Explore the power of the CrowdStrike Falcon® platform through technical training and immersive workshops designed for today’s cyber defenders. Go beyond theory with direct access to the tools, tactics, and workflows that help teams detect faster, respond smarter, and stop breaches with confidence.
The full agenda will be available in June. Stay tuned for updates.
A sophisticated adversary — SCATTERED SPIDER — is already inside your environment. Are you ready to respond? In this hands-on workshop, you'll lead a coordinated defense using CrowdStrike Endpoint Security and the AI-native Falcon platform.
LIMINAL PANDA is a stealthy threat actor that exploits misconfigurations and unmanaged change, thriving in environments lacking continuous visibility or validation. In this hands-on workshop, you’ll use CrowdStrike Falcon® for IT to detect risk and take control before adversaries strike.
CHATTY SPIDER thrives in the noise by weaponizing phishing, social engineering, and fast-moving credential theft to slip past siloed defenses. In this hands-on workshop, you’ll use CrowdStrike Falcon® Next-Gen SIEM to detect activity from this modern eCrime adversary and surface threats hidden in plain sight.
SCATTERED SPIDER doesn’t break in — they log in. This adversary uses social engineering, session hijacking, and stolen credentials to bypass traditional defenses and blend in alongside legitimate users. In this hands-on workshop, you’ll learn how to detect, defend against, and respond to identity-based threats using CrowdStrike Falcon® Identity Protection across cloud, SaaS, and on-prem environments.
LABYRINTH CHOLLIMA is a stealthy, persistent adversary built to breach cloud and AI environments. In this hands-on workshop, you’ll use CrowdStrike Falcon® Cloud Security to stop them before their access turns into a breach.
OPERATOR PANDA exploits opportunity by targeting internet-exposed infrastructure, lateral movement routes, and overlooked misconfigurations to establish long-term access. In this hands-on workshop, you’ll use CrowdStrike Falcon® Exposure Management to detect risk across endpoints, servers, and network-connected devices before it can be turned into a foothold.
FAMOUS CHOLLIMA, a North Korean adversary group, blends into developer environments using stolen identities, remote access tools, and malware hidden in coding challenges. In this hands-on workshop, you’ll investigate a simulated intrusion using CrowdStrike Falcon® Adversary Intelligence and Charlotte AI to detect nation-state tactics in motion.
Russian adversaries like COZY BEAR use stealthy phishing and device code techniques to infiltrate networks undetected. In this session, ride along with a CrowdStrike Falcon® Complete analyst to investigate a sophisticated cloud-based intrusion.
PUNK SPIDER specializes in stealth by using encryption, obfuscation, and insider access to quietly exfiltrate sensitive data from endpoints and cloud environments. In this hands-on workshop, you’ll use CrowdStrike Falcon® Data Protection to detect, defend against, and respond to real-world data theft scenarios across hybrid environments.
SaaS apps drive productivity, but also introduces immense risks. Adversaries like COZY BEAR exploit dormant OAuth apps, overprivileged accounts, and misconfigurations to move undetected. In this hands-on workshop, you’ll use CrowdStrike Falcon® Shield to secure the SaaS-layer.
Improve your incident response preparedness through this controlled, high fidelity attack simulation. Apply real-world response strategies under pressure, sharpen technical workflows, and build confidence in your ability to manage active security incidents.
Compete in an interactive, hands-on scavenger hunt using the Falcon platform console to uncover insider threats linked to DPRK adversary FAMOUS CHOLLIMA.