Hi [[ session.user.profile.firstName ]]

Customer Case Study: Softserve

Adriyan Pavlykevych (CISO at Softserve) and Michael Kropyva (InfoSec Associate Director, InfoSec at Softserve) will share an overview of the security challenges faced by the organisation, the goals for improving their security posture, the implementation journey and the benefits from the solutions that have been implemented.
Recorded Aug 5 2021 18 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adriyan Pavlykevych, CISO, Softserve | Michael Kropyva, InfoSec Associate Director - InfoSec, Softserve
Presentation preview: Customer Case Study: Softserve

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Maturation of Cloud-Native Security Oct 21 2021 9:00 am UTC 55 mins
    David Puzas (Product Marketing Leader, CrowdStrike), Doug Cahill (VP/Group Director, Cybersecurity — ESG)
    More than ever, organizations are grappling with how to secure cloud-native applications. Composed of a combination of containers, virtual machines, APIs and serverless functions, protecting these applications from development to runtime requires reworking the approach many organizations take toward security.

    In a new survey from CrowdStrike and Enterprise Strategy Group (ESG), 88% of respondents said their cybersecurity program needs to evolve to secure their cloud-native applications and use of public cloud infrastructure, with many citing challenges around maintaining visibility and consistency across disparate environments.

    Join ESG’s VP and Group Director of Cybersecurity Doug Cahill and CrowdStrike’s Cloud Security Product Marketing Leader David Puzas as they discuss:
    • The cloud-native threat landscape and the need for an integrated defense-in-depth strategy
    • Cloud-native security challenges and how maturity gaps result in inconsistency, misconfigurations and visibility gaps
  • Supercharge Your Security Transformation Oct 6 2021 3:00 pm UTC 49 mins
    Janani Nagarajan (Director, Product Marketing, CrowdStrike), Pippa Thirkettle (Senior Research Manager, Vanson Bourne)
    71% of IT security professionals say that security stack integration complexity requires improvement. To get ahead of sophisticated adversaries and meet your organization’s digital transformation objectives, you need to transform your security with best-of-breed solutions that are seamlessly interoperable.

    Learn about areas in your security that require modernization, key security team trends, critical frameworks and recommendations to get ahead of modern threats.

    Join Vanson Bourne industry research experts and the CrowdStrike Store team as they discuss:
    • Survey results reporting key findings in IT and security buying and implementation practices
    • Common challenges faced by IT practitioners as they try to realize value from their security stack without negatively impacting the business
    • Recommendations to transform and simplify your security stack to accelerate incident investigation and response

    Speakers:
    • Janani Nagarajan, Director, Product Marketing, CrowdStrike
    • Pippa Thirkettle, Senior Research Manager, Vanson Bourne
  • The CyberCriminal Underground: Shining a Light on the Dark Web Oct 1 2021 3:00 pm UTC 45 mins
    Adam Meyers, SVP, Intelligence
    Cybercrime is rampant. The internet is full of shady forums, marketplaces and communities where bad actors congregate and underground digital economies thrive. Adversaries are out to steal your data, exploit your brand and scam your customers.

    In this CrowdCast, we will take a close look into the growing cybercriminal underground and the illicit markets used by criminal actors that sell access to compromised systems, ransomware services, stolen data and much more.

    Join CrowdStrike SVP of Intelligence Adam Meyers as he examines the growing threats, events and trends found on the cybercriminal underground. He will separate fact from fiction about the dark web, expose emerging techniques and tools, and discuss prominent adversaries and their activities.

    Attend this webcast to:
    • Gain deeper insight into the criminal ecosystem and learn how to prevent your organization from being victimized by adversaries and their affiliates
    • Understand how criminal adversaries have expanded their ransomware activities and made them even more potent
    • Gain insight on emerging tactics such as data extortion and data leak sites
    • Learn about adversaries and their inventive tactics, techniques and tools
  • So Bleiben Sie Gegenüber Ecrime-Aktivitäten Im Finanzwesen Wachsam Sep 30 2021 8:00 am UTC 63 mins
    Jörg Schauff, Strategic Threat Advisor (EMEA)
    Angriffe mit Ransomware haben im Jahr 2020 exponentiell zugenommen und sind damit weltweit zur allgegenwärtigen und konstanten Bedrohung geworden. Unabhängig von Größe, Branche oder Standort: Die Abwehr von Ransomware ist für die Überlebensfähigkeit Ihrer Organisation entscheidend. Das gilt für Ihre Finanzen ebenso wie für Ihren guten Ruf. Internet-Kriminelle wollen von Opfern möglichst hohe Summen erbeuten und schrecken auch nicht vor Erpressung zurück. In jüngster Zeit verwischen allerdings die Grenzen zwischen bestimmten nationalstaatlichen Angreifern und kommerziell ausgerichteten Internet-Kriminellen zunehmend. Die bisher geltenden Regeln verlieren an Gültigkeit.

    Erfahren Sie von CrowdStrikes Threat Intel Experten Jörg Schauff mehr über die jüngsten nationalstaatlichen und e-Crime-Angriffe, die sich gegen Finanzdienstleister weltweit richten. Des Weiteren stellen wir Ihnen Konzepte vor, die Sie für Ihr Unternehmen nutzen können, um wachsam zu bleiben und sich gegenüber den genannten Aktivitäten zu schützen.
  • Zero Trust-Modelle ohne reibungsverluste Umsetzen - so geht's Sep 23 2021 8:00 am UTC 56 mins
    Sascha Dubbel, Sr. Sales Engineer Identity Protection & Zero Trust EMEA
    Angesichts der jüngsten brisanten Datendiebstähle, bei denen Identitäten in hybriden Clouds und Lieferketten ausspioniert wurden, war das Thema „Zero Trust“ noch nie so aktuell wie heute. Und dies gilt nicht nur für große Unternehmen.Jeder kann gehackt werden und in jedem Netzwerk kann sich irgendwo ein Angreifer über ein privilegiertes Benutzerkonto eingenistet haben.

    Doch wie können Sie Ihren Identitätsspeicher wirksam schützen, ohne dass sich Ihre Benutzer täglich fünf oder zehn Minuten lang gegenüber den Basissystemen authentifizieren müssen?

    In diesem Webcast zeigt Ihnen unser Experte Sascha Dubbel, Sr. Sales Engineer Identity Protection & Zero Trust EMEA bei CrowdStrike, anhand von konkreten Fallbeispielen auf, wie Sie mit einer reibungslosen Umsetzung des Zero-Trust-Modells Ihre Sicherheitskosten und Risiken senken, Datendiebstähle verhindern und den ROI steigern. Des Weiteren wird er darauf eingehen, warum ein reibungsloses Zero Trust-Modellfür alleUnternehmen von Bedeutung ist und nicht nur globale Unternehmen betrifft.
  • Wie Big Data den Datenschutz verbessert Recorded: Sep 16 2021 24 mins
    Dr. Christoph Bausewein, Director & Counsel, Data Protection & Policy, CrowdStrike
    Dieses Webinar befasst sich mit der Nutzung von Big-Data-Analysen als Cybersecurity-Instrument unter Einhaltung und Optimierung des Datenschutzes im Sinne der EU-Datenschutz-Grundverordnung (DSGVO) und anderen relevanten Datenschutzgesetzen. Teilnehmer lernen, wie cloud-native Big-Data-Technologien wirksam dazu beitragen, Bedrohungen zu erkennen, ihren Umfang zu ermitteln, Datendiebstähle zu verhindern und alle Beteiligten fundiert zu informieren, um einen hohen Datenschutz zu gewährleisten. Zudem erfahren Teilnehmer des Webinars, was CrowdStrike als Datenschutzpartner leistet.
  • Keynote: Adam Meyers Recorded: Sep 14 2021 26 mins
    Adam Meyers, Senior Vice President of intelligence, CrowdStrike
    Adam Meyers, Senior Vice President of intelligence at CrowdStrike, discusses how organisations can protect themselves from the next wave of cyber adversaries by presenting the EMEA Threat Landscape.
  • Customer Case Study: Med-el Recorded: Sep 14 2021 22 mins
    Tobias Kilga, Head of Corporate Information Technology, MED-EL
    From Antivirus to Endpoint Detection and Response. Tobias Kilga, Head of Corporate Information Technology at MED-EL, will share their experience of transitioning to a cloud delivered security solution and how CrowdStrike has supported his team to overcome the daily threat of cyberattacks to their business.
  • Customer Case Study: Coventry University Recorded: Sep 14 2021 35 mins
    Steve Rogers, Enterprise Cloud, Infrastructure and Security Architect, Coventry University
    Steve Rogers is an Enterprise Cloud, Infrastructure and Security Architect at Coventry University, a major higher education institution in the United Kingdom with over 29,000 students and campuses across Coventry, London, Scarborough China and Singapore. In this case study Steve will explain Coventry University’s journey to a world class security posture why securing the end point for both staff and students alike was critical path to security maturity for the organisation.
  • Customer Case Study: Softserve Recorded: Sep 14 2021 18 mins
    Adriyan Pavlykevych, CISO, Softserve | Michael Kropyva, InfoSec Associate Director - InfoSec, Softserve
    Adriyan Pavlykevych (CISO at Softserve) and Michael Kropyva (InfoSec Associate Director, InfoSec at Softserve) will share an overview of the security challenges faced by the organisation, the goals for improving their security posture, the implementation journey and the benefits from the solutions that have been implemented.
  • Customer Case Study: General Finance Recorded: Sep 14 2021 23 mins
    Graziano Callegaro, IT Director, Generalfinance S.p.A.
    Learn from this Italian banking company how they moved from legacy antivirus to a modern cybersecurity solution that provides them with 24/7 detection & response by experts, clear understanding after true positives, tailored reports, thorough support throughout and fast deployment.
  • Customer Case Study: Entain Group Recorded: Sep 14 2021 19 mins
    Luke Davis, Security Operations, Entain
    Luke Davis, Security Operations at Entain, one of the worlds largest sports betting and gaming groups will discuss how Entain have moved to a SaaS first approach and how CrowdStrike have supported their journey Entain has matured as a business. Luke will also explain why and how CrowdStrike’s Falcon Platform was selected as the solution of choice.
  • Customer Case Study: Randstad Recorded: Sep 14 2021 26 mins
    Martijn Nykerk, Global CISO, Randstad
    Martijn Nykerk, Global CISO at Randstad, will deliver a case study on their experience in transitioning to CrowdStrike, reviewing how they selected, implemented and deployed the solution.
  • Alliance Case Study: EY Recorded: Sep 14 2021 31 mins
    Leanne Salisbury, Senior Manager, Cybersecurity | Bence Hovarth, Director, Technology Consulting - Cybersecurity
    Human ingenuity is driving cyber threat evolution, harnessing artificial intelligence and automation along with sharing knowledge and capabilities. Collaborations between adversary groups are creating an increase in professionalization across the networks of cyber adversaries. Members are learning from the outcomes of their attacks and the responses from their victims. Humans are very good at learning from others, what worked and what didn’t. The lines are blurring between threat actor groups, ideology and intent are no longer important distinguishing factors. If an attack style works and the technical resources are available, they will be used. In this presentation, we will explore this growing trend, the potential impacts for organizations and how they can prepare.

    The views reflected in this article are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.
  • Security Detection - Preparing for the Unknown Recorded: Sep 14 2021 32 mins
    Ken Greene, Strategic Alliances Director, Humio
    In this session, Ken will review the Security Detection challenges facing organisations and how these result in blind-spots that present cyber and operational risk. Ken will consider the implications of this for cyber defence teams and how changing trends in technology and customer processes can have both a positive and negative impact on Security Detection.

    Ken will propose ideas for how organisations can build more flexible and comprehensive security detection foundations to meet the challenges of unknown, future cyber threats.
  • Keynote: Amol Kurkami Recorded: Sep 14 2021 27 mins
    Amol Kulkarni, Chief Product Officer, CrowdStrike
    Your organisation uses new technologies to increase its productivity. Attackers use the latest technologies to improve their rate of success. But.. do you use new technologies to protect your organization?



    With the deployment of new cloud technologies and most of the workforce still working remotely, the attack surface of many companies has increased significantly in the past year. This calls for a comprehensive security strategy that can protect all workloads, regardless of whether they are workstations, servers or cloud workloads. A zero-trust approach to protecting user data should be a given.

    Hear from CrowdStrike’s Chief Product Officer Amol Kulkarni as he shares how a robust, integrated and wholesome security strategy can be implemented in your environment and how it can evolve to ensure your organization remains secure.
  • Identity Protection: A Key Element for Modern Threat Hunters Recorded: Sep 1 2021 34 mins
    Andrew Harris (Sr. Director, Public Sector Technology Strategy), Phil Meneses (Regional Sales Engineer)
    While companies have embraced more endpoint and multifactor authentication (MFA) solutions in their security architecture, they don’t always see incidents as they happen — especially those involving service accounts and lateral movement. Recent attacks targeting identity and supply chain automation have made it clear that the next level of preparedness and risk mitigation must include reviewing and strengthening identity security tools.

    “Defense in depth” means finding the right controls from the endpoint all the way to the domain controller, but most security stacks are missing identity controls beyond an MFA checkbox. In addition, Golden SAML attacks such as those seen in Sunburst show that MFA isn’t a silver bullet, either. Good security requires not only automated responses to threats as they arise, but also deterministic threat detection (i.e., signature matching) and behavior anomaly detection (i.e., user/credential live actions). Our experts will demonstrate CrowdStrike Falcon® identity protection products that achieve both.

    Demo 1: Falcon Identity Threat Detection
    • Insights and analytics across your enterprise
    • Seeing live threats and events as they happen — no logs!
    • Threat hunting: can it be the “easy” button?

    Demo 2: Falcon Zero Trust
    • Seeing Zero Trust policy challenges against live events
    • Integrating with MFA and SSO to extend the reach of each into legacy and the cloud alike
    • Adding security without making employees miserable
  • Understanding The United States’ Zero Trust Mandate Recorded: Aug 18 2021 54 mins
    James Yeager (CrowdStrike), Ajit Sancheti (CrowdStrike), Richard Wong (Frost & Sullivan)
    The U.S. White House “Executive Order on Improving the Nation’s Cybersecurity” (EO), released May 12, has far-ranging and fast-moving implications for all industries — not just government agencies — and in particular prioritizes the application of Zero Trust.

    In this CrowdCast tailored especially for cybersecurity leaders, Zero Trust experts examine and explain the EO, including its Zero Trust mandate and what it means for both government and non-government organizations.

    After viewing this webcast security leaders will understand:
    • How the EO impacts all industries (including those based outside the U.S.)
    • The critical deadlines the EO imposes
    • What technologies are required to meet the Zero Trust mandate
    • How to approach the Zero Trust mandate in a manageable, phased manner
    • How non-government organizations benefit from this guidance

    Speakers:
    • Mr. James Yeager, VP of Public Sector & Healthcare (CrowdStrike)
    • Mr. Ajit Sancheti, VP of Identity Protection
    • Mr. Richard Wong, SVP, Global Head of Security Market Advisory, Frost & Sullivan
    • Moderated by: Mr. Kapil Raina, VP Zero Trust & Identity Marketing
  • Deconstructing The Round 3 MITRE ATT&CK Evaluation Recorded: Aug 11 2021 32 mins
    Michael Sentonas (Chief Technology Officer), Andrew Munchbach (Vice President of Sales Engineering)
    MITRE Engenuity’s ATT&CK Evaluation program represents one of the industry’s most in-depth assessments of how endpoint protection solutions behave when subjected to complex, real-world threats. MITRE Engenuity shares a wealth of data on performance of nearly 30 vendors, but how should we make sense of it all? More importantly, how do security teams find and use this data to stop intrusions before they become a breach?

    Join CrowdStrike CTO Michael Sentonas and VP of Sales Engineering Andrew Munchbach for a walkthrough of the evaluation, with firsthand insights from the team who executed it. Michael and Andrew will provide an in-depth overview of MITRE’s Round 3 evaluation, what it says about the EDR market, and what it means for the CrowdStrike Falcon platform.

    Join this call to learn more about:
    • What the MITRE ATT&CK Evaluation is, and what it can tell us about modern EDR solutions
    • What a Falcon analyst would experience when faced with an attack like the simulated intrusion by CARBON SPIDER (Carbanak)
    • How we should interpret the results of ATT&CK Evaluation Round 3, and what important insights we can take away
    • The key capabilities that are most critical for protecting against similar adversary tradecraft today and tomorrow
  • Gut gesichert in die Cloud–Und ist das überhaupt wichtig? Recorded: Aug 11 2021 60 mins
    Nikolei Steinhage, Sr. Sales Engineer
    Mit der steigenden Nachfrage nach Cloud-Technologien gewinnt auch die Frage immer mehr an Bedeutung, wie sich diese effizient vor feindlichen Zugriffen schützen lassen.

    In diesem Webcast gehen wir dieser Frage auf den Grund und sprechen über die Herausforderungen, die die Cloud-Transformation mit sich bringt. Erfahren Sie, wie Sie den Überblick über sämtliche Workloads behalten können, um Angriffe sowie Fehlkonfigurationen früh zu erkennen, aufzuhalten bzw. zu berichtigen und anschließend zu untersuchen. Lernen Sie weiterhin, wie sich Cloud-Infrastrukturen in die bestehende Infrastruktur integrieren lassen und wie CrowdStrike Sie und ihr Team dabei unterstützen kann.
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Customer Case Study: Softserve
  • Live at: Aug 5 2021 12:30 pm
  • Presented by: Adriyan Pavlykevych, CISO, Softserve | Michael Kropyva, InfoSec Associate Director - InfoSec, Softserve
  • From:
Your email has been sent.
or close