Case Study: Covert Deployment of Security Tools with CrowdStrike Real Time Response
Michael Getz
Runtime: 32:11
Take a a journey in creating an insider threat program with Code42 and CrowdStrike. This session independently arms security practitioners with a low-profile strategy to deploy, configure and remove security tools.
Please provide your feedback and be entered to win $300 on items from the CrowdStrike Swag Store! Winner will be contacted via email.
Related Videos
Scripting the Falcon OAuth2 APIs with PowerShell: Overview of the PSFalcon Toolkit
IT Operations
Scripting the Falcon OAuth2 APIs with PowerShell: Overview of the PSFalcon Toolkit
Brendan Kremian
CrowdStrike
35:37
Bridging the Gap: Discovering Vulnerability Trends to Improve Host Security
IT Operations
Bridging the Gap: Discovering Vulnerability Trends to Improve Host Security
Hamilton Yang
CrowdStrike
29:29
Adapting Your IT Hygiene Program for Long-term Working Environment Changes
IT Operations
Adapting Your IT Hygiene Program for Long-term Working Environment Changes
Anand Visvanathan
CrowdStrike
19:12
{Will be replaced by the modal content}