In this hands-on workshop, you’ll learn why traditional endpoint security solutions are not designed to detect and prevent the increasingly sophisticated threats aimed at endpoints. Experience live CrowdStrike Endpoint Security's fast, powerful, and scalable approach to protecting your fleet of devices.
From Login to Lockdown: Stop Identity Breaches from SCATTERED SPIDER
From Login to Lockdown: Stop Identity Breaches from SCATTERED SPIDER
Adversaries like SCATTERED SPIDER log in instead of breaking in. In this hands-on workshop, you’ll learn how to stop identity-based attacks with CrowdStrike Falcon® Identity Protection. You’ll uncover how to detect threats across cloud, SaaS, and on-premises, while reducing risk from misconfigurations and compromised credentials.
Stop the Breach: Securing the Cloud against LABYRINTH CHOLLIMA
Stop the Breach: Securing the Cloud against LABYRINTH CHOLLIMA
Step into the role of a defender in this hands-on workshop to learn how to detect, respond to, and stop advanced adversaries like LABYRINTH CHOLLIMA, using proactive security to gain complete visibility from code to cloud with CrowdStrike Falcon® Cloud Security.
Hunt CHATTY SPIDER: Stop Real-World Threats with Falcon Next-Gen SIEM
Hunt CHATTY SPIDER: Stop Real-World Threats with Falcon Next-Gen SIEM
Join this hands-on workshop to investigate real-world activity from the adversary CHATTY SPIDER while leveraging unified data, built-in threat intelligence, AI, and automation with CrowdStrike Falcon® Next-Gen SIEM.
Expose the Risk: Defend Against OPERATOR PANDA Attacks
Expose the Risk: Defend Against OPERATOR PANDA Attacks
Learn how to assess, prioritize, and remediate risk using CrowdStrike Falcon® Exposure Management — before adversaries like OPERATOR PANDA can exploit vulnerabilities across your environment.
Detecting, Disrupting, and Defeating BITWISE SPIDER with Adversary Intelligence
Detecting, Disrupting, and Defeating BITWISE SPIDER with Adversary Intelligence
Intelligence is key to staying one step ahead of adversaries. In this hands-on workshop, learn how to detect, disrupt, and proactively defend against BITWISE SPIDER using CrowdStrike Falcon® Counter Adversary Operations. Participants will gain insight into BITWISE SPIDER's tactics and strategies, enhancing your ability to respond effectively to threats.
Proactive Hardening with Falcon for IT: Hunt LIMINAL PANDA
Proactive Hardening with Falcon for IT: Hunt LIMINAL PANDA
Join this hands-on workshop to learn how CrowdStrike Falcon® for IT helps SecOps teams proactively harden environments, enable compliance monitoring, and shut down threats like LIMINAL PANDA before they can exploit misconfigurations.
Prevent Data Loss from Insider and External Threats with Falcon Data Protection
Prevent Data Loss from Insider and External Threats with Falcon Data Protection
See how CrowdStrike Falcon® Data Protection stops unauthorized data egress across endpoints and cloud environments. Explore real-world threat scenarios from the adversary PUNK SPIDER — and learn how to prevent GenAI data loss, detect obfuscation tactics like encryption, and gain deep visibility of data flow.
Get real-time access to the CrowdStrike Falcon® platform. Each hands-on workshop is hosted live so you can ask product experts questions as you navigate through the experience.