Combatting Advanced Supply Chain, Cloud And Identity-Based Attacks [APJ]

Logo
Presented by

Jason Rivera, Director, Strategic Threat Advisor Group, CrowdStrike

About this talk

As organizations have rapidly migrated to the cloud, adversaries have honed their craft to exploit the gaps that leave businesses vulnerable to cyberattack. In this CrowdCast, we take an adversary-focused approach to defend against three commonly exploited attack vectors: supply chain, cloud environments and user identities. Join CrowdStrike to: • Learn why taking an adversary-focused approach helps security and incident response teams focus their resources and proactively apply defenses • Understand how global cloud adoption and remote work has left organizations vulnerable to cyberattacks • Learn how real-world adversaries are currently exploiting cloud misconfigurations, user identities and supply chains • Gain access to best practices to defend against sophisticated adversary attacks
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (46)
Subscribers (5360)
CrowdStrike, a global cybersecurity leader, is redefining security for the cloud era with an endpoint and workload protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints and workloads on or off the network. There’s only one thing to remember about CrowdStrike: We stop breaches.