Cybersecurity Risk for SMB - Defending Your Business From Big Threats [EMEA]
In a small or medium-sized business, you probably wear many different hats: VP of logistics one day, head of social media the next, and IT trouble-shooter the day after that.
Are you comfortable wearing the Chief Information Security Officer hat for your business?
Though most reporting on cyberattacks focuses on the impacts to large companies, the truth is that small businesses are not immune. eCrime groups know that small businesses rarely have the resources to defend themselves in the same way as large enterprises, which can make them lucrative targets for ransomware and cyber extortion.
The threats are real, and the days of protecting your organization with simple antivirus and a firewall aregone. What can you do when you lack a full staff of cybersecurity experts to defend your business?
In this webinar, CrowdStrike’s Patrick Magat will examine the cyber threats that target small businesses, sharing real-world examples plucked from the CrowdStrike case files. This will set the stage for a discussion of the building blocks of a successful cyber defence, and practical guidance for defending your business.
Join this webinar to learn about:
• Common cybersecurity misconceptions for small business
• Real-world case studies of cyber intrusions and what could have been done to stop them
• The basic structure of a successful cybersecurity program, including next-generation prevention, threat hunting, investigation and real-time response
• How small businesses are using managed services to see, stop and prevent determined attackers, skipping the burden of building and managing a program themselves
RecordedJul 15 202134 mins
Your place is confirmed, we'll send you email reminders
More than ever, organizations are grappling with how to secure cloud-native applications. Composed of a combination of containers, virtual machines, APIs and serverless functions, protecting these applications from development to runtime requires reworking the approach many organizations take toward security.
In a new survey from CrowdStrike and Enterprise Strategy Group (ESG), 88% of respondents said their cybersecurity program needs to evolve to secure their cloud-native applications and use of public cloud infrastructure, with many citing challenges around maintaining visibility and consistency across disparate environments.
Join ESG’s VP and Group Director of Cybersecurity Doug Cahill and CrowdStrike’s Cloud Security Product Marketing Leader David Puzas as they discuss:
• The cloud-native threat landscape and the need for an integrated defense-in-depth strategy
• Cloud-native security challenges and how maturity gaps result in inconsistency, misconfigurations and visibility gaps
71% of IT security professionals say that security stack integration complexity requires improvement. To get ahead of sophisticated adversaries and meet your organization’s digital transformation objectives, you need to transform your security with best-of-breed solutions that are seamlessly interoperable.
Learn about areas in your security that require modernization, key security team trends, critical frameworks and recommendations to get ahead of modern threats.
Join Vanson Bourne industry research experts and the CrowdStrike Store team as they discuss:
• Survey results reporting key findings in IT and security buying and implementation practices
• Common challenges faced by IT practitioners as they try to realize value from their security stack without negatively impacting the business
• Recommendations to transform and simplify your security stack to accelerate incident investigation and response
Cybercrime is rampant. The internet is full of shady forums, marketplaces and communities where bad actors congregate and underground digital economies thrive. Adversaries are out to steal your data, exploit your brand and scam your customers.
In this CrowdCast, we will take a close look into the growing cybercriminal underground and the illicit markets used by criminal actors that sell access to compromised systems, ransomware services, stolen data and much more.
Join CrowdStrike SVP of Intelligence Adam Meyers as he examines the growing threats, events and trends found on the cybercriminal underground. He will separate fact from fiction about the dark web, expose emerging techniques and tools, and discuss prominent adversaries and their activities.
Attend this webcast to:
• Gain deeper insight into the criminal ecosystem and learn how to prevent your organization from being victimized by adversaries and their affiliates
• Understand how criminal adversaries have expanded their ransomware activities and made them even more potent
• Gain insight on emerging tactics such as data extortion and data leak sites
• Learn about adversaries and their inventive tactics, techniques and tools
Angriffe mit Ransomware haben im Jahr 2020 exponentiell zugenommen und sind damit weltweit zur allgegenwärtigen und konstanten Bedrohung geworden. Unabhängig von Größe, Branche oder Standort: Die Abwehr von Ransomware ist für die Überlebensfähigkeit Ihrer Organisation entscheidend. Das gilt für Ihre Finanzen ebenso wie für Ihren guten Ruf. Internet-Kriminelle wollen von Opfern möglichst hohe Summen erbeuten und schrecken auch nicht vor Erpressung zurück. In jüngster Zeit verwischen allerdings die Grenzen zwischen bestimmten nationalstaatlichen Angreifern und kommerziell ausgerichteten Internet-Kriminellen zunehmend. Die bisher geltenden Regeln verlieren an Gültigkeit.
Erfahren Sie von CrowdStrikes Threat Intel Experten Jörg Schauff mehr über die jüngsten nationalstaatlichen und e-Crime-Angriffe, die sich gegen Finanzdienstleister weltweit richten. Des Weiteren stellen wir Ihnen Konzepte vor, die Sie für Ihr Unternehmen nutzen können, um wachsam zu bleiben und sich gegenüber den genannten Aktivitäten zu schützen.
Angesichts der jüngsten brisanten Datendiebstähle, bei denen Identitäten in hybriden Clouds und Lieferketten ausspioniert wurden, war das Thema „Zero Trust“ noch nie so aktuell wie heute. Und dies gilt nicht nur für große Unternehmen.Jeder kann gehackt werden und in jedem Netzwerk kann sich irgendwo ein Angreifer über ein privilegiertes Benutzerkonto eingenistet haben.
Doch wie können Sie Ihren Identitätsspeicher wirksam schützen, ohne dass sich Ihre Benutzer täglich fünf oder zehn Minuten lang gegenüber den Basissystemen authentifizieren müssen?
In diesem Webcast zeigt Ihnen unser Experte Sascha Dubbel, Sr. Sales Engineer Identity Protection & Zero Trust EMEA bei CrowdStrike, anhand von konkreten Fallbeispielen auf, wie Sie mit einer reibungslosen Umsetzung des Zero-Trust-Modells Ihre Sicherheitskosten und Risiken senken, Datendiebstähle verhindern und den ROI steigern. Des Weiteren wird er darauf eingehen, warum ein reibungsloses Zero Trust-Modellfür alleUnternehmen von Bedeutung ist und nicht nur globale Unternehmen betrifft.
Dr. Christoph Bausewein, Director & Counsel, Data Protection & Policy, CrowdStrike
Dieses Webinar befasst sich mit der Nutzung von Big-Data-Analysen als Cybersecurity-Instrument unter Einhaltung und Optimierung des Datenschutzes im Sinne der EU-Datenschutz-Grundverordnung (DSGVO) und anderen relevanten Datenschutzgesetzen. Teilnehmer lernen, wie cloud-native Big-Data-Technologien wirksam dazu beitragen, Bedrohungen zu erkennen, ihren Umfang zu ermitteln, Datendiebstähle zu verhindern und alle Beteiligten fundiert zu informieren, um einen hohen Datenschutz zu gewährleisten. Zudem erfahren Teilnehmer des Webinars, was CrowdStrike als Datenschutzpartner leistet.
Tobias Kilga, Head of Corporate Information Technology, MED-EL
From Antivirus to Endpoint Detection and Response. Tobias Kilga, Head of Corporate Information Technology at MED-EL, will share their experience of transitioning to a cloud delivered security solution and how CrowdStrike has supported his team to overcome the daily threat of cyberattacks to their business.
Steve Rogers, Enterprise Cloud, Infrastructure and Security Architect, Coventry University
Steve Rogers is an Enterprise Cloud, Infrastructure and Security Architect at Coventry University, a major higher education institution in the United Kingdom with over 29,000 students and campuses across Coventry, London, Scarborough China and Singapore. In this case study Steve will explain Coventry University’s journey to a world class security posture why securing the end point for both staff and students alike was critical path to security maturity for the organisation.
Adriyan Pavlykevych, CISO, Softserve | Michael Kropyva, InfoSec Associate Director - InfoSec, Softserve
Adriyan Pavlykevych (CISO at Softserve) and Michael Kropyva (InfoSec Associate Director, InfoSec at Softserve) will share an overview of the security challenges faced by the organisation, the goals for improving their security posture, the implementation journey and the benefits from the solutions that have been implemented.
Graziano Callegaro, IT Director, Generalfinance S.p.A.
Learn from this Italian banking company how they moved from legacy antivirus to a modern cybersecurity solution that provides them with 24/7 detection & response by experts, clear understanding after true positives, tailored reports, thorough support throughout and fast deployment.
Luke Davis, Security Operations at Entain, one of the worlds largest sports betting and gaming groups will discuss how Entain have moved to a SaaS first approach and how CrowdStrike have supported their journey Entain has matured as a business. Luke will also explain why and how CrowdStrike’s Falcon Platform was selected as the solution of choice.
Human ingenuity is driving cyber threat evolution, harnessing artificial intelligence and automation along with sharing knowledge and capabilities. Collaborations between adversary groups are creating an increase in professionalization across the networks of cyber adversaries. Members are learning from the outcomes of their attacks and the responses from their victims. Humans are very good at learning from others, what worked and what didn’t. The lines are blurring between threat actor groups, ideology and intent are no longer important distinguishing factors. If an attack style works and the technical resources are available, they will be used. In this presentation, we will explore this growing trend, the potential impacts for organizations and how they can prepare.
The views reflected in this article are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.
In this session, Ken will review the Security Detection challenges facing organisations and how these result in blind-spots that present cyber and operational risk. Ken will consider the implications of this for cyber defence teams and how changing trends in technology and customer processes can have both a positive and negative impact on Security Detection.
Ken will propose ideas for how organisations can build more flexible and comprehensive security detection foundations to meet the challenges of unknown, future cyber threats.
Your organisation uses new technologies to increase its productivity. Attackers use the latest technologies to improve their rate of success. But.. do you use new technologies to protect your organization?
With the deployment of new cloud technologies and most of the workforce still working remotely, the attack surface of many companies has increased significantly in the past year. This calls for a comprehensive security strategy that can protect all workloads, regardless of whether they are workstations, servers or cloud workloads. A zero-trust approach to protecting user data should be a given.
Hear from CrowdStrike’s Chief Product Officer Amol Kulkarni as he shares how a robust, integrated and wholesome security strategy can be implemented in your environment and how it can evolve to ensure your organization remains secure.
Andrew Harris (Sr. Director, Public Sector Technology Strategy), Phil Meneses (Regional Sales Engineer)
While companies have embraced more endpoint and multifactor authentication (MFA) solutions in their security architecture, they don’t always see incidents as they happen — especially those involving service accounts and lateral movement. Recent attacks targeting identity and supply chain automation have made it clear that the next level of preparedness and risk mitigation must include reviewing and strengthening identity security tools.
“Defense in depth” means finding the right controls from the endpoint all the way to the domain controller, but most security stacks are missing identity controls beyond an MFA checkbox. In addition, Golden SAML attacks such as those seen in Sunburst show that MFA isn’t a silver bullet, either. Good security requires not only automated responses to threats as they arise, but also deterministic threat detection (i.e., signature matching) and behavior anomaly detection (i.e., user/credential live actions). Our experts will demonstrate CrowdStrike Falcon® identity protection products that achieve both.
Demo 1: Falcon Identity Threat Detection
• Insights and analytics across your enterprise
• Seeing live threats and events as they happen — no logs!
• Threat hunting: can it be the “easy” button?
Demo 2: Falcon Zero Trust
• Seeing Zero Trust policy challenges against live events
• Integrating with MFA and SSO to extend the reach of each into legacy and the cloud alike
• Adding security without making employees miserable
James Yeager (CrowdStrike), Ajit Sancheti (CrowdStrike), Richard Wong (Frost & Sullivan)
The U.S. White House “Executive Order on Improving the Nation’s Cybersecurity” (EO), released May 12, has far-ranging and fast-moving implications for all industries — not just government agencies — and in particular prioritizes the application of Zero Trust.
In this CrowdCast tailored especially for cybersecurity leaders, Zero Trust experts examine and explain the EO, including its Zero Trust mandate and what it means for both government and non-government organizations.
After viewing this webcast security leaders will understand:
• How the EO impacts all industries (including those based outside the U.S.)
• The critical deadlines the EO imposes
• What technologies are required to meet the Zero Trust mandate
• How to approach the Zero Trust mandate in a manageable, phased manner
• How non-government organizations benefit from this guidance
• Mr. James Yeager, VP of Public Sector & Healthcare (CrowdStrike)
• Mr. Ajit Sancheti, VP of Identity Protection
• Mr. Richard Wong, SVP, Global Head of Security Market Advisory, Frost & Sullivan
• Moderated by: Mr. Kapil Raina, VP Zero Trust & Identity Marketing
Michael Sentonas (Chief Technology Officer), Andrew Munchbach (Vice President of Sales Engineering)
MITRE Engenuity’s ATT&CK Evaluation program represents one of the industry’s most in-depth assessments of how endpoint protection solutions behave when subjected to complex, real-world threats. MITRE Engenuity shares a wealth of data on performance of nearly 30 vendors, but how should we make sense of it all? More importantly, how do security teams find and use this data to stop intrusions before they become a breach?
Join CrowdStrike CTO Michael Sentonas and VP of Sales Engineering Andrew Munchbach for a walkthrough of the evaluation, with firsthand insights from the team who executed it. Michael and Andrew will provide an in-depth overview of MITRE’s Round 3 evaluation, what it says about the EDR market, and what it means for the CrowdStrike Falcon platform.
Join this call to learn more about:
• What the MITRE ATT&CK Evaluation is, and what it can tell us about modern EDR solutions
• What a Falcon analyst would experience when faced with an attack like the simulated intrusion by CARBON SPIDER (Carbanak)
• How we should interpret the results of ATT&CK Evaluation Round 3, and what important insights we can take away
• The key capabilities that are most critical for protecting against similar adversary tradecraft today and tomorrow
Mit der steigenden Nachfrage nach Cloud-Technologien gewinnt auch die Frage immer mehr an Bedeutung, wie sich diese effizient vor feindlichen Zugriffen schützen lassen.
In diesem Webcast gehen wir dieser Frage auf den Grund und sprechen über die Herausforderungen, die die Cloud-Transformation mit sich bringt. Erfahren Sie, wie Sie den Überblick über sämtliche Workloads behalten können, um Angriffe sowie Fehlkonfigurationen früh zu erkennen, aufzuhalten bzw. zu berichtigen und anschließend zu untersuchen. Lernen Sie weiterhin, wie sich Cloud-Infrastrukturen in die bestehende Infrastruktur integrieren lassen und wie CrowdStrike Sie und ihr Team dabei unterstützen kann.
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.