Video On Demand
Case Study: Covert Deployment of Security Tools with CrowdStrike Real Time Response
Michael Getz
Michael Getz
Runtime: 32:11
Take a a journey in creating an insider threat program with Code42 and CrowdStrike. This session independently arms security practitioners with a low-profile strategy to deploy, configure and remove security tools.

Related Videos

IT Operations Scripting the Falcon OAuth2 APIs with PowerShell: Overview of the PSFalcon Toolkit
Brendan Kremian CrowdStrike 35:37
IT Operations Bridging the Gap: Discovering Vulnerability Trends to Improve Host Security
Hamilton Yang CrowdStrike 29:29
IT Operations Adapting Your IT Hygiene Program for Long-term Working Environment Changes
Anand Visvanathan CrowdStrike 19:12