Hi [[ session.user.profile.firstName ]]

So Bleiben Sie Gegenüber Ecrime-Aktivitäten Im Finanzwesen Wachsam

Angriffe mit Ransomware haben im Jahr 2020 exponentiell zugenommen und sind damit weltweit zur allgegenwärtigen und konstanten Bedrohung geworden. Unabhängig von Größe, Branche oder Standort: Die Abwehr von Ransomware ist für die Überlebensfähigkeit Ihrer Organisation entscheidend. Das gilt für Ihre Finanzen ebenso wie für Ihren guten Ruf. Internet-Kriminelle wollen von Opfern möglichst hohe Summen erbeuten und schrecken auch nicht vor Erpressung zurück. In jüngster Zeit verwischen allerdings die Grenzen zwischen bestimmten nationalstaatlichen Angreifern und kommerziell ausgerichteten Internet-Kriminellen zunehmend. Die bisher geltenden Regeln verlieren an Gültigkeit.

Erfahren Sie von CrowdStrikes Threat Intel Experten Jörg Schauff mehr über die jüngsten nationalstaatlichen und e-Crime-Angriffe, die sich gegen Finanzdienstleister weltweit richten. Des Weiteren stellen wir Ihnen Konzepte vor, die Sie für Ihr Unternehmen nutzen können, um wachsam zu bleiben und sich gegenüber den genannten Aktivitäten zu schützen.
Recorded Sep 30 2021 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jörg Schauff, Strategic Threat Advisor (EMEA)
Presentation preview: So Bleiben Sie Gegenüber Ecrime-Aktivitäten Im Finanzwesen Wachsam

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Proaktive Abwehr von Gegnern & Was Sie Darüber Wissen Sollten Oct 26 2021 9:00 am UTC 52 mins
    Jörg Schauff, Threat Intel Advisor
    Sie wollen Gegner proaktiv abwehren können, die Ihr Geschäft ins Visier nehmen, aber Ihnen fehlt der Durchblick bei der Vielzahl von Lösungen zur Bedrohungsaufklärung?

    Damit stehen Sie nicht alleine da. Sicherheitsexperten wissen um die Bedeutung der Bedrohungsaufklärung als entscheidende Komponente in ihrem Cyber-Toolkit. Sie ermöglicht es ihnen, proaktiv zu agieren und Bedrohungen abzuwehren. Dennoch fällt es ihnen schwer, den Überblick über die diversen Angebote zur Bedrohungsaufklärung zu behalten und zu entscheiden, welche Lösungen sinnvollerweise im eigenen Unternehmen eingesetzt werden sollten.

    In diesem Webcast befassen wir uns mit den genannten Herausforderungen und verdeutlichen die Bedeutung einer fundierten Bedrohungsaufklärung als entscheidender Teil einer wirksamen Cyber-Sicherheitsstrategie.

    Erfahren Sie, wie Sie den größtmöglichen Nutzen aus den Erkenntnissen der Bedrohungsaufklärung ziehen, indem Sie diese Informationen im gesamten Unternehmen optimal anwenden.In diesem Webcast erzählen wir Ihnen u. a. mehr über:

    • Kernkomponenten der Bedrohungsaufklärung
    • Sinnvolle Ziele der Bedrohungsaufklärung
    • Die Nutzung der Bedrohungsaufklärung für Verteidigungsplattformen, Security Operations Center (SOC), Schwachstellenmanagement, Bedrohungssuche und Incident Response
    • Unterstützung von Entscheidungen zur Cybersicherheit auf Führungsebene
    • Integration der Bedrohungsaufklärung in den Endgeräteschutz, um die Aufklärung von Vorfällen zu beschleunigen, den Ermittlungsprozess zu rationalisieren und die Gefahrenabwehr zu verbessern
  • The Maturation of Cloud-Native Security Oct 21 2021 3:00 pm UTC 55 mins
    David Puzas (Product Marketing Leader, CrowdStrike), Doug Cahill (VP/Group Director, Cybersecurity — ESG)
    More than ever, organizations are grappling with how to secure cloud-native applications. Composed of a combination of containers, virtual machines, APIs and serverless functions, protecting these applications from development to runtime requires reworking the approach many organizations take toward security.

    In a new survey from CrowdStrike and Enterprise Strategy Group (ESG), 88% of respondents said their cybersecurity program needs to evolve to secure their cloud-native applications and use of public cloud infrastructure, with many citing challenges around maintaining visibility and consistency across disparate environments.

    Join ESG’s VP and Group Director of Cybersecurity Doug Cahill and CrowdStrike’s Cloud Security Product Marketing Leader David Puzas as they discuss:
    • The cloud-native threat landscape and the need for an integrated defense-in-depth strategy
    • Cloud-native security challenges and how maturity gaps result in inconsistency, misconfigurations and visibility gaps
  • See and Stop Lateral Movement with Illumio Oct 20 2021 3:00 pm UTC 44 mins
    Katey Wood, Dir. Product Marketing (Illumio); Christian Rencken, Strategic Threat Advisor & Global Tech Lead (CrowdStrike)
    Once a single endpoint is compromised, attackers move laterally to ransom other endpoints or even reach higher value targets, turning an attack on a single endpoint into a huge breach. This lateral movement is the secret ingredient of successful ransomware attacks.

    CrowdStrike’s unified endpoint protection stops nearly every attack, but we must expand defense-in-depth with a Zero Trust approach. This helps proactively prevent attacker lateral movement and the spread of ransomware. What’s more, with the rise of remote work, IT has even less visibility and control of assets off the corporate network.

    Learn how to quickly understand traffic hitting endpoints or see potential attacker lateral movement, as well as how default containment of malware with Zero Trust for the endpoint can help ensure the first endpoint infected is the last, by stopping the spread of attacks and ransomware.

    Watch this session to:
    • Understand more about the lateral movement exhibited by ransomware that drives high-profile breaches.
    • See and understand potential lateral movement–or legitimate business traffic—and use this security visibility to address attacks or better understand business needs by allow-listing a truly legitimate, necessary service.
    • Learn how the CrowdStrike Falcon agent now calls on Illumio’s endpoint Zero Trust for threat containment to limit the cyber risk associated with major attacks.
  • Supercharge Your Security Transformation Recorded: Oct 6 2021 49 mins
    Janani Nagarajan (Director, Product Marketing, CrowdStrike), Pippa Thirkettle (Senior Research Manager, Vanson Bourne)
    71% of IT security professionals say that security stack integration complexity requires improvement. To get ahead of sophisticated adversaries and meet your organization’s digital transformation objectives, you need to transform your security with best-of-breed solutions that are seamlessly interoperable.

    Learn about areas in your security that require modernization, key security team trends, critical frameworks and recommendations to get ahead of modern threats.

    Join Vanson Bourne industry research experts and the CrowdStrike Store team as they discuss:
    • Survey results reporting key findings in IT and security buying and implementation practices
    • Common challenges faced by IT practitioners as they try to realize value from their security stack without negatively impacting the business
    • Recommendations to transform and simplify your security stack to accelerate incident investigation and response

    Speakers:
    • Janani Nagarajan, Director, Product Marketing, CrowdStrike
    • Pippa Thirkettle, Senior Research Manager, Vanson Bourne
  • The CyberCriminal Underground: Shining a Light on the Dark Web Recorded: Oct 1 2021 45 mins
    Adam Meyers, SVP, Intelligence
    Cybercrime is rampant. The internet is full of shady forums, marketplaces and communities where bad actors congregate and underground digital economies thrive. Adversaries are out to steal your data, exploit your brand and scam your customers.

    In this CrowdCast, we will take a close look into the growing cybercriminal underground and the illicit markets used by criminal actors that sell access to compromised systems, ransomware services, stolen data and much more.

    Join CrowdStrike SVP of Intelligence Adam Meyers as he examines the growing threats, events and trends found on the cybercriminal underground. He will separate fact from fiction about the dark web, expose emerging techniques and tools, and discuss prominent adversaries and their activities.

    Attend this webcast to:
    • Gain deeper insight into the criminal ecosystem and learn how to prevent your organization from being victimized by adversaries and their affiliates
    • Understand how criminal adversaries have expanded their ransomware activities and made them even more potent
    • Gain insight on emerging tactics such as data extortion and data leak sites
    • Learn about adversaries and their inventive tactics, techniques and tools
  • So Bleiben Sie Gegenüber Ecrime-Aktivitäten Im Finanzwesen Wachsam Recorded: Sep 30 2021 63 mins
    Jörg Schauff, Strategic Threat Advisor (EMEA)
    Angriffe mit Ransomware haben im Jahr 2020 exponentiell zugenommen und sind damit weltweit zur allgegenwärtigen und konstanten Bedrohung geworden. Unabhängig von Größe, Branche oder Standort: Die Abwehr von Ransomware ist für die Überlebensfähigkeit Ihrer Organisation entscheidend. Das gilt für Ihre Finanzen ebenso wie für Ihren guten Ruf. Internet-Kriminelle wollen von Opfern möglichst hohe Summen erbeuten und schrecken auch nicht vor Erpressung zurück. In jüngster Zeit verwischen allerdings die Grenzen zwischen bestimmten nationalstaatlichen Angreifern und kommerziell ausgerichteten Internet-Kriminellen zunehmend. Die bisher geltenden Regeln verlieren an Gültigkeit.

    Erfahren Sie von CrowdStrikes Threat Intel Experten Jörg Schauff mehr über die jüngsten nationalstaatlichen und e-Crime-Angriffe, die sich gegen Finanzdienstleister weltweit richten. Des Weiteren stellen wir Ihnen Konzepte vor, die Sie für Ihr Unternehmen nutzen können, um wachsam zu bleiben und sich gegenüber den genannten Aktivitäten zu schützen.
  • Zero Trust-Modelle ohne reibungsverluste Umsetzen - so geht's Recorded: Sep 23 2021 56 mins
    Sascha Dubbel, Sr. Sales Engineer Identity Protection & Zero Trust EMEA
    Angesichts der jüngsten brisanten Datendiebstähle, bei denen Identitäten in hybriden Clouds und Lieferketten ausspioniert wurden, war das Thema „Zero Trust“ noch nie so aktuell wie heute. Und dies gilt nicht nur für große Unternehmen.Jeder kann gehackt werden und in jedem Netzwerk kann sich irgendwo ein Angreifer über ein privilegiertes Benutzerkonto eingenistet haben.

    Doch wie können Sie Ihren Identitätsspeicher wirksam schützen, ohne dass sich Ihre Benutzer täglich fünf oder zehn Minuten lang gegenüber den Basissystemen authentifizieren müssen?

    In diesem Webcast zeigt Ihnen unser Experte Sascha Dubbel, Sr. Sales Engineer Identity Protection & Zero Trust EMEA bei CrowdStrike, anhand von konkreten Fallbeispielen auf, wie Sie mit einer reibungslosen Umsetzung des Zero-Trust-Modells Ihre Sicherheitskosten und Risiken senken, Datendiebstähle verhindern und den ROI steigern. Des Weiteren wird er darauf eingehen, warum ein reibungsloses Zero Trust-Modellfür alleUnternehmen von Bedeutung ist und nicht nur globale Unternehmen betrifft.
  • Wie Big Data den Datenschutz verbessert Recorded: Sep 16 2021 24 mins
    Dr. Christoph Bausewein, Director & Counsel, Data Protection & Policy, CrowdStrike
    Dieses Webinar befasst sich mit der Nutzung von Big-Data-Analysen als Cybersecurity-Instrument unter Einhaltung und Optimierung des Datenschutzes im Sinne der EU-Datenschutz-Grundverordnung (DSGVO) und anderen relevanten Datenschutzgesetzen. Teilnehmer lernen, wie cloud-native Big-Data-Technologien wirksam dazu beitragen, Bedrohungen zu erkennen, ihren Umfang zu ermitteln, Datendiebstähle zu verhindern und alle Beteiligten fundiert zu informieren, um einen hohen Datenschutz zu gewährleisten. Zudem erfahren Teilnehmer des Webinars, was CrowdStrike als Datenschutzpartner leistet.
  • Keynote: Adam Meyers Recorded: Sep 14 2021 26 mins
    Adam Meyers, Senior Vice President of intelligence, CrowdStrike
    Adam Meyers, Senior Vice President of intelligence at CrowdStrike, discusses how organisations can protect themselves from the next wave of cyber adversaries by presenting the EMEA Threat Landscape.
  • Customer Case Study: Med-el Recorded: Sep 14 2021 22 mins
    Tobias Kilga, Head of Corporate Information Technology, MED-EL
    From Antivirus to Endpoint Detection and Response. Tobias Kilga, Head of Corporate Information Technology at MED-EL, will share their experience of transitioning to a cloud delivered security solution and how CrowdStrike has supported his team to overcome the daily threat of cyberattacks to their business.
  • Customer Case Study: Coventry University Recorded: Sep 14 2021 35 mins
    Steve Rogers, Enterprise Cloud, Infrastructure and Security Architect, Coventry University
    Steve Rogers is an Enterprise Cloud, Infrastructure and Security Architect at Coventry University, a major higher education institution in the United Kingdom with over 29,000 students and campuses across Coventry, London, Scarborough China and Singapore. In this case study Steve will explain Coventry University’s journey to a world class security posture why securing the end point for both staff and students alike was critical path to security maturity for the organisation.
  • Customer Case Study: Softserve Recorded: Sep 14 2021 18 mins
    Adriyan Pavlykevych, CISO, Softserve | Michael Kropyva, InfoSec Associate Director - InfoSec, Softserve
    Adriyan Pavlykevych (CISO at Softserve) and Michael Kropyva (InfoSec Associate Director, InfoSec at Softserve) will share an overview of the security challenges faced by the organisation, the goals for improving their security posture, the implementation journey and the benefits from the solutions that have been implemented.
  • Customer Case Study: General Finance Recorded: Sep 14 2021 23 mins
    Graziano Callegaro, IT Director, Generalfinance S.p.A.
    Learn from this Italian banking company how they moved from legacy antivirus to a modern cybersecurity solution that provides them with 24/7 detection & response by experts, clear understanding after true positives, tailored reports, thorough support throughout and fast deployment.
  • Customer Case Study: Entain Group Recorded: Sep 14 2021 19 mins
    Luke Davis, Security Operations, Entain
    Luke Davis, Security Operations at Entain, one of the worlds largest sports betting and gaming groups will discuss how Entain have moved to a SaaS first approach and how CrowdStrike have supported their journey Entain has matured as a business. Luke will also explain why and how CrowdStrike’s Falcon Platform was selected as the solution of choice.
  • Customer Case Study: Randstad Recorded: Sep 14 2021 26 mins
    Martijn Nykerk, Global CISO, Randstad
    Martijn Nykerk, Global CISO at Randstad, will deliver a case study on their experience in transitioning to CrowdStrike, reviewing how they selected, implemented and deployed the solution.
  • Alliance Case Study: EY Recorded: Sep 14 2021 31 mins
    Leanne Salisbury, Senior Manager, Cybersecurity | Bence Hovarth, Director, Technology Consulting - Cybersecurity
    Human ingenuity is driving cyber threat evolution, harnessing artificial intelligence and automation along with sharing knowledge and capabilities. Collaborations between adversary groups are creating an increase in professionalization across the networks of cyber adversaries. Members are learning from the outcomes of their attacks and the responses from their victims. Humans are very good at learning from others, what worked and what didn’t. The lines are blurring between threat actor groups, ideology and intent are no longer important distinguishing factors. If an attack style works and the technical resources are available, they will be used. In this presentation, we will explore this growing trend, the potential impacts for organizations and how they can prepare.

    The views reflected in this article are the views of the author and do not necessarily reflect the views of the global EY organization or its member firms.
  • Security Detection - Preparing for the Unknown Recorded: Sep 14 2021 32 mins
    Ken Greene, Strategic Alliances Director, Humio
    In this session, Ken will review the Security Detection challenges facing organisations and how these result in blind-spots that present cyber and operational risk. Ken will consider the implications of this for cyber defence teams and how changing trends in technology and customer processes can have both a positive and negative impact on Security Detection.

    Ken will propose ideas for how organisations can build more flexible and comprehensive security detection foundations to meet the challenges of unknown, future cyber threats.
  • Keynote: Amol Kurkami Recorded: Sep 14 2021 27 mins
    Amol Kulkarni, Chief Product Officer, CrowdStrike
    Your organisation uses new technologies to increase its productivity. Attackers use the latest technologies to improve their rate of success. But.. do you use new technologies to protect your organization?



    With the deployment of new cloud technologies and most of the workforce still working remotely, the attack surface of many companies has increased significantly in the past year. This calls for a comprehensive security strategy that can protect all workloads, regardless of whether they are workstations, servers or cloud workloads. A zero-trust approach to protecting user data should be a given.

    Hear from CrowdStrike’s Chief Product Officer Amol Kulkarni as he shares how a robust, integrated and wholesome security strategy can be implemented in your environment and how it can evolve to ensure your organization remains secure.
  • Identity Protection: A Key Element for Modern Threat Hunters Recorded: Sep 1 2021 34 mins
    Andrew Harris (Sr. Director, Public Sector Technology Strategy), Phil Meneses (Regional Sales Engineer)
    While companies have embraced more endpoint and multifactor authentication (MFA) solutions in their security architecture, they don’t always see incidents as they happen — especially those involving service accounts and lateral movement. Recent attacks targeting identity and supply chain automation have made it clear that the next level of preparedness and risk mitigation must include reviewing and strengthening identity security tools.

    “Defense in depth” means finding the right controls from the endpoint all the way to the domain controller, but most security stacks are missing identity controls beyond an MFA checkbox. In addition, Golden SAML attacks such as those seen in Sunburst show that MFA isn’t a silver bullet, either. Good security requires not only automated responses to threats as they arise, but also deterministic threat detection (i.e., signature matching) and behavior anomaly detection (i.e., user/credential live actions). Our experts will demonstrate CrowdStrike Falcon® identity protection products that achieve both.

    Demo 1: Falcon Identity Threat Detection
    • Insights and analytics across your enterprise
    • Seeing live threats and events as they happen — no logs!
    • Threat hunting: can it be the “easy” button?

    Demo 2: Falcon Zero Trust
    • Seeing Zero Trust policy challenges against live events
    • Integrating with MFA and SSO to extend the reach of each into legacy and the cloud alike
    • Adding security without making employees miserable
  • Understanding The United States’ Zero Trust Mandate Recorded: Aug 18 2021 54 mins
    James Yeager (CrowdStrike), Ajit Sancheti (CrowdStrike), Richard Wong (Frost & Sullivan)
    The U.S. White House “Executive Order on Improving the Nation’s Cybersecurity” (EO), released May 12, has far-ranging and fast-moving implications for all industries — not just government agencies — and in particular prioritizes the application of Zero Trust.

    In this CrowdCast tailored especially for cybersecurity leaders, Zero Trust experts examine and explain the EO, including its Zero Trust mandate and what it means for both government and non-government organizations.

    After viewing this webcast security leaders will understand:
    • How the EO impacts all industries (including those based outside the U.S.)
    • The critical deadlines the EO imposes
    • What technologies are required to meet the Zero Trust mandate
    • How to approach the Zero Trust mandate in a manageable, phased manner
    • How non-government organizations benefit from this guidance

    Speakers:
    • Mr. James Yeager, VP of Public Sector & Healthcare (CrowdStrike)
    • Mr. Ajit Sancheti, VP of Identity Protection
    • Mr. Richard Wong, SVP, Global Head of Security Market Advisory, Frost & Sullivan
    • Moderated by: Mr. Kapil Raina, VP Zero Trust & Identity Marketing
Insightful, education and actionable content for security teams
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: So Bleiben Sie Gegenüber Ecrime-Aktivitäten Im Finanzwesen Wachsam
  • Live at: Sep 30 2021 8:00 am
  • Presented by: Jörg Schauff, Strategic Threat Advisor (EMEA)
  • From:
Your email has been sent.
or close