Hi [[ session.user.profile.firstName ]]

See More, Know More, Do More with Cloud Security Posture Management

Security teams must keep pace with the speed of agile software development and they need the ability to continuously manage cloud risk. To do so they must have the ability to proactively assess and monitor cloud resource configuration and security policy, and compliance enforcement without impacting business performance. Join us to learn how Falcon Horizon streamlines cloud security posture management across the application development lifecycle for multi-cloud environments, enabling you to securely deploy applications in the cloud with greater speed and efficiency.
Recorded Feb 9 2021 20 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Anand Visvanathan: Product Management Leader, CrowdStrike Arlene Watson: Director of Engineering, CrowdStrike
Presentation preview: See More, Know More, Do More with Cloud Security Posture Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Bringing a Zero Trust Approach to Enterprise Digital Transformation Apr 8 2021 8:15 am UTC 45 mins
    Falcon Experience Zone
    When migrating workloads to the cloud, companies typically need to secure a mix of on-premises technology and multiple clouds, which are often poorly integrated. This creates a fragmented security architecture and makes it difficult to ensure that policies are followed consistency across different clouds. To build resilience as you develop a scalable cloud strategy, you need to take a zero trust approach to security. This session will focus on how a zero trust approach secures your cloud environments. It will emphasize:
    Ensuring that all resources are accessed securely, regardless of location,
    The principle of least privilege,
    The need to inspect and log all traffic.

    This session is presented by Ajit Sancheti, Vice President of Zero Trust, CrowdStrike.
  • Threat Hunting Workshop – Will you be the Hunter or the Hunted? Apr 8 2021 8:15 am UTC 45 mins
    Falcon Experience Zone
    Advanced threat hunting is now an essential part of a cybersecurity strategy. To build resilience and mitigate risk, pre-empting destructive attacks is more important than ever.

    Today’s threat hunting tools access vast amounts of data and analyze it in real time for signs of breaches.

    Learn the latest advanced adversary techniques and latest tradecraft. You will advance your threat hunting skills and methods and take your organization's ability to detect and hunt to the next level.

    Whether you are a SOC manager or a seasoned threat analyst, you will leave with an understanding of how top organizations are using threat hunting to proactively identify more threats, sooner, and you will return to your office armed with ideas for building and maturing your own threat hunting program.


    If you manage a security operations center; are a security analyst or incident responder; or threat hunter this immersive and interactive seminar will help you build a more mature proactive hunting program, and identify unknown, undetected threats before they become a mega-breach.

    This session is presented by:
    Scott Jarkoff, Director for Strategic Threat Advisory Group, APJ & EMEA, CrowdStrike
    Valerian Rossigneux, Sales Engineering Lead, CrowdStrike Asia & India
  • Implications of Revised Technology Risk Management Guidelines Apr 8 2021 8:15 am UTC 45 mins
    Falcon Experience Zone
    On 18 January 2021, the Monetary Authority of Singapore (MAS) released revised technology risk management (TRM) guidelines for financial institutions. During this session, we will discuss how the new guidelines impact people, processes and technology and how they can be implemented. The 2021 guidelines emphasise a need for:
    •Greater focus on third party risk management
    •Risk governance and oversight
    •DevSecOps and agile, and API development
    •Cyber threat intelligence, event monitoring and detection, and incident response and management.
    Expect these issues and more to be covered during this track.

    This session is presented by Drew Bagley, Vice President & Counsel, Privacy and Cyber Policy, CrowdStrike and Damien Pang, Deputy Chief FinTech Officer, Monetary Authority of Singapore.

    This session is moderated by Scott Flower (PhD), Global Intelligence Officer (APAC), FS-ISAC.
  • Security without Borders for Mission-Critical Resilience Apr 8 2021 6:00 am UTC 120 mins
    Main Session
    Join us for the Main Session of the CrowdStrike Asia Virtual Summit.

    This session is comprised of:
    - Welcome Message from Jagdish Mahapatra, Vice President, CrowdStrike Asia
    - Business Leaders in Dialogue: Leadership Vision in Cyber Security: Zero Trust - Taking Security Beyond the Perimeter
    - CIO Circle: Rethinking Security & Digital Risk Strategy
    - Resilience and Real-Time Protection with an Extensible, Platform-Based Security Strategy

    This session is presented by:
    Michael Sentonas, Global Chief Technology Officer, CrowdStrike
    Sherif El-Nabawi, Vice President, Sales Engineering, CrowdStrike APJ
    Jagdish Mahapatra, Vice President, CrowdStrike Asia
    Allan Tan, Group Editor-in-Chief, CXOCIETY
    Abid Adam, Chief Risk & Compliance Officer (GCRCO), Axiata Group
    Tithirat Siripattanalert, Chief Information Security Officer & Chief Data Officer, True Digital Group
    Anil Bhandari, Chief General Manager & Chief Information Security Officer, State Bank of India
    Baljinder Singh, Chief Information Officer, EXL Service
    P Ramakrishna, Chief Executive officer, CIO AcademyAsia
  • DEMYSTIFYING THREAT INTELIGENCE Recorded: Mar 4 2021 51 mins
    Jörg Schauff, Threat Intel Advisor

    Sie wollen Gegner proaktiv abwehren können, die Ihr Geschäft ins Visier nehmen, aber Ihnen fehlt der Durchblick bei der Vielzahl von Lösungen zur Bedrohungsaufklärung?

    Damit stehen Sie nicht alleine da. Sicherheitsexperten wissen um die Bedeutung der Bedrohungsaufklärung als entscheidende Komponente in ihrem Cyber-Toolkit. Sie ermöglicht es ihnen, proaktiv zu agieren und Bedrohungen abzuwehren. Dennoch fällt es ihnen schwer, den Überblick über die diversen Angebote zur Bedrohungsaufklärung zu behalten und zu entscheiden, welche Lösungen sinnvollerweise im eigenen Unternehmen eingesetzt werden sollten.

    In diesem Webcast befassen wir uns mit den genannten Herausforderungen und verdeutlichen die Bedeutung einer fundierten Bedrohungsaufklärung als entscheidender Teil einer wirksamen Cyber-Sicherheitsstrategie.

    Erfahren Sie, wie Sie den größtmöglichen Nutzen aus den Erkenntnissen der Bedrohungsaufklärung ziehen, indem Sie diese Informationen im gesamten Unternehmen optimal anwenden.In diesem Webcast erzählen wir Ihnen u. a. mehr über:

    - Kernkomponenten der Bedrohungsaufklärung
    - Sinnvolle Ziele der Bedrohungsaufklärung
    - Die Nutzung der Bedrohungsaufklärung für Verteidigungsplattformen, Security Operations Center (SOC), Schwachstellenmanagement, Bedrohungssuche und Incident Response
    - Unterstützung von Entscheidungen zur Cybersicherheit auf Führungsebene
    - Integration der Bedrohungsaufklärung in den Endgeräteschutz, um die Aufklärung von Vorfällen zu beschleunigen, den Ermittlungsprozess zu rationalisieren und die Gefahrenabwehr zu verbessern
    Jörg Schauff: Threat Intel Advisor & Tobias Schubert: Sr. Sales Engineer
    Neue Technologien ermöglichen es Cyber-Gegnern schneller denn je neue Malware zu entwickeln oder zu entarten. Um sich effizient vor jeder Art von Malware zu schützen ist es essentiell, zu verstehen, wie diese funktioniert. Eine Sandbox stellt eine geschützte Umgebung dar, diese Bedrohungen zu beobachten und zu analysieren.

    Im Auftakt unsere Threat-Intelligence Serie erfahren Sie:

    - Wie Sie Ihre Malware-Samples untersuchen können
    - Details über Anwendungsbeispiele
    - Wie Sie aus Ihren Ergebnissen IOC gewinnen
    - Mehr über die Vorzüge von TIPs
  • Tactics & Measures for Ransomware in AWS Recorded: Feb 10 2021 26 mins
    Spencer Gietzen: Cloud Security Researcher, CrowdStrike
    Traditional ransomware has become a popular tool for cybercriminals to make money and has cost a variety of industries hundreds of millions to billions of dollars in recent years. As trends change and corporations move from traditional data centers to cloud environments like AWS, GCP and Azure, adversaries are adapting their techniques to match the new climate. Because of this, attackers abusing cloud APIs rather than host/network-based commands are becoming more prevalent. This talk explores the services most likely to be targeted by ransomware in AWS Cloud, the techniques that attackers may use, and the preventative/detective measures that assist the blue team.
  • See More, Know More, Do More with Cloud Security Posture Management Recorded: Feb 9 2021 20 mins
    Anand Visvanathan: Product Management Leader, CrowdStrike Arlene Watson: Director of Engineering, CrowdStrike
    Security teams must keep pace with the speed of agile software development and they need the ability to continuously manage cloud risk. To do so they must have the ability to proactively assess and monitor cloud resource configuration and security policy, and compliance enforcement without impacting business performance. Join us to learn how Falcon Horizon streamlines cloud security posture management across the application development lifecycle for multi-cloud environments, enabling you to securely deploy applications in the cloud with greater speed and efficiency.
    Tobias Schubert: Sr. Sales Engineer, CrowdStrike
    Durch die durch das COVID-19-Virus verursachten globalen Umwälzungen mussten viele Unternehmen ihre Mitarbeiter auf das Home-Office-Modell umstellen. Dies stellt die IT-Sicherheit vieler Unternehmen vor eine große Herausforderung – bleibt die Bedrohung durch Cyberkriminelle doch unverändert hoch. Deshalb ist es gerade angesichts der großen Zahl von Remote-Benutzern unerlässlich, dass Ihr Unternehmen auf Cyberangriffe vorbereitet ist und Sicherheitsvorfälle erkennen, abwehren und beheben kann.

    In diesem Webcast erfahren Sie mehr über die aktuelle Lage und die Art der Angriffe und Angreifer, die von CrowdStrike aktuell beobachtet werden, und wie Sie die besonderen Herausforderungen an die Sicherheit, die sich bei der Umstellung auf das Home-Office-Modell ergeben, erfolgreich angehen können. Des Weiteren zeigen wir Ihnen, wie Sie Ihre Umgebung nach einem professionell geführten Angriff ohne Neuaufsetzen wiederherstellen und eine optimale Sicherheitslage aufbauen.
  • Perspectives on cybersecurity after the pandemic Recorded: Feb 3 2021 59 mins
    Ajay Kumar & Valerian Rossigneux
    The global lockdown to stem the spread of COVID-19 has created tremendous upheaval in our personal and professional lives. Some regions that were among the first hit and first to react to the outbreak are beginning to see past the current pandemic toward a return to “normal” — but what will that new “normal” look like?

    In this live webinar, our security experts will provide you with guidance on your security approach and cyber defences, particularly at this time, when circumstances require changes in the security posture of many organisations.

    - Incident response and proactive cyber defence services, Ajay Kumar, Regional Head - Services Sales, Asia

    - Endpoint and cloud workload protection capabilities, Valerian Rossigneux, Solution Architect Manager, CrowdStrike Asia

    - Q&A
    Ian McShane VP, Product Marketing - CrowdStrike
    Get insight into the current views of cybersecurity leaders around the world
    CrowdStrike has released its third annual survey report produced by independent research firm Vanson Bourne, which surveyed 2,200 senior IT decision-makers and IT security professionals across major industry sectors in 12 countries. The report reveals the current views of those in charge of their organization’s cybersecurity, and tracks how they see themselves are faring against sophisticated and pervasive cyberattacks.

    This timely survey comes on the heels of a rapid shift toward remote work and the acceleration of digital and security transformation. It provides a pulse check on the most concerning attack types that organizations are currently facing and their ability to effectively respond.

    Join CrowdStrike head of Product Marketing and former Gartner analyst Ian McShane for this informative webcast. He’ll dive into the results of the survey, compare results by country and year-over-year, and discuss the ramifications for your security going forward.

    Join this webcast to see how you stack up against your peers in areas such as:

    How organizations have adapted to a work-from-anywhere world
    The cyberattack types and motivations that are keeping your peers up at night
    The number of organizations that have suffered a ransomware attack and the percentage that paid ransoms
    How organizations are faring against the 1-10-60 benchmark for effective detection, investigation and remediation
  • CrowdStrike Services CyberFront Lines Report Recorded: Jan 28 2021 59 mins
    Tim Parisi Director, Incident Response Services – CrowdStrike, Paul Pratley Principal Consultant – CrowdStrike
    Incident Response and Proactive Services from 2020 and Insights That Matter for 2021

    In a year when a global pandemic has significantly changed how and where we work, our cybersecurity practices have had to evolve quickly in the face of adversity and in response to a continued increase in more sophisticated and targeted adversary attacks.

    This webcast, drawn from real-life engagements and presented by the experts who investigated them, focuses on the themes and trends observed across the global incidents the Services team responded to and remediated throughout 2020 — and what they mean for 2021.

    Join this webcast to learn about these key findings from the report:

    The volume of financially motivated attacks is staggering
    Intrusions are no longer a one-time event
    Shifting to a continuous monitoring and response approach changes the game
    Widespread remote work has broad-reaching effects on cybersecurity
    Cloud infrastructure requires special attention from defenders
    Organizations focused on driving key security enhancements can stop breaches
    You’ll gain greater insight into the front-line view of the digital battle and also get a pragmatic take on how to ensure your organization doesn’t become a statistic in next year’s report.
  • Building Security Best Practices with AWS and CrowdStrike Recorded: Jan 28 2021 22 mins
    Sameer Kumar Vasanthapuram: Partner Solutions Architect, AWS
    In this presentation, a partner solutions architect from Amazon Web Services (AWS), the world’s most comprehensive and broadly adopted cloud platform, will discuss the advantages of the cloud and use cases that power customers infrastructure to make them more agile and lower costs. You will also learn about the Shared Security Responsibility Model and in what areas AWS provides security of the cloud, and what customers are responsible for in the cloud. You will also learn where partners such as Crowdstrike can drive additional value-add to solve these customer challenges. Additionally, we will provide technical use cases on the various integrations Crowdstrike has on AWS to help drive enterprise customer adoption and speed their journey to the cloud.
  • THE EVOLUTION OF RANSOMWARE Recorded: Dec 17 2020 58 mins
    Jason Rivera: Director of Strategic Threat Advisory Group. Josh Burgess: Lead Technical Strategic Advisor
    Threat Intelligence Observations for 2020 and Beyond
    The exponential growth of ransomware has made it a pervasive and constant threat to end users across the globe. Regardless of your business size, industry or location, preventing ransomware is critical to the health of your organization, both from a financial perspective as well as for your brand reputation.

    In this CrowdCast, you’ll hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

    Watch this webcast to learn about:

    - The ransomware cyber threat landscape
    - Using strategic, operational and tactical assessments to shine lights on points of exposure
    - How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • The state of cyber: Insights and perspectives from the CTO office Recorded: Dec 15 2020 29 mins
    Michael Sentonas
    The Cybersecurity landscape is ever evolving, but one thing remains constant: Cyber adversaries continue to be relentless and innovative in their attempts to find gaps in your organisations security and leverage them for their own gain. Join CrowdStrike’s CTO Michael Sentonas for the opening keynote of the CrowdStrike Forum as he guides us through the most recent trends and observations seen in cyber threat activity. Michael will share best practices for protecting sensitive information from global criminal groups and nation-states along with examples of successful cybersecurity strategies that are enabling organisations to gain the upper hand against adversaries.
    Fernando Montenegro Principal Analyst, Information Security - 451 Research, Andy Horwitz VP, CrowdStrike Store
    Enterprises are finding their security readiness and flexibility tested as they respond to rapid changes in how customers and employees behave, buy and work. Many organizations have had to rethink their IT strategy and accelerate their digital transformation plans to adopt cloud-native technologies.

    As a cloud-delivered cybersecurity company, CrowdStrike has garnered unique experience in what it takes to build and secure customer environments at scale. The CrowdStrike® Store is a cybersecurity ecosystem of trusted applications that extends the power of the CrowdStrike Falcon® platform’s single-agent architecture and rich data telemetry to provide frictionless consumption of new security capabilities.

    The CrowdStrike Store offers a strategic choice of complementary vendors and capabilities that can be enabled at the click of a button. The Store offerings allow enterprises to simplify and optimize their security stack, making CrowdStrike the only true security platform rather than an add-on to an organization’s already complex security stack.

    Attend this session to learn:

    How the security market landscape is changing and the effect this is having on buying trends
    The key requirements that can help simplify a security buyer’s purchasing decisions
    What the CrowdStrike Store offers and how it is addressing security buyers’ concerns
    How the CrowdStrike platform leverages third-party apps to help address specific customer pain points
  • Zero Trust - Myths & Realization Recorded: Nov 18 2020 19 mins
    Ronald Pool
    The sudden need to facilitate home working this year as a result of COVID-19 meant the corporate network expanded to wherever the user is based. The immediate requirement of basic business continuity resulted in security in many instances coming second on the priority list. Now, as we continue to embrace the new normal that the pandemic has driven and remote working is our safest physical environment it is critical that organisations consider their cyber safety as users work and collaborate from home.

    How do we know the users logged into company accounts are who they claim to be when they are working from anywhere? A Zero Trust architecture approach could be the best way to facilitate the most effective security posture for your business right now.The fundamental concept of Zero Trust is “don’t trust anybody or anything operating inside or outside your network at any time.” That sounds very pragmatic, but what are the options in this vast playing field full of different definitions?

    The Bigger Picture
    The technologies that support Zero Trust are moving into the mainstream.
    Ronald Pool (cybersecurity specialist, CrowdStrike) will present his broad knowledge of Zero Trust Security during this webinar. He will share his views on the basis of current techniques and provide concrete examples and case studies throughout the session.
    Whether you are a rookie or an advanced Zero Trust expert, this webinar is a must-watch for anyone interested in this popular topic.

    Join to hear about:

    ●A firm understanding of Zero-Trust
    ●Components of a Zero Trust Architecture
    ●Practical tips
  • Cybersecurity in the Time of COVID-19: Keys to Securing a Remote Workforce Recorded: Nov 16 2020 56 mins
    Adam Meyers: Senior Vice President of Intelligence, Mike Sentonas: Chief Technology Officer
    As the world works to prevent the spread of the COVID-19 virus, more and more companies are recommending remote work for employees. However, rapidly transitioning large groups of employees to a remote workforce model comes with several significant challenges to IT teams, the network, architectures and even suppliers. At the same time, cyber adversaries are not taking a holiday, and are displaying new tactics and techniques designed to exploit this growing wave of confusion and chaos.

    Join CrowdStrike experts for this important webcast: Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce. CrowdStrike cybersecurity experts are uniquely qualified to help organizations make this transition smoothly. First, the cloud-native CrowdStrike Falcon® platform and lightweight agent are ideally suited to supporting and securing remote workers. Second, since the beginning of the company, CrowdStrike has supported its own broad and widely dispersed workforce, giving us a deep institutional knowledge of how to do this securely and effectively.

    During this webcast, CrowdStrike experts will examine the keys to supporting and securing a remote workforce and offer tips on how to streamline your transition during this difficult time. The CrowdStrike Intelligence team will provide insights into how threat actors are taking advantage of the COVID-19 crisis to infiltrate organizations and achieve their nefarious objectives. You will also hear about some special, limited-time programs that CrowdStrike is initiating to help customers stay secure and agile as they make the transition to supporting remote workers.
  • Work Life 2020 - Israel Recorded: Nov 16 2020 19 mins
    Michael Sentonas - Crowdstrike, CTO
    Join Mike Sentonas, CTO of CrowdStrike, and find out how CrowdStrike is leading cybersecurity innovation by embracing the remote workforce.
    Learn all about the techniques and procedures that will keep your company secure during a challenging time.
  • Staying Ahead of Cyber Threats Anytime and Anywhere Recorded: Nov 10 2020 16 mins
    Toby Guthrie, Senior Sales Engineer, Australia & New Zealand, CrowdStrike
    Today’s cyber-landscape is the survival of the fastest. As the world continues to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector.

    This session will provide insights into some of CrowdStrike’s most eye-opening breach investigations of the past year, and outline the adversaries’ motivation, tactics, and techniques. We will address emerging best practices and priorities related to planning, readiness, and response.
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: See More, Know More, Do More with Cloud Security Posture Management
  • Live at: Feb 9 2021 8:00 am
  • Presented by: Anand Visvanathan: Product Management Leader, CrowdStrike Arlene Watson: Director of Engineering, CrowdStrike
  • From:
Your email has been sent.
or close