Security Strategy, Architecture & Operations

Learning Sessions

28 Videos

Security Strategy, Architecture & Operations Frictionless Zero Trust
Multiple Speakers CrowdStrike 18:01
Security Strategy, Architecture & Operations Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Multiple Speakers Consortium networks 13:14
Security Strategy, Architecture & Operations How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Doug Clifton EY 30:25
Security Strategy, Architecture & Operations Out of the Shadows; Into the Community
Cytisus Eurydice Independent 21:43
Security Strategy, Architecture & Operations Epic Transformation: Convincing Campuses to Secure Their Devices
Tom Horton Cornell University 23:50
Security Strategy, Architecture & Operations Taming the Falcon: A Guide to the New Features You Might Have Missed​
Multiple Speakers CrowdStrike 29:54
Security Strategy, Architecture & Operations Falcon and the MITRE ATT&CK Framework: Better Together​
James Antonakos CrowdStrike 19:09
Security Strategy, Architecture & Operations Phishing Emails and Web Exploits: Detection Walkthrough
Kelly Lehman CrowdStrike 26:23
Security Strategy, Architecture & Operations Accelerate From Zero to Sixty in No Time: A Fast Path to Becoming a CrowdStrike API Expert
Devin Cargill CrowdStrike 40:43
Security Strategy, Architecture & Operations Bringing Big Data to Data Protection
Drew Bagley CrowdStrike 24:01
Security Strategy, Architecture & Operations Making It Stick: Introducing Cybersecurity Risk Management Into Your Organization
Multiple Speakers CrowdStrike 22:45
Security Strategy, Architecture & Operations Tigers and Bears and Mergers — Oh My!
Multiple Speakers CrowdStrike 20:21
Security Strategy, Architecture & Operations The CrowdStrike Store: Simplifying Security Through an Ecosystem
Andy Horwitz CrowdStrike 22:02
Security Strategy, Architecture & Operations Bringing Zero Trust To Falcon Endpoints
Multiple Speakers CrowdStrike 22:44
Security Strategy, Architecture & Operations How Best-in-Class EDR and NDR Deliver World-Class XDR
Marcus Hartwig Vectra AI 16:56
Security Strategy, Architecture & Operations Future Forward: A Distributed World Shifts the Security Front Lines to the Endpoint
Mark Sangster 19:38
Security Strategy, Architecture & Operations Securing Your Industrial Operations With the Power of Dragos and CrowdStrike
Matt Cowell 19:35
Security Strategy, Architecture & Operations The Confidence Game: How Attackers Exploit People and How to Stop Them
Ryan Kalember Proofpoint 34:27
Security Strategy, Architecture & Operations Enabling Device-based Security and Productivity With Okta
Teju Shyamsundar Okta 21:57
Security Strategy, Architecture & Operations Transform Your Workers to “Work From Anywhere” Without Compromising Security or User Experience
Multiple Speakers 30:42
Security Strategy, Architecture & Operations Inside the CrowdStrike/Claroty Joint Solution: A New Approach to ICS Visibility and Threat Detection
Multiple Speakers Claroty 20:39
Security Strategy, Architecture & Operations Introducing Illumio Edge for CrowdStrike: An Endpoint Recipe to Neutralize Ransomware
Multiple Speakers Illumio 22:07
Security Strategy, Architecture & Operations Actively Defend Your Enterprise of Things: Don’t Just See Them, Secure Them
Brennen Reynolds Forescout 17:57
Security Strategy, Architecture & Operations Gain Complete Device Coverage and Stop Breaches Faster with Integrated EDR and NDR
Jeff Costlow ExtraHop 13:24
Security Strategy, Architecture & Operations Move Beyond Legacy: Cloud-first Endpoint Security in the Age of Distributed IT
Multiple Speakers Automox 20:55
Security Strategy, Architecture & Operations Sit Up Straight: Best Practices for Improving Your Security Posture
Damian Chung Netskope 21:01
Security Strategy, Architecture & Operations Cornerstones to a Modern Security Strategy: Why EDR + NG-SIEM Is Critical to Securing the Modern Enterprise
Chris Stewart Exabeam 19:15
Security Strategy, Architecture & Operations Risky Business: Managing Cyber Risk Up and Down an Enterprise
Multiple Speakers CrowdStrike 20:49