
Fal.Con On Demand
Choose from 65+ learning sessions in five color-coded tracks and watch exclusive content focused on exactly what you need to know.
CrowdStrike On Demand
Exclusive Content
53 Videos
View All
Customer Spotlight: The City of New York
CrowdStrike On Demand
Customer Spotlight: The City of New York
Multiple Speakers
City of New York
5:51
Icon Interview: Lewis Hamilton, Mercedes F1 Racer
CrowdStrike On Demand
Icon Interview: Lewis Hamilton, Mercedes F1 Racer
Multiple Speakers
Mercedes-AMG Petronas F1 Team
8:56
Executive Experience
Exclusive Content
3 Videos
View All
Panel Discussion: Mercedes-AMG & CrowdStrike: “Perfecting the Pivot: Building a Winning Culture in Challenging Times
CrowdStrike On Demand
Panel Discussion: Mercedes-AMG & CrowdStrike: “Perfecting the Pivot: Building a Winning Culture in Challenging Times
Multiple Speakers
CrowdStrike
27:25
State of Security Panel: How Amazon and Ernst & Young Leverage Innovation to Make Informed Decisions
Executive Experience
State of Security Panel: How Amazon and Ernst & Young Leverage Innovation to Make Informed Decisions
Multiple Speakers
CrowdStrike
24:40
Executive Intelligence Briefing: State of Cybersecurity
Executive Experience
Executive Intelligence Briefing: State of Cybersecurity
Adam Meyers
CrowdStrike
17:51
Getting Ahead of the CMMC Tsunami: Overview, Best Practices & Lessons Learned
Executive Experience
Getting Ahead of the CMMC Tsunami: Overview, Best Practices & Lessons Learned
Andy Woods
ECS
18:41
See More, Know More, Do More with Cloud Security Posture Management
Cloud, Container & Data Center Security
See More, Know More, Do More with Cloud Security Posture Management
Multiple Speakers
CrowdStrike
20:55
Adapting Your IT Hygiene Program for Long-term Working Environment Changes
IT Operations
Adapting Your IT Hygiene Program for Long-term Working Environment Changes
Anand Visvanathan
CrowdStrike
19:12
REvil: A Prolific Ransomware as a Service
Research & Threat Intelligence
REvil: A Prolific Ransomware as a Service
Multiple Speakers
CrowdStrike Inc.
27:27
Taming the Falcon: A Guide to the New Features You Might Have Missed
Security Strategy, Architecture & Operations
Taming the Falcon: A Guide to the New Features You Might Have Missed
Multiple Speakers
CrowdStrike
29:54
OverWatch in Action: Demystifying the Threat Hunting Process
Threat Hunting & Incident Response
OverWatch in Action: Demystifying the Threat Hunting Process
Multiple Speakers
CrowdStrike
24:26
Cloud, Container & Data Center Security
Learning Sessions
6 Videos
View All
See More, Know More, Do More with Cloud Security Posture Management
Cloud, Container & Data Center Security
See More, Know More, Do More with Cloud Security Posture Management
Multiple Speakers
CrowdStrike
20:55
Cracking Perimeters in an Evolving Landscape: A Red Team’s Perspective
Cloud, Container & Data Center Security
Cracking Perimeters in an Evolving Landscape: A Red Team’s Perspective
Mike Felch
CrowdStrike
32:36
Ransom in Amazon Web Services (AWS)
Cloud, Container & Data Center Security
Ransom in Amazon Web Services (AWS)
Spencer Gietzen
CrowdStrike
26:23
Building Security Best Practices with AWS and CrowdStrike
Cloud, Container & Data Center Security
Building Security Best Practices with AWS and CrowdStrike
Sameer Kumar Vasanthapuram
Amazon Web Services
22:42
IT Operations
Learning Sessions
8 Videos
View All
Adapting Your IT Hygiene Program for Long-term Working Environment Changes
IT Operations
Adapting Your IT Hygiene Program for Long-term Working Environment Changes
Anand Visvanathan
CrowdStrike
19:12
When It Comes to Vulnerability Management: It’s Time to STOP and Reassess
IT Operations
When It Comes to Vulnerability Management: It’s Time to STOP and Reassess
Daniel Kahan
CrowdStrike
15:30
A Use Case for Containment: How One Company Uses the CrowdStrike API to Prevent Data Loss
IT Operations
A Use Case for Containment: How One Company Uses the CrowdStrike API to Prevent Data Loss
John Puett
TIAA
21:25
Bridging the Gap: Discovering Vulnerability Trends to Improve Host Security
IT Operations
Bridging the Gap: Discovering Vulnerability Trends to Improve Host Security
Hamilton Yang
CrowdStrike
29:29
Scripting the Falcon OAuth2 APIs with PowerShell: Overview of the PSFalcon Toolkit
IT Operations
Scripting the Falcon OAuth2 APIs with PowerShell: Overview of the PSFalcon Toolkit
Brendan Kremian
CrowdStrike
35:37
Case Study: Covert Deployment of Security Tools with CrowdStrike Real Time Response
IT Operations
Case Study: Covert Deployment of Security Tools with CrowdStrike Real Time Response
Michael Getz
Swagelok
32:11
Falcon Platform APIs: How to Connect to, Leverage and Make the Most of It
IT Operations
Falcon Platform APIs: How to Connect to, Leverage and Make the Most of It
Christophe Viaud
CrowdStrike
22:31
Research & Threat Intelligence
Learning Sessions
10 Videos
View All
REvil: A Prolific Ransomware as a Service
Research & Threat Intelligence
REvil: A Prolific Ransomware as a Service
Multiple Speakers
CrowdStrike Inc.
27:27
Demystifying the MSS and China’s Contract Hacking Model
Research & Threat Intelligence
Demystifying the MSS and China’s Contract Hacking Model
Adam Kozy
CrowdStrike
26:36
Why MITRE ATT&CK Doesn’t Work Like Bingo
Research & Threat Intelligence
Why MITRE ATT&CK Doesn’t Work Like Bingo
Joel Spurlock
CrowdStrike
21:30
Prosecuting Cyber Espionage: Insights and Impacts from Cyber Espionage Indictments
Research & Threat Intelligence
Prosecuting Cyber Espionage: Insights and Impacts from Cyber Espionage Indictments
Matthew Dahl
CrowdStrike
27:32
Machine Learning for Threat Intelligence: Applying K-Means Clustering to Dharma and Phobos Ransomware Incidents
Research & Threat Intelligence
Machine Learning for Threat Intelligence: Applying K-Means Clustering to Dharma and Phobos Ransomware Incidents
Eric Loui
CrowdStrike
27:26
Priority Intelligence Requirements: Your Key to Working Smarter with More Impact
Research & Threat Intelligence
Priority Intelligence Requirements: Your Key to Working Smarter with More Impact
Thomas Schmitt
AB-InBev
38:41
Security Strategy, Architecture & Operations
Learning Sessions
28 Videos
View All
Taming the Falcon: A Guide to the New Features You Might Have Missed
Security Strategy, Architecture & Operations
Taming the Falcon: A Guide to the New Features You Might Have Missed
Multiple Speakers
CrowdStrike
29:54
Falcon and the MITRE ATT&CK Framework: Better Together
Security Strategy, Architecture & Operations
Falcon and the MITRE ATT&CK Framework: Better Together
James Antonakos
CrowdStrike
19:09
Frictionless Zero Trust
Security Strategy, Architecture & Operations
Frictionless Zero Trust
Multiple Speakers
CrowdStrike
18:01
The CrowdStrike Store: Simplifying Security Through an Ecosystem
Security Strategy, Architecture & Operations
The CrowdStrike Store: Simplifying Security Through an Ecosystem
Andy Horwitz
CrowdStrike
22:02
Making It Stick: Introducing Cybersecurity Risk Management Into Your Organization
Security Strategy, Architecture & Operations
Making It Stick: Introducing Cybersecurity Risk Management Into Your Organization
Multiple Speakers
CrowdStrike
22:45
Phishing Emails and Web Exploits: Detection Walkthrough
Security Strategy, Architecture & Operations
Phishing Emails and Web Exploits: Detection Walkthrough
Kelly Lehman
CrowdStrike
26:23
Risky Business: Managing Cyber Risk Up and Down an Enterprise
Security Strategy, Architecture & Operations
Risky Business: Managing Cyber Risk Up and Down an Enterprise
Multiple Speakers
CrowdStrike
20:49
Tigers and Bears and Mergers — Oh My!
Security Strategy, Architecture & Operations
Tigers and Bears and Mergers — Oh My!
Multiple Speakers
CrowdStrike
20:21
Threat Hunting & Incident Response
Learning Sessions
14 Videos
View All
OverWatch in Action: Demystifying the Threat Hunting Process
Threat Hunting & Incident Response
OverWatch in Action: Demystifying the Threat Hunting Process
Multiple Speakers
CrowdStrike
24:26
Better Know an Adversary, or 10 Things You Should Hate in Your Network
Threat Hunting & Incident Response
Better Know an Adversary, or 10 Things You Should Hate in Your Network
Jim Miller Miller
CrowdStrike
25:35
A Dharma Initiative: How OverWatch Threat Hunting Uncovered a Widespread Targeted Ransomware Affiliate Network
Threat Hunting & Incident Response
A Dharma Initiative: How OverWatch Threat Hunting Uncovered a Widespread Targeted Ransomware Affiliate Network
Multiple Speakers
CrowdStrike
22:40
Uptown Splunk: Get Funky With Falcon Data
Threat Hunting & Incident Response
Uptown Splunk: Get Funky With Falcon Data
Andrew Munchbach
CrowdStrike
24:59
Tales From the Crypt 2020: Case Studies in Ransomware
Threat Hunting & Incident Response
Tales From the Crypt 2020: Case Studies in Ransomware
Multiple Speakers
CrowdStrike
16:12
Drinking from the Tap: Network Security Monitoring
Threat Hunting & Incident Response
Drinking from the Tap: Network Security Monitoring
Multiple Speakers
CrowdStrike
23:54
Avoid the Breach, Save the Weekend: Lessons Learned with CrowdStrike Services
Threat Hunting & Incident Response
Avoid the Breach, Save the Weekend: Lessons Learned with CrowdStrike Services
Tim Parisi
CrowdStrike
19:25
Elevate Your Game: Creating Tabletop Exercises that Actually Improve Your Team
Threat Hunting & Incident Response
Elevate Your Game: Creating Tabletop Exercises that Actually Improve Your Team
Multiple Speakers
CrowdStrike
27:44
{Will be replaced by the modal content}