practical tips
  • Cybersecurity in the Time of COVID-19: Keys to Securing a Remote Workforce Recorded: Nov 16 2020 56 mins
    Adam Meyers: Senior Vice President of Intelligence, Mike Sentonas: Chief Technology Officer
    As the world works to prevent the spread of the COVID-19 virus, more and more companies are recommending remote work for employees. However, rapidly transitioning large groups of employees to a remote workforce model comes with several significant challenges to IT teams, the network, architectures and even suppliers. At the same time, cyber adversaries are not taking a holiday, and are displaying new tactics and techniques designed to exploit this growing wave of confusion and chaos.

    Join CrowdStrike experts for this important webcast: Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce. CrowdStrike cybersecurity experts are uniquely qualified to help organizations make this transition smoothly. First, the cloud-native CrowdStrike Falcon® platform and lightweight agent are ideally suited to supporting and securing remote workers. Second, since the beginning of the company, CrowdStrike has supported its own broad and widely dispersed workforce, giving us a deep institutional knowledge of how to do this securely and effectively.

    During this webcast, CrowdStrike experts will examine the keys to supporting and securing a remote workforce and offer tips on how to streamline your transition during this difficult time. The CrowdStrike Intelligence team will provide insights into how threat actors are taking advantage of the COVID-19 crisis to infiltrate organizations and achieve their nefarious objectives. You will also hear about some special, limited-time programs that CrowdStrike is initiating to help customers stay secure and agile as they make the transition to supporting remote workers.
  • Work Life 2020 - Israel Recorded: Nov 16 2020 19 mins
    Michael Sentonas - Crowdstrike, CTO
    Join Mike Sentonas, CTO of CrowdStrike, and find out how CrowdStrike is leading cybersecurity innovation by embracing the remote workforce.
    Learn all about the techniques and procedures that will keep your company secure during a challenging time.
  • Staying Ahead of Cyber Threats Anytime and Anywhere Recorded: Nov 10 2020 16 mins
    Toby Guthrie, Senior Sales Engineer, Australia & New Zealand, CrowdStrike
    Today’s cyber-landscape is the survival of the fastest. As the world continues to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector.

    This session will provide insights into some of CrowdStrike’s most eye-opening breach investigations of the past year, and outline the adversaries’ motivation, tactics, and techniques. We will address emerging best practices and priorities related to planning, readiness, and response.
  • Customer Case Study: Maersk Recorded: Nov 4 2020 30 mins
    Andy Powell
    Andy Powell CISO of Maersk, the shipping giant involved in around 20% of the word trade will share his experiences in how to develop a resilient global cyber security organisation across the globe using effective technologies and how making informed cyber security decisions can help avoid a worst case scenario.
  • IR NACH DER KRISE - HERAUSFORDERUNGEN AN DIE NEUE SICHERHEIT IM HOMEOFFICE Recorded: Oct 29 2020 62 mins
    Tobias Schubert: Sr. Sales Engineer, CrowdStrike
    Durch die durch das COVID-19-Virus verursachten globalen Umwälzungen mussten viele Unternehmen ihre Mitarbeiter auf das Home-Office-Modell umstellen. Dies stellt die IT-Sicherheit vieler Unternehmen vor eine große Herausforderung – bleibt die Bedrohung durch Cyberkriminelle doch unverändert hoch. Deshalb ist es gerade angesichts der großen Zahl von Remote-Benutzern unerlässlich, dass Ihr Unternehmen auf Cyberangriffe vorbereitet ist und Sicherheitsvorfälle erkennen, abwehren und beheben kann.

    In diesem Webcast erfahren Sie mehr über die aktuelle Lage und die Art der Angriffe und Angreifer, die von CrowdStrike aktuell beobachtet werden, und wie Sie die besonderen Herausforderungen an die Sicherheit, die sich bei der Umstellung auf das Home-Office-Modell ergeben, erfolgreich angehen können. Des Weiteren zeigen wir Ihnen, wie Sie Ihre Umgebung nach einem professionell geführten Angriff ohne Neuaufsetzen wiederherstellen und eine optimale Sicherheitslage aufbauen.
  • Cybersecurity in the Time of COVID-19: Keys to Securing a Remote Workforce Recorded: Oct 28 2020 56 mins
    Adam Meyers: Senior Vice President of Intelligence, Mike Sentonas: Chief Technology Officer
    As the world works to prevent the spread of the COVID-19 virus, more and more companies are recommending remote work for employees. However, rapidly transitioning large groups of employees to a remote workforce model comes with several significant challenges to IT teams, the network, architectures and even suppliers. At the same time, cyber adversaries are not taking a holiday, and are displaying new tactics and techniques designed to exploit this growing wave of confusion and chaos.

    Join CrowdStrike experts for this important webcast: Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce. CrowdStrike cybersecurity experts are uniquely qualified to help organizations make this transition smoothly. First, the cloud-native CrowdStrike Falcon® platform and lightweight agent are ideally suited to supporting and securing remote workers. Second, since the beginning of the company, CrowdStrike has supported its own broad and widely dispersed workforce, giving us a deep institutional knowledge of how to do this securely and effectively.

    During this webcast, CrowdStrike experts will examine the keys to supporting and securing a remote workforce and offer tips on how to streamline your transition during this difficult time. The CrowdStrike Intelligence team will provide insights into how threat actors are taking advantage of the COVID-19 crisis to infiltrate organizations and achieve their nefarious objectives. You will also hear about some special, limited-time programs that CrowdStrike is initiating to help customers stay secure and agile as they make the transition to supporting remote workers.
  • L'évolution du ransomware Recorded: Sep 15 2020 57 mins
    Christophe Viaud, Sales Engineer, Crowdstrike
    Les grandes entreprises sont plus à risque d'être visées par des demandes de rançons très élevées.
    En ces temps difficiles, les cybercriminels intensifient leurs attaques par ransomware dans l'espoir de profiter des entreprises au moment où elles sont le plus vulnérables. Ainsi, ils s'en prennent non seulement aux réseaux d'entreprise mais également à vos systèmes domestiques.Comme les pirates innovent sans cesse et à un rythme toujours plus rapide, il est clair que les tactiques des ransomwares déployées dans le cadre des campagnes menées par les cybercriminels et autres cyberpirates à la solde d'États-nations se font plus sophistiquées.
    Celui-ci aborde les sujets suivants:

    - L'évolution de la stratégie des ransomwares, auparavant déployés «au petit bonheur la chance», vers des attaques ciblées visant à obtenir des gains financiers plus importants
    - Les tactiques, techniques et procédures utilisées par les cybercriminels actuels et leur sophistication croissante
    - Le perfectionnement des attaques par ransomware,au-delà des simples e-mails de phishing et fenêtres pop-up de sites web
    - Les mesures à prendre pour bloquer la progression d'une attaque par ransomware
  • Demystifying Threat Intelligence Recorded: Sep 8 2020 61 mins
    Scott Jarkoff, Director, Strategic Threat Advisory Group for APJ
    Today’s security professionals recognize that threat intelligence is a critical component in their cyber toolkit, enabling them to proactively respond and pre-empt advanced threats. Yet many of these same professionals are having a difficult time understanding the array of threat intelligence solutions and how to best utilise them within their organisations.

    This webcast addresses these challenges and highlights the importance of leveraging threat intelligence as a critical part of an effective cybersecurity strategy.

    Join CrowdStrike’s Director, Strategic Threat Advisory Group for APJ, Scott Jarkoff, to learn how to get the most value out of threat intelligence by effectively applying it across your organization — from security operations to executive leadership.
  • SIMPLIFYING ENTERPRISE SECURITY WITH A UNIQUE CYBERSECURITY ECOSYSTEM Recorded: Aug 25 2020 54 mins
    Fernando Montenegro Principal Analyst, Information Security - 451 Research, Andy Horwitz VP, CrowdStrike Store
    Enterprises are finding their security readiness and flexibility tested as they respond to rapid changes in how customers and employees behave, buy and work. Many organizations have had to rethink their IT strategy and accelerate their digital transformation plans to adopt cloud-native technologies.

    As a cloud-delivered cybersecurity company, CrowdStrike has garnered unique experience in what it takes to build and secure customer environments at scale. The CrowdStrike® Store is a cybersecurity ecosystem of trusted applications that extends the power of the CrowdStrike Falcon® platform’s single-agent architecture and rich data telemetry to provide frictionless consumption of new security capabilities.

    The CrowdStrike Store offers a strategic choice of complementary vendors and capabilities that can be enabled at the click of a button. The Store offerings allow enterprises to simplify and optimize their security stack, making CrowdStrike the only true security platform rather than an add-on to an organization’s already complex security stack.

    Attend this session to learn:

    How the security market landscape is changing and the effect this is having on buying trends
    The key requirements that can help simplify a security buyer’s purchasing decisions
    What the CrowdStrike Store offers and how it is addressing security buyers’ concerns
    How the CrowdStrike platform leverages third-party apps to help address specific customer pain points
  • SIMPLIFYING ENTERPRISE SECURITY WITH A UNIQUE CYBERSECURITY ECOSYSTEM EMEA Recorded: Aug 25 2020 54 mins
    Fernando Montenegro Principal Analyst, Information Security - 451 Research, Andy Horwitz VP, CrowdStrike Store
    Enterprises are finding their security readiness and flexibility tested as they respond to rapid changes in how customers and employees behave, buy and work. Many organizations have had to rethink their IT strategy and accelerate their digital transformation plans to adopt cloud-native technologies.

    As a cloud-delivered cybersecurity company, CrowdStrike has garnered unique experience in what it takes to build and secure customer environments at scale. The CrowdStrike® Store is a cybersecurity ecosystem of trusted applications that extends the power of the CrowdStrike Falcon® platform’s single-agent architecture and rich data telemetry to provide frictionless consumption of new security capabilities.

    The CrowdStrike Store offers a strategic choice of complementary vendors and capabilities that can be enabled at the click of a button. The Store offerings allow enterprises to simplify and optimize their security stack, making CrowdStrike the only true security platform rather than an add-on to an organization’s already complex security stack.

    Attend this session to learn:

    How the security market landscape is changing and the effect this is having on buying trends
    The key requirements that can help simplify a security buyer’s purchasing decisions
    What the CrowdStrike Store offers and how it is addressing security buyers’ concerns
    How the CrowdStrike platform leverages third-party apps to help address specific customer pain points
  • Cybersecurity Unleashes Digital Transformation at ECI Recorded: Aug 13 2020 42 mins
    Brian Winters Chief Information Officer - ECI Software Solutions, Saxxon McCarty Director, Falcon Complete - CrowdStrike
    As organizations pivot to the cloud, and remote work moves from a novelty to the new reality, digital transformation is occurring more rapidly than ever. Join Brian Winters, CIO of ECI Software Solutions, and CrowdStrike’s Saxxon McCarty for an in-depth conversation centered on how ECi remains nimble and secure in this era of continuous change.

    In this session, Brian and Saxxon address these crucial topics:

    What IS the digital transformation? What is its effect on cybersecurity organizations?
    Why is it critical for organizations of all sizes to have a cybersecurity strategy that adapts rapidly?
    What strategy, products and services have helped ECI reduce the risk of a breach as it pivoted to the cloud and embraced remote work? How has partnering with CrowdStrike removed barriers?
    What trends and challenges are on the horizon that will drive the next wave of change? How is ECI adapting its cybersecurity strategy today to be ready for tomorrow’s business challenges?
  • Securing Cloud Workloads and Containers Recorded: Jul 16 2020 30 mins
    Jackie Castelli Director Products - CrowdStrike and Rachel Scobey Technical Marketing Manager - CrowdStrike
    As more and more organizations are moving to the cloud, private, public and hybrid cloud infrastructures are expanding rapidly. But that expansion also increases the attack surface and opens the door to new threat vectors, making securing cloud workloads a critical need.

    As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Join us to learn how the 100% cloud-native CrowdStrike Falcon® platform can make your cloud migration more secure by protecting cloud workloads and containers in a fast and easy way.

    Register and attend this session to:

    Find out what CrowdStrike has learned from securing its own cloud infrastructure
    Learn about CrowdStrike’s approach to securing cloud workloads
    Understand how the CrowdStrike® Falcon platform protects cloud workloads
    See a demo of how Falcon secures containers
  • Securing Cloud Workloads and Containers-EMEA Recorded: Jul 16 2020 30 mins
    Jackie Castelli Director Products - CrowdStrike and Rachel Scobey Technical Marketing Manager - CrowdStrike
    As more and more organizations are moving to the cloud, private, public and hybrid cloud infrastructures are expanding rapidly. But that expansion also increases the attack surface and opens the door to new threat vectors, making securing cloud workloads a critical need.

    As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Join us to learn how the 100% cloud-native CrowdStrike Falcon® platform can make your cloud migration more secure by protecting cloud workloads and containers in a fast and easy way.

    Register and attend this session to:

    Find out what CrowdStrike has learned from securing its own cloud infrastructure
    Learn about CrowdStrike’s approach to securing cloud workloads
    Understand how the CrowdStrike® Falcon platform protects cloud workloads
    See a demo of how Falcon secures containers
  • Perspectives on cybersecurity after the pandemic Recorded: Jul 16 2020 60 mins
    Ajay Kumar & Valerian Rossigneux
    The global lockdown to stem the spread of COVID-19 has created tremendous upheaval in our personal and professional lives. Some regions that were among the first hit and first to react to the outbreak are beginning to see past the current pandemic toward a return to “normal” — but what will that new “normal” look like?

    In this live webinar, our security experts will provide you with guidance on your security approach and cyber defences, particularly at this time, when circumstances require changes in the security posture of many organisations.

    - Incident response and proactive cyber defence services, Ajay Kumar, Regional Head - Services Sales, Asia

    - Endpoint and cloud workload protection capabilities, Valerian Rossigneux, Solution Architect Manager, CrowdStrike Asia

    - Q&A
  • Securing Cloud Workloads and Containers-APAC Recorded: Jul 16 2020 30 mins
    Jackie Castelli Director Products - CrowdStrike and Rachel Scobey Technical Marketing Manager - CrowdStrike
    As more and more organizations are moving to the cloud, private, public and hybrid cloud infrastructures are expanding rapidly. But that expansion also increases the attack surface and opens the door to new threat vectors, making securing cloud workloads a critical need.

    As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Join us to learn how the 100% cloud-native CrowdStrike Falcon® platform can make your cloud migration more secure by protecting cloud workloads and containers in a fast and easy way.

    Register and attend this session to:

    Find out what CrowdStrike has learned from securing its own cloud infrastructure
    Learn about CrowdStrike’s approach to securing cloud workloads
    Understand how the CrowdStrike® Falcon platform protects cloud workloads
    See a demo of how Falcon secures containers
  • Leadership in the new normal Recorded: Jul 14 2020 47 mins
    Shawn Henry, CrowdStrike President and CSO
    On Tuesday 14th July, 14:00 BST, the ISF will be joined by Shawn Henry, CrowdStrike President and CSO, and former FBI Executive Assistant Director.

    Shawn will discuss cybersecurity as an enterprise business risk and why strong leadership is critical in the face of a crisis. After over 30 years in Security, with 20 years of cybersecurity experience, Shawn has been personally involved in investigating and managing the response for some of the biggest cyber breaches in US history. Hear examples from the front lines of cyber incident response, key components of strong leadership during an incident, and effective strategies to manage a crisis.

    Throughout this webinar you will learn:

    •Why strong leadership is critical in the face of a crisis
    •The key components of strong leadership when faced with an incident
    •Stories from the front line of cyber incident response
    •Effective strategies in crisis management
  • THE EVOLUTION OF RANSOMWARE (AEST) Recorded: Jun 30 2020 58 mins
    Jason Rivera: Director of Strategic Threat Advisory Group. Josh Burgess: Lead Technical Strategic Advisor
    Threat Intelligence Observations for 2020 and Beyond
    The exponential growth of ransomware has made it a pervasive and constant threat to end users across the globe. Regardless of your business size, industry or location, preventing ransomware is critical to the health of your organization, both from a financial perspective as well as for your brand reputation.

    In this CrowdCast, you’ll hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

    Watch this webcast to learn about:

    - The ransomware cyber threat landscape
    - Using strategic, operational and tactical assessments to shine lights on points of exposure
    - How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • THE EVOLUTION OF RANSOMWARE (PDT) Recorded: Jun 25 2020 58 mins
    Jason Rivera: Director of Strategic Threat Advisory Group. Josh Burgess: Lead Technical Strategic Advisor
    Threat Intelligence Observations for 2020 and Beyond
    The exponential growth of ransomware has made it a pervasive and constant threat to end users across the globe. Regardless of your business size, industry or location, preventing ransomware is critical to the health of your organization, both from a financial perspective as well as for your brand reputation.

    In this CrowdCast, you’ll hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

    Watch this webcast to learn about:

    - The ransomware cyber threat landscape
    - Using strategic, operational and tactical assessments to shine lights on points of exposure
    - How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • Customer Case Study: Maersk Recorded: Jun 25 2020 31 mins
    Andy Powell
    Andy Powell CISO of Maersk, the shipping giant involved in around 20% of the word trade will share his experiences in how to develop a resilient global cyber security organisation across the globe using effective technologies and how making informed cyber security decisions can help avoid a worst case scenario.
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The ever evolving Security Platform – Am I ready for tomorrow’s threat?
  • Live at: Jun 2 2020 1:00 pm
  • Presented by: Zeki Turedi
  • From:
Your email has been sent.
or close