The CyberCriminal Underground

June 10th @ 11am PST

Shining a light on the dark side of the web

Cybercrime is rampant. The internet is full of shady forums, marketplaces and communities where bad actors congregate and underground digital economies thrive. Adversaries are out to steal your data, exploit your brand and scam your customers.

In this CrowdCast, we will take a close look into the growing cybercriminal underground and the illicit markets used by criminal actors that sell access to compromised systems, ransomware services, stolen data and much more.

Join CrowdStrike SVP of Intelligence Adam Meyers as he examines the growing threats, events and trends found on the cybercriminal underground. He will separate fact from fiction about the dark web, expose emerging techniques and tools, and discuss prominent adversaries and their activities.

Attend this webcast to:

  • Gain deeper insight into the criminal ecosystem and learn how to prevent your organization from being victimized by adversaries and their affiliates.
  • Understand how criminal adversaries have expanded their ransomware activities and made them even more potent
  • Gain insight on emerging tactics such as data extortion and data leak sites.
  • Learn about adversaries and their inventive tactics, techniques and tools.

Featured Speakers

Adam Meyers

Senior Vice President, Threat Intelligence, CrowdStrike

As Senior Vice President of Intelligence for CrowdStrike, Adam Meyers oversees all of CrowdStrike’s intelligence gathering and cyber-adversarial monitoring activities. Meyers has authored numerous papers for peer-reviewed industry venues and has received awards for his dedication to the information security industry. Previously, Meyers was the director of cyber security intelligence with the National Products and Offerings Division of SRA International, where he provided technical expertise at the tactical level and strategic guidance on overall security program objectives.

TECHNICAL CENTER

  • OS icon
  • deployment icon
  • installation icon

For technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Center.

Visit the Tech Center