Explore the power of the CrowdStrike Falcon® platform through technical training and immersive workshops designed for today’s cyber defenders. Go beyond theory with direct access to the tools, tactics, and workflows that help teams detect faster, respond smarter, and stop breaches with confidence.
The full agenda will be available in June. Stay tuned for updates.
LIMINAL PANDA is a stealthy threat actor that exploits misconfigurations and unmanaged change, thriving in environments lacking continuous visibility or validation. In this hands-on workshop, you’ll u ...
CHATTY SPIDER thrives in the noise by weaponizing phishing, social engineering, and fast-moving credential theft to slip past siloed defenses. In this hands-on workshop, you’ll use CrowdStrike Falcon® ...
SCATTERED SPIDER doesn’t break in — they log in. This adversary uses social engineering, session hijacking, and stolen credentials to bypass traditional defenses and blend in alongside legitimate user ...
LABYRINTH CHOLLIMA is a stealthy, persistent adversary built to breach cloud and AI environments. In this hands-on workshop, you’ll use CrowdStrike Falcon® Cloud Security to stop them before their acc ...
OPERATOR PANDA exploits opportunity by targeting internet-exposed infrastructure, lateral movement routes, and overlooked misconfigurations to establish long-term access. In this hands-on workshop, yo ...
FAMOUS CHOLLIMA, a North Korean adversary group, blends into developer environments using stolen identities, remote access tools, and malware hidden in coding challenges. In this hands-on workshop, yo ...
Russian adversaries like COZY BEAR use stealthy phishing and device code techniques to infiltrate networks undetected. In this session, ride along with a CrowdStrike Falcon® Complete analyst to invest ...
PUNK SPIDER specializes in stealth by using encryption, obfuscation, and insider access to quietly exfiltrate sensitive data from endpoints and cloud environments. In this hands-on workshop, you’ll us ...
SaaS apps drive productivity, but also introduces immense risks. Adversaries like COZY BEAR exploit dormant OAuth apps, overprivileged accounts, and misconfigurations to move undetected. In this hands ...
Improve your incident response preparedness through this controlled, high fidelity attack simulation. Apply real-world response strategies under pressure, sharpen technical workflows, and build confid ...
Compete in an interactive, hands-on scavenger hunt using the Falcon platform console to uncover insider threats linked to DPRK adversary FAMOUS CHOLLIMA.