X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >

COVID-19 Threat Intelligence Briefing

ON-DEMAND

An Update on the COVID-19 Threat Landscape

As the world works to prevent the spread of the COVID-19 virus, cyber adversaries are only working harder — opportunistically trying to take advantage of global disruption with this new cyberattack vector. CrowdStrike® Intelligence closely monitors this adversary activity and is observing spikes in ongoing coronavirus-themed phishing attacks and scam campaigns.

In this webcast, CrowdStrike exposes the threat actors that are attempting to exploit the confusion caused by COVID-19 and outlines the adversaries’ motivation, tactics and techniques. Armed with this information, you will learn how to identify COVID-19-themed threats, be better able to educate users and more effectively deploy proactive security measures.

Join CrowdStrike Vice President of Intelligence Adam Meyers as he offers insights into how threat actors are actively taking advantage of COVID-19 to infiltrate organizations and achieve their objectives.

Attend this webcast to learn:

  • How threat actors are exploiting COVID-19 — their motivation and intent
  • The latest tactics, techniques and procedures adversaries are using to reach their objectives
  • The sectors and geographical regions being targeted by COVID-19 exploits
  • Steps you can take to proactively address these emerging threats

Featured Speakers

Adam Meyers

VP Intelligence - CrowdStrike

As Vice President of Intelligence for CrowdStrike, Adam Meyers oversees all of CrowdStrike’s intelligence gathering and cyber-adversarial monitoring activities. Meyers has authored numerous papers for peer-reviewed industry venues and has received awards for his dedication to the information security industry. Previously, Meyers was the director of cyber security intelligence with the National Products and Offerings Division of SRA International, where he provided technical expertise at the tactical level and strategic guidance on overall security program objectives.

TECHNICAL CENTER

  • OS icon
  • deployment icon
  • installation icon

For technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Center.

Visit the Tech Center