Uncover new strategies and hone skills for securing your enterprise, your customers and your cloud with a curated selection of sessions, workshops and panels throughout Fal.Con. Eight tracks of breakout sessions cover both business topics and technical how-tos; mix and match for your ideal agenda.
All session abstracts and speakers will be shared August 10
Build Confidently in the Cloud. Businesses developing modern applications are leveraging the speed and agility of multi-cloud environments to deploy faster with greater product differentiation. Their developers are constantly spinning apps up and down, racing to make and release improvements.
Start with XDR - the Future of Security. Stopping the most advanced attackers requires a fundamentally different approach to cybersecurity. Join CrowdStrike product visionaries, industry experts and your peers to:
Supercharge Your Security Team. Security programs are only as effective as the people and process used to run them. Ensure you're equipped with the necessary skills and staff to detect, respond and recover from modern attacks faster than any adversary can achieve its mission. Join CrowdStrike experts in incident response, managed detection and response (MDR) and threat hunting to:
Take an Adversary-focused Approach to Cybersecurity. Gain an understanding of the current and emerging adversary threats across the threat landscape.
Explore Humio. Learn how organizations deploy Humio and observability practices that continuously improve UX at speed, and break threat patterns with complete visibility across all of your data. Humio is a faster, more affordable way to ingest data for a range of use cases.
Accelerate Zero Trust. Zero Trust is the industry response to stopping modern attacks like ransomware and supply chain threats. With the requirement to protect all layers of the IT environment, Zero Trust means protecting the cloud/workload, endpoint and identity layers.
Stop Modern Attacks with Identity Protection. A full 80% of modern breaches leverage identity-based attack techniques. The reality is that identity-based attacks are difficult to detect, especially as the attack surface continues to increase for many organizations.
Accelerate Your Security Transformation. A robust cybersecurity strategy and architecture that aligns with the goals of your organization are built on strong foundation of people, processes and technology and are key for stopping breaches. In this track, your key takeaways will be: