Hi [[ session.user.profile.firstName ]]

Cybersecurity Risk for SMB - Defending Your Business From Big Threats [EMEA]

In a small or medium-sized business, you probably wear many different hats: VP of logistics one day, head of social media the next, and IT trouble-shooter the day after that.

Are you comfortable wearing the Chief Information Security Officer hat for your business?

Though most reporting on cyberattacks focuses on the impacts to large companies, the truth is that small businesses are not immune. eCrime groups know that small businesses rarely have the resources to defend themselves in the same way as large enterprises, which can make them lucrative targets for ransomware and cyber extortion.

The threats are real, and the days of protecting your organization with simple antivirus and a firewall aregone. What can you do when you lack a full staff of cybersecurity experts to defend your business?

In this webinar, CrowdStrike’s Patrick Magat will examine the cyber threats that target small businesses, sharing real-world examples plucked from the CrowdStrike case files. This will set the stage for a discussion of the building blocks of a successful cyber defence, and practical guidance for defending your business.

Join this webinar to learn about:
• Common cybersecurity misconceptions for small business
• Real-world case studies of cyber intrusions and what could have been done to stop them
• The basic structure of a successful cybersecurity program, including next-generation prevention, threat hunting, investigation and real-time response
• How small businesses are using managed services to see, stop and prevent determined attackers, skipping the burden of building and managing a program themselves
Recorded Jul 15 2021 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Patrick Magat, Services Director (EMEA), CrowdStrike
Presentation preview: Cybersecurity Risk for SMB - Defending Your Business From Big Threats [EMEA]

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 360 degree Threat Landscape with CrowdStrike Nov 9 2021 9:00 am UTC 44 mins
    Derek Buchanan, Strategical Threat Advisor EMEA
    Join Derek Buchanan, Threat Intel Expert at CrowdStrike, as he conducts a deep dive of the observations seen in CrowdStrike’s Threat Intel team in the second half of 2021. This session will go into depth on nation-states and e-crime adversaries and provide defensive and strategic considerations in combatting threats. He will divulge some of the key trends and behaviours seen across Threat Actor activity over the last six months and provide tips and tricks on how to protect your enterprise.


    Derek leads the Crowdstrike Threat Advisory Group for EMEA. He is a well-seasoned cyber threat intelligence expert with over 14+ years’ experience. Having worked within the public and private sector, Derek has vast experience in security operations, Incident response, threat hunting and digital risk monitoring.
  • Proaktive Abwehr von Gegnern & Was Sie Darüber Wissen Sollten Oct 26 2021 9:00 am UTC 52 mins
    Jörg Schauff, Threat Intel Advisor
    Sie wollen Gegner proaktiv abwehren können, die Ihr Geschäft ins Visier nehmen, aber Ihnen fehlt der Durchblick bei der Vielzahl von Lösungen zur Bedrohungsaufklärung?

    Damit stehen Sie nicht alleine da. Sicherheitsexperten wissen um die Bedeutung der Bedrohungsaufklärung als entscheidende Komponente in ihrem Cyber-Toolkit. Sie ermöglicht es ihnen, proaktiv zu agieren und Bedrohungen abzuwehren. Dennoch fällt es ihnen schwer, den Überblick über die diversen Angebote zur Bedrohungsaufklärung zu behalten und zu entscheiden, welche Lösungen sinnvollerweise im eigenen Unternehmen eingesetzt werden sollten.

    In diesem Webcast befassen wir uns mit den genannten Herausforderungen und verdeutlichen die Bedeutung einer fundierten Bedrohungsaufklärung als entscheidender Teil einer wirksamen Cyber-Sicherheitsstrategie.

    Erfahren Sie, wie Sie den größtmöglichen Nutzen aus den Erkenntnissen der Bedrohungsaufklärung ziehen, indem Sie diese Informationen im gesamten Unternehmen optimal anwenden.In diesem Webcast erzählen wir Ihnen u. a. mehr über:

    • Kernkomponenten der Bedrohungsaufklärung
    • Sinnvolle Ziele der Bedrohungsaufklärung
    • Die Nutzung der Bedrohungsaufklärung für Verteidigungsplattformen, Security Operations Center (SOC), Schwachstellenmanagement, Bedrohungssuche und Incident Response
    • Unterstützung von Entscheidungen zur Cybersicherheit auf Führungsebene
    • Integration der Bedrohungsaufklärung in den Endgeräteschutz, um die Aufklärung von Vorfällen zu beschleunigen, den Ermittlungsprozess zu rationalisieren und die Gefahrenabwehr zu verbessern
  • The Maturation of Cloud-Native Security Recorded: Oct 21 2021 55 mins
    David Puzas (Product Marketing Leader, CrowdStrike), Doug Cahill (VP/Group Director, Cybersecurity — ESG)
    More than ever, organizations are grappling with how to secure cloud-native applications. Composed of a combination of containers, virtual machines, APIs and serverless functions, protecting these applications from development to runtime requires reworking the approach many organizations take toward security.

    In a new survey from CrowdStrike and Enterprise Strategy Group (ESG), 88% of respondents said their cybersecurity program needs to evolve to secure their cloud-native applications and use of public cloud infrastructure, with many citing challenges around maintaining visibility and consistency across disparate environments.

    Join ESG’s VP and Group Director of Cybersecurity Doug Cahill and CrowdStrike’s Cloud Security Product Marketing Leader David Puzas as they discuss:
    • The cloud-native threat landscape and the need for an integrated defense-in-depth strategy
    • Cloud-native security challenges and how maturity gaps result in inconsistency, misconfigurations and visibility gaps
  • See and Stop Lateral Movement with Illumio Recorded: Oct 20 2021 44 mins
    Katey Wood, Dir. Product Marketing (Illumio); Christian Rencken, Strategic Threat Advisor & Global Tech Lead (CrowdStrike)
    Once a single endpoint is compromised, attackers move laterally to ransom other endpoints or even reach higher value targets, turning an attack on a single endpoint into a huge breach. This lateral movement is the secret ingredient of successful ransomware attacks.

    CrowdStrike’s unified endpoint protection stops nearly every attack, but we must expand defense-in-depth with a Zero Trust approach. This helps proactively prevent attacker lateral movement and the spread of ransomware. What’s more, with the rise of remote work, IT has even less visibility and control of assets off the corporate network.

    Learn how to quickly understand traffic hitting endpoints or see potential attacker lateral movement, as well as how default containment of malware with Zero Trust for the endpoint can help ensure the first endpoint infected is the last, by stopping the spread of attacks and ransomware.

    Watch this session to:
    • Understand more about the lateral movement exhibited by ransomware that drives high-profile breaches.
    • See and understand potential lateral movement–or legitimate business traffic—and use this security visibility to address attacks or better understand business needs by allow-listing a truly legitimate, necessary service.
    • Learn how the CrowdStrike Falcon agent now calls on Illumio’s endpoint Zero Trust for threat containment to limit the cyber risk associated with major attacks.
  • Strengthen your Security Against Ransomware eCrime Actors Recorded: Oct 18 2021 42 mins
    Derek Buchanan
    Ransomware attacks are a lucrative business for threat actors. These attacks create chaos to organisations, and cause a rippling effect to their customers, or even worse, critical infrastructure or supply chains. Let’s unite to study these adversaries, their tactics, and learn from front line responders how you can best defend, respond, and recover from a ransomware attack.
    Please join CrowdStrike to deep-dive into active and notorious eCrime actors in the Ransomware space CrowdStrike tracks as Wizard Spider, Carbon Spider, and Pinchy Spider.
  • Threats & Risks to the Technological Landscape Recorded: Oct 18 2021 42 mins
    Derek Buchanan
    Technology drives nearly every aspect of business and society. Love it or hate it, its rapid adoption is here to stay. As adversaries use an ever expanding tool chest of tactics, techniques and procedures (TTPs) with growing sophistication dynamic IT environments are increasingly vulnerable to bad actors. Join Crowdstrike for a deep-drive of the adversaries targeting the technology sector and learn how to leverage threat intelligence as as a critical part of your cyber security strategy.

    Hear from Derek Buchanan, EMEA Threat Intel Advisor, as he discusses the e-crime attacks targeting the Technology industry.

    Topics will include:

    The threat landscape in the Technology Industry
    Guidance for securing the uniquely dynamic IT environments in this sector
    How to mitigate against the latest attacks
  • Supercharge Your Security Transformation Recorded: Oct 6 2021 49 mins
    Janani Nagarajan (Director, Product Marketing, CrowdStrike), Pippa Thirkettle (Senior Research Manager, Vanson Bourne)
    71% of IT security professionals say that security stack integration complexity requires improvement. To get ahead of sophisticated adversaries and meet your organization’s digital transformation objectives, you need to transform your security with best-of-breed solutions that are seamlessly interoperable.

    Learn about areas in your security that require modernization, key security team trends, critical frameworks and recommendations to get ahead of modern threats.

    Join Vanson Bourne industry research experts and the CrowdStrike Store team as they discuss:
    • Survey results reporting key findings in IT and security buying and implementation practices
    • Common challenges faced by IT practitioners as they try to realize value from their security stack without negatively impacting the business
    • Recommendations to transform and simplify your security stack to accelerate incident investigation and response

    Speakers:
    • Janani Nagarajan, Director, Product Marketing, CrowdStrike
    • Pippa Thirkettle, Senior Research Manager, Vanson Bourne
  • The CyberCriminal Underground: Shining a Light on the Dark Web Recorded: Oct 1 2021 45 mins
    Adam Meyers, SVP, Intelligence
    Cybercrime is rampant. The internet is full of shady forums, marketplaces and communities where bad actors congregate and underground digital economies thrive. Adversaries are out to steal your data, exploit your brand and scam your customers.

    In this CrowdCast, we will take a close look into the growing cybercriminal underground and the illicit markets used by criminal actors that sell access to compromised systems, ransomware services, stolen data and much more.

    Join CrowdStrike SVP of Intelligence Adam Meyers as he examines the growing threats, events and trends found on the cybercriminal underground. He will separate fact from fiction about the dark web, expose emerging techniques and tools, and discuss prominent adversaries and their activities.

    Attend this webcast to:
    • Gain deeper insight into the criminal ecosystem and learn how to prevent your organization from being victimized by adversaries and their affiliates
    • Understand how criminal adversaries have expanded their ransomware activities and made them even more potent
    • Gain insight on emerging tactics such as data extortion and data leak sites
    • Learn about adversaries and their inventive tactics, techniques and tools
  • So Bleiben Sie Gegenüber Ecrime-Aktivitäten Im Finanzwesen Wachsam Recorded: Sep 30 2021 63 mins
    Jörg Schauff, Strategic Threat Advisor (EMEA)
    Angriffe mit Ransomware haben im Jahr 2020 exponentiell zugenommen und sind damit weltweit zur allgegenwärtigen und konstanten Bedrohung geworden. Unabhängig von Größe, Branche oder Standort: Die Abwehr von Ransomware ist für die Überlebensfähigkeit Ihrer Organisation entscheidend. Das gilt für Ihre Finanzen ebenso wie für Ihren guten Ruf. Internet-Kriminelle wollen von Opfern möglichst hohe Summen erbeuten und schrecken auch nicht vor Erpressung zurück. In jüngster Zeit verwischen allerdings die Grenzen zwischen bestimmten nationalstaatlichen Angreifern und kommerziell ausgerichteten Internet-Kriminellen zunehmend. Die bisher geltenden Regeln verlieren an Gültigkeit.

    Erfahren Sie von CrowdStrikes Threat Intel Experten Jörg Schauff mehr über die jüngsten nationalstaatlichen und e-Crime-Angriffe, die sich gegen Finanzdienstleister weltweit richten. Des Weiteren stellen wir Ihnen Konzepte vor, die Sie für Ihr Unternehmen nutzen können, um wachsam zu bleiben und sich gegenüber den genannten Aktivitäten zu schützen.
  • Zero Trust-Modelle ohne reibungsverluste Umsetzen - so geht's Recorded: Sep 23 2021 56 mins
    Sascha Dubbel, Sr. Sales Engineer Identity Protection & Zero Trust EMEA
    Angesichts der jüngsten brisanten Datendiebstähle, bei denen Identitäten in hybriden Clouds und Lieferketten ausspioniert wurden, war das Thema „Zero Trust“ noch nie so aktuell wie heute. Und dies gilt nicht nur für große Unternehmen.Jeder kann gehackt werden und in jedem Netzwerk kann sich irgendwo ein Angreifer über ein privilegiertes Benutzerkonto eingenistet haben.

    Doch wie können Sie Ihren Identitätsspeicher wirksam schützen, ohne dass sich Ihre Benutzer täglich fünf oder zehn Minuten lang gegenüber den Basissystemen authentifizieren müssen?

    In diesem Webcast zeigt Ihnen unser Experte Sascha Dubbel, Sr. Sales Engineer Identity Protection & Zero Trust EMEA bei CrowdStrike, anhand von konkreten Fallbeispielen auf, wie Sie mit einer reibungslosen Umsetzung des Zero-Trust-Modells Ihre Sicherheitskosten und Risiken senken, Datendiebstähle verhindern und den ROI steigern. Des Weiteren wird er darauf eingehen, warum ein reibungsloses Zero Trust-Modellfür alleUnternehmen von Bedeutung ist und nicht nur globale Unternehmen betrifft.
  • Wie Big Data den Datenschutz verbessert Recorded: Sep 16 2021 24 mins
    Dr. Christoph Bausewein, Director & Counsel, Data Protection & Policy, CrowdStrike
    Dieses Webinar befasst sich mit der Nutzung von Big-Data-Analysen als Cybersecurity-Instrument unter Einhaltung und Optimierung des Datenschutzes im Sinne der EU-Datenschutz-Grundverordnung (DSGVO) und anderen relevanten Datenschutzgesetzen. Teilnehmer lernen, wie cloud-native Big-Data-Technologien wirksam dazu beitragen, Bedrohungen zu erkennen, ihren Umfang zu ermitteln, Datendiebstähle zu verhindern und alle Beteiligten fundiert zu informieren, um einen hohen Datenschutz zu gewährleisten. Zudem erfahren Teilnehmer des Webinars, was CrowdStrike als Datenschutzpartner leistet.
  • Keynote: Adam Meyers Recorded: Sep 14 2021 26 mins
    Adam Meyers, Senior Vice President of intelligence, CrowdStrike
    Adam Meyers, Senior Vice President of intelligence at CrowdStrike, discusses how organisations can protect themselves from the next wave of cyber adversaries by presenting the EMEA Threat Landscape.
  • Customer Case Study: Med-el Recorded: Sep 14 2021 22 mins
    Tobias Kilga, Head of Corporate Information Technology, MED-EL
    From Antivirus to Endpoint Detection and Response. Tobias Kilga, Head of Corporate Information Technology at MED-EL, will share their experience of transitioning to a cloud delivered security solution and how CrowdStrike has supported his team to overcome the daily threat of cyberattacks to their business.
  • Customer Case Study: Coventry University Recorded: Sep 14 2021 35 mins
    Steve Rogers, Enterprise Cloud, Infrastructure and Security Architect, Coventry University
    Steve Rogers is an Enterprise Cloud, Infrastructure and Security Architect at Coventry University, a major higher education institution in the United Kingdom with over 29,000 students and campuses across Coventry, London, Scarborough China and Singapore. In this case study Steve will explain Coventry University’s journey to a world class security posture why securing the end point for both staff and students alike was critical path to security maturity for the organisation.
  • Customer Case Study: Softserve Recorded: Sep 14 2021 18 mins
    Adriyan Pavlykevych, CISO, Softserve | Michael Kropyva, InfoSec Associate Director - InfoSec, Softserve
    Adriyan Pavlykevych (CISO at Softserve) and Michael Kropyva (InfoSec Associate Director, InfoSec at Softserve) will share an overview of the security challenges faced by the organisation, the goals for improving their security posture, the implementation journey and the benefits from the solutions that have been implemented.
  • Customer Case Study: General Finance Recorded: Sep 14 2021 23 mins
    Graziano Callegaro, IT Director, Generalfinance S.p.A.
    Learn from this Italian banking company how they moved from legacy antivirus to a modern cybersecurity solution that provides them with 24/7 detection & response by experts, clear understanding after true positives, tailored reports, thorough support throughout and fast deployment.
  • Customer Case Study: Entain Group Recorded: Sep 14 2021 19 mins
    Luke Davis, Security Operations, Entain
    Luke Davis, Security Operations at Entain, one of the worlds largest sports betting and gaming groups will discuss how Entain have moved to a SaaS first approach and how CrowdStrike have supported their journey Entain has matured as a business. Luke will also explain why and how CrowdStrike’s Falcon Platform was selected as the solution of choice.
  • Customer Case Study: Randstad Recorded: Sep 14 2021 26 mins
    Martijn Nykerk, Global CISO, Randstad
    Martijn Nykerk, Global CISO at Randstad, will deliver a case study on their experience in transitioning to CrowdStrike, reviewing how they selected, implemented and deployed the solution.
  • Alliance Case Study: EY Recorded: Sep 14 2021 31 mins
    Leanne Salisbury, Senior Manager, Cybersecurity | Bence Hovarth, Director, Technology Consulting - Cybersecurity
    Human ingenuity is driving cyber threat evolution, harnessing artificial intelligence and automation along with sharing knowledge and capabilities. Collaborations between adversary groups are creating an increase in professionalization across the networks of cyber adversaries. Members are learning from the outcomes of their attacks and the responses from their victims. Humans are very good at learning from others, what worked and what didn’t. The lines are blurring between threat actor groups, ideology and intent are no longer important distinguishing factors. If an attack style works and the technical resources are available, they will be used. In this presentation, we will explore this growing trend, the potential impacts for organizations and how they can prepare.

    The views reflected in this article are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.
  • Security Detection - Preparing for the Unknown Recorded: Sep 14 2021 32 mins
    Ken Greene, Strategic Alliances Director, Humio
    In this session, Ken will review the Security Detection challenges facing organisations and how these result in blind-spots that present cyber and operational risk. Ken will consider the implications of this for cyber defence teams and how changing trends in technology and customer processes can have both a positive and negative impact on Security Detection.

    Ken will propose ideas for how organisations can build more flexible and comprehensive security detection foundations to meet the challenges of unknown, future cyber threats.
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity Risk for SMB - Defending Your Business From Big Threats [EMEA]
  • Live at: Jul 15 2021 9:00 am
  • Presented by: Patrick Magat, Services Director (EMEA), CrowdStrike
  • From:
Your email has been sent.
or close