GETTING TO KNOW WHAT YOU DON’T KNOW
The Role of a Compromise Assessment in Modern Cybersecurity Defense
Experiencing a cyberattack against your organization is not simply a question of “if” but rather “when.” The reality for today’s organizations is that someone will try to compromise you and the challenge is to be proactive and take action before it’s too late. An important step toward that goal is to determine if you are currently compromised, or have been in the past.
In this webcast, CrowdStrike® Services Manager Eric Opdyke and CrowdStrike Services Senior Consultant Caitlyn Chapman will explain why conducting a thorough compromise assessment (CA) is a critical part of maturing your cyber defenses. It not only gives you self-awareness about the state of your organization’s cybersecurity readiness, it can help guide your approach to a future security strategy — one that is marked by increased maturity across key functions and the ability to exercise capacities on a recurring basis.
Attend this webcast to gain:
- Practical advice on how to look for evidence of existing or past compromise
- Specific outcomes derived from real-world CAs
- The role and impact of CA in an overall cybersecurity program
- How CrowdStrike Services defines and approaches CA
Eric OpdykeManager, CrowdStrike Services
Eric Opdyke has ten years of experience in the computer security industry. As a Manager for CrowdStrike, Eric is responsible for managing incident response activities for critical security breaches and providing customers with solutions to complex adversary problems.
Caitlyn ChapmanPrincipal Consultant, CrowdStrike Services
Caitlyn Chapman has over six years of information security consulting experience. As a Principal Consultant with the CrowdStrike Services team, she is responsible for delivering trusted advisory services to customers in need of assistance with critical security breaches, incident response program development, and proactive compromise assessments. Prior to joining CrowdStrike, Caitlyn worked for a large defense contractor supporting a variety of cybersecurity roles, including SOC development and support, incident response, and cyber threat intelligence.