InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Tales from the Battlefield Stop Breaches by SCATTERED SPIDER and More

Presented by

Kurt Baker & Kendra Kendall, Sr. Directors of Product Marketing | Ryan Terry, Sr. Product Marketing Manager

About this talk

SCATTERED SPIDER, COZY BEAR, and other identity-focused adversaries have made identity-based attacks on cloud environments more prevalent than ever. The alarming rise in access brokers have made it easy for adversaries to buy stolen credentials. To combat these threats, you need a trusted Identity Threat Detection and Response (ITDR) solution that goes beyond only focusing on Microsoft AD. CrowdStrike is proud to unveil significant product innovations that extend our industry-leading ITDR solution to protect cloud-based identity environments—like Microsoft Entra ID—and support the latest authentication frameworks. Watch this CrowdCast to: -Learn from CrowdStrike experts as they detail the anatomy of SCATTERED SPIDER’s successful identity-based attacks. -See how CrowdStrike Falcon® Identity Protection can safeguard your organization against the latest identity tactics, techniques, and procedures (TTPs) of today’s prolific adversaries. -Watch a LIVE demo highlighting the latest identity protection product innovations introduced by CrowdStrike.
CrowdStrike

CrowdStrike

36159 subscribers243 talks
Insightful, education and actionable content for security teams
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.
Related topics