July 26-27, 2022
CrowdStrike @ AWS re:Inforce | Booth 203 | July 26-27, 2022 Boston Convention Center, Boston MA Register Today

Own your adversaries

At the heart of every cyber attack is a human adversary, constantly evolving their tradecraft to pose new threats. But they are no match for CrowdStrike. The world’s most advanced cloud-native platform was intelligently built to stop breaches… and to own the adversary.

You too can own an adversary! Stop by Booth 203 to chat with one of our CrowdStrike cloud security experts, experience a product demo to watch how CrowdStrike protects cloud workloads and containers in real-time, and collect a limited-edition adversary figurine!

How to Win Your Own Adversary Figure:
Earn a limited edition adversary collectable card for every action you complete below. Show your (3) collectable cards to a CrowdStrike representative at the giveaway station in our booth and they will reward you with your very own adversary figure!

  • Snap a selfie with one of the life-size adversaries in our booth and post it on your social channels.
  • Watch one of our theater presentations in our Expo Booth.
  • Engage in a product demo at one of our demo stations.


Join CrowdStrike at our highly interactive Chalk Talk in Room #203: Three Steps to Mitigate Cloud Threats with CrowdStrike and AWS on Tuesday July 26th 2:45pm-3:45pm ET!

As organizations have embraced the cloud revolution, so too have today’s adversaries. As noted in the CrowdStrike 2022 Global Threat Report, organizations face malicious threats to cloud environments as cloud-based services are “increasingly abused by malicious actors in the course of computer network operations (CNO), a trend that is likely to continue in the foreseeable future as more businesses seek hybrid work environments.”

Defending the cloud requires securing a rapidly growing attack surface. IT and security teams must enforce continuous monitoring and security from the development process to runtime.

In this Chalk Talk session, you will hear from CrowdStrike and AWS experts go through 3 steps to mitigate cloud security threats with an adversary-focused approach. Specifically, how to:

Provide real-time protection across the control plane

Shift left and enrich CI/CD processes to detect threats and vulnerabilities before they reach production

Secure hosts and containers at runtime

Justin Harris

Sr. Manager, Strategic Cloud GTM, CrowdStrike

Sameer Vasanthapuram

Principal Product Manager, CrowdStrike

Patrick McDowell

Global Technical Lead, Security Partners, AWS

Partner Sessions

CrowdStrike's unique cybersecurity ecosystem helps simplify your security stack and protect your entire organization from modern adversaries with unified, trusted security solutions to solve real-world security and IT challenges.

Join us at our theater in Booth #203 for featured Partner Sessions to learn how together with our partners, WE STOP BREACHES. Hosted Tuesday and Wednesday during AWS re:Inforce.

Featured Partner Schedule


Netskope - Better Together to Continuously Enforce Zero Trust


ExtraHop - Empower XDR with Network Intelligence


Okta - Simplify Secure Remote Access


Zscaler - Endpoint to application: Protected


Presidio/AWS - Mitigating Ransomware


Cloudflare - Enhancing & Expanding Zero Trust

Cloud Security Mixer

Please join us and our partners Netskope, Okta and ExtraHop after the close of day 1 at MJ O’Connor’s Seaport, located within steps in the Westin Hotel, next to the Boston Convention Center.

Network with your peers over refreshments and good company.


July 26


5pm-8pm ET


MJ O’Connor’s Seaport @ the Westin Hotel
425 Summer St, Boston, MA 02210

This is an invite only event. Space is limited.

Please ensure you have your AWS re: Inforce badge to gain entrance into the mixer.

Learn more about CrowdStrike

Meet with CrowdStrike

Interested in a 1:1 meeting with a CrowdStrike executive or expert on-site during AWS re:Inforce? Reach out to your local sales rep for details or schedule a meeting here.

Free Trial

Sign up for a 15-Day free trial of CrowdStrike Falcon Prevent™ to experience the power of CrowdStrike’s technology in action.

CrowdStrike Swag Store

Check out the newly released items in our Swag Store! 100% of the profits are donated to the CrowdStrike Foundation.

CrowdStrike Foundation

The CrowdStrike Foundation offers scholarships, grants, and research programs to help develop the next generation of cybersecurity and AI talent.

With over a decade of threat hunting and protection, we’ve built up threat intelligence at scale to know who’s compromising your data. Explore our Adversary Universe to see who is behind the threats and how our automated protection and elite threat hunting can help you stop breaches.

Learn More

CrowdStrike Support for AWS Compute Services

As your company grows and you build and expand upon your AWS environment, CrowdStrike is there to secure many different AWS Compute Services. CrowdStrike provides breach protection and control for edge computing workloads running on cloud and customer-managed infrastructure, providing simplified infrastructure management and security consolidation, without impact to productivity. Currently we support and secure:

Amazon EC2 instances – on all major operating systems including AWS Graviton processors

AWS Fargate

Amazon WorkSpaces

AWS Outposts

CrowdStrike also supports customers modern container and Kubernetes applications through our support and integrations with the following:

Amazon Elastic Container Service

Amazon Elastic Kubernetes Service

Amazon Elastic Container Registry

Amazon EKS Anywhere

Interested in joining the team behind the technology?
Learn more at