Survivor Fest 2025 Virtual Series
Cloud, IT ops, SecOps, and SOC warriors — battle it out in virtual challenges designed to test your skill and strategy. Take on real adversary-inspired scenarios, rack up wins, and claim ultimate bragging rights.
Only one will earn the title of Survivor Fest Ultimate Champion.
See who's leading the pack.
Next Survivor Fest game begins in
Get ready for virtual Survivor Games — the famed Fal.Con cyber-challenge experience, now available to anyone, anywhere.
CPE credits available for attendees.
October 16
Uncover an evasive adversary — track their tactics, expose their objectives, and stop them in their tracks with CrowdStrike Falcon® Next-Gen SIEM and AI-driven investigation tools. Compete against elite SOC analysts for top honors, prizes, and bragging rights.
October 23
Using CrowdStrike endpoint security and the AI-native CrowdStrike Falcon® platform, you'll investigate a simulated intrusion, uncover attacker behavior, and trace potential data theft across compromised systems. Lean on CrowdStrike® Charlotte AI™ to sharpen your skills, stress-test your instincts, and experience how AI-native security gives modern defenders the upper hand.
November 19
Wield CrowdStrike Falcon® Cloud Security to uncover an evasive adversary: LABYRINTH CHOLLIMA. Uncover their tactics, expose their objectives, and stop them in their tracks. Detect, assess, and counteract cloud threats, vulnerabilities, and misconfigurations in real time. Compete to test your skills and show off your cloud security expertise.
December 3
Armed with CrowdStrike Falcon® for IT and Charlotte AI, you’ll act as a front-line responder in a high-stakes race against time. Harness the power of IT automation to eliminate misconfigurations at scale, uncover unmanaged and shadow assets lurking in your environment, and neutralize risky or unauthorized applications before adversaries exploit them, outmaneuvering your opponents in a dynamic showdown.
December 17
Use CrowdStrike Falcon® Next-Gen Identity Security to uncover credential misuse, spot risky logins, and shut down privilege escalation attempts across cloud, software as a service (SaaS), and on-premises systems. Investigate identity threats as they unfold, eliminate misconfigurations, and compete against fellow defenders.