InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How To Protect, Detect and Mitigate Your IT Environments Against Cyber Crime

Presented by

Andrew Harris, Sr. Director, Public Sector Technology Strategy

About this talk

As evident from the recent Sunburst attack, dynamic IT environments and digital transformation initiatives are vulnerable to bad actors that use a variety of tactics, techniques and procedures (TTPs) to launch a highly targeted attack through traditional IT processes. Enterprises should focus on mitigating the most recent Sunburst post-exploit activities while also preparing to detect, mitigate and prevent future threats that use similar TTPs. In this CrowdCast, Andrew Harris, CrowdStrike’s Public Sector Technology Strategist will demonstrate how CrowdStrike Falcon detects and prevents: • The Sunburst attack and key learnings on Sunspot and other entry point malware • Lateral movement, including leveraging the use of service accounts • Golden SAML (Security Assertion Markup Language) credential dump of an Active Directory Federation Services (AD FS) server
CrowdStrike

CrowdStrike

36138 subscribers243 talks
Insightful, education and actionable content for security teams
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.
Related topics