Join Allie Mellen, Sr. Analyst at Forrester & Michael Sentonas, CTO at CrowdStrike, as they discuss why the best XDR offerings are built on a strong foundation of EDR.
Top Cloud Security Threats to Watch For in 2022/2023
CrowdCast
On-Demand
Defeat the Adversary: Combat Advanced Supply Chain, Cloud and Identity-Based Attacks
ON DEMAND
Fast Track Your Cyber Insurance Initiatives With Identity Protection
Where XDR Fits in Your SOC Modernization Strategy
The X Factor: Why XDR Must Start with EDR
Falcon Complete Web Shell Intrusion Demonstration, APJ
Essential Update on the eCrime Adversary Universe
How XDR Gets Real with CrowdStrike and ExtraHop
3 Tips in 30 Minutes: The Do's and Don'ts of Your Zero Trust Journey
Unifying Your Security Solutions
CrowdStrike and Zscaler: Beyond the Perimeter 2022
Protecting Against Endpoint to Cloud Attack Chains
On Demand
Reinventing MDR with Identity Threat Protection
Critical Capabilities to go from Legacy to Modern Endpoint Security
Shared Responsibility Best Practices for Securing Public Cloud Platforms with CrowdStrike and AWS
CrowdCast: Global Threat Report 2022
The CrowdStrike Store: What We Learned in 2021
Tales from the Dark Web Series - Distribution services: The secret force behind ransomware
Advanced Log Management Course Spring ‘22
Threat Hunting Log4j Exploits with Falcon OverWatch
Log4j: A View From the Frontlines
Accelerating the Journey Towards Zero Trust with CrowdStrike and Zscaler
How Effective Are Your Cybersecurity Solutions Against Today’s Threats?
Log4j2 Zero-Day Vulnerability Update
Meet the Experts: An Interactive Lunch Discussion with the Falcon Complete Team
On-demand
Podcast: EY and CrowdStrike NextGen Identity Access and Management
Podcast
Stopping Breaches Is a Complete Team Effort: Case Study with Brown University
Don’t Wait to Be a Cyber Victim: SEARCH for Hidden Threats
A CISO’s Journey in Defending Against Modern Identity Attacks
Tales from the Dark Web: Following Threat Actors’ Bread Crumbs
Google Cloud Security and CrowdStrike: Transforming Security Together
Maximize the Value of Your Falcon Data with Humio
Shift Left - Improving The Security Posture of Applications
How to Combat Threats in the Cloud
Nowhere to Hide: 2021 Threat Hunting Report
State of Cloud Security Webinar - Financial Services
Frictionless Zero Trust: Top 5 CISO Best Practices
Your Journey to Zero Trust: What You Wish You Knew Before You Started
Blueprint for Securing AWS Workloads with CrowdStrike
Beat the Bite: Strengthen your Security Against Ransomware Actors
Lessons Learned from the Colonial Pipeline Ransomware Attack
ON-DEMAND
Fundamentals of Modernizing Your SOC: Boost Defense with SIEM, SOAR, NDR and EDR
July 7th @ 11am PT
The CyberCriminal Underground
Understanding the United States’ Zero Trust Mandate
June 22 @ 10 AM PDT | 1 PM EDT
Supercharge Your Security Transformation
Detect and Mitigate Against Key Sunburst TTPs
How to Maximize ROI with Frictionless Zero Trust
What's Behind the Numbers? Deconstructing the Round 3 MITRE ATT&CK Evaluation
Defending Your Small Business From Big Threats
The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure
SLED Overwatch Briefing
Exposing the eCrime Ecosystem
Accelerate your SOC’s Response Time with CrowdStrike
Unify Endpoint and Cloud Application Security with Zscaler
Proactive Network Monitoring with DomainTools and CrowdStrike Falcon
Watch On-Demand
2021 Global Threat Report CrowdCast
Enabling Secure Remote Work in Education
Extending Security Controls to OT Networks with Claroty and CrowdStrike
Obsidian + CrowdStrike: Detection and Response Across Cloud and Endpoints
Take DevSecOps to the Next Level
JAN 21th @ 11AM PST, FEB 10th @ 11AM LONDON (GMT) and JAN 21st @ 2PM AUSTRALIA (GMT +10)
Better Together: Cybersecurity Awareness in the New Normal
How We Bypassed All NTLM Relay Mitigations — And How to Ensure You’re Protected
Okta + Crowdstrike Falcon Zero Trust – Achieve Conditional Access Everywhere
A CISO’s Perspective on Conditional Access
CISO Panel Discussion: Best Practices for Securing Access for Your Remote Workforce
See and Secure from Day 0: Better Together with AWS and CrowdStrike
CROWDSTRIKE SERVICES CYBER FRONT LINES REPORT CROWDCAST
Dec 10th @ 11am PST, Dec 16th @ 2pm GMT and Dec 15th @ 2pm AEDT
Announcing Unified VRM In the CrowdStrike Store
2020 CrowdStrike Global Security Attitude Survey
Stopping Cyber Threats Against Remote Workers
Nowhere to Hide: 2020 Threat Hunting Report
The Evolution of Ransomware and the Pinchy Spider Actor Group
Reconciling Cybersecurity Risks With Industrial Digital Transformation
Threat Hunting: Real Intrusions by State-Sponsored and eCrime Groups
Cyber Threat Intelligence Demystified
Simplifying Enterprise Security with a Unique Cybersecurity Ecosystem
July 15th @ 11am PDT, July 21st @ 10am BST and July 21st @ 2pm AEST
Cybersecurity Unleashes Digital Transformation at ECI
Securing Cloud Workloads and Containers
JUNE 11TH @ 11AM PDT and June 18th @ 10AM BST
Webcast: Global Remote Work Security Survey
Ensuring Business Continuity by Securing Your Remote Workforce
Vulnerability Management Trends and Protecting a Remote Workforce
Beyond COVID-19: Protecting People and Preventing Breaches in the “New Normal”
Know What You Don’t Know
Coping with COVID: Security Leadership in Times of Crisis
Demystifying Mobile Device Security
COVID-19 Threat Intelligence Briefing
Incident Response and Remediation When Working Remotely
Navigating Data Protection with a Newly Deployed Remote Workforce
Cybersecurity in the Time of COVID-19
2020 Global Threat Report CrowdCast
CrowdStrike Falcon OverWatch: A SANS Review
CrowdScore: Get in the Driver’s Seat
Every Second Counts: Speed & Cybersecurity with Mercedes-AMG Petronas F1 Team
Forrester Reveals Total Economic Impact of CrowdStrike
2019 Mobile Threat Landscape Report
When Adversaries ATT&CK™
WATCH ON DEMAND
Supporting Government Missions
Law Firm Webcast: Incident Response Under Privilege
GDPR: Myths and Urban Legends
The 1/10/60 Minute Challenge: A Framework for Stopping Breaches Faster
Can Small and Midsize Organizations Get the Same Level of Endpoint Protection as the Big Guys?
Security at the speed of DevOps
Active Directory — The “Keys to The Kingdom”
Understanding the GDPR and How It Will Impact Your Organization
Defending Against Threats Targeting the Mac Platform
You Can’t Stop the Breach Without Prevention AND Detection