Combating Advanced Supply Chain, Cloud and Identity-Based Attacks [EMEA]

Logo
Presented by

Jason Rivera, Senior Director - Strategic Threat Advisory Group

About this talk

As organizations have rapidly migrated to the cloud, adversaries have honed their craft to exploit the gaps that leave businesses vulnerable to cyberattack. In this CrowdCast, we take an adversary-focused approach to defend against three commonly exploited attack vectors: supply chain, cloud environments and user identities. Join CrowdStrike to: • Learn why taking an adversary-focused approach helps security and incident response teams focus their resources and proactively apply defenses • Understand how global cloud adoption and remote work has left organizations vulnerable to cyberattacks • Learn how real-world adversaries are currently exploiting cloud misconfigurations, user identities and supply chains • Gain access to best practices to defend against sophisticated adversary attacks
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (188)
Subscribers (32282)
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.