際際滷shows by User: CrowdStrike / http://www.slideshare.net/images/logo.gif 際際滷shows by User: CrowdStrike / Mon, 09 Oct 2017 19:26:26 GMT 際際滷Share feed for 際際滷shows by User: CrowdStrike State of Endpoint Security: The Buyers Mindset /slideshow/state-of-endpoint-security-the-buyers-mindset/80622240 crowdstrikeesgstateofendpointcc-171009192626
Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers? As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy from enhancing efficacy to reducing complexity and agent bloat. A new webcast, State of the Endpoint: The Buyer Mindset, discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss todays most important security issues. Join them as they explore the findings from a new research report, Trends in Endpoint Security: A State of Constant Change, a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward. Join this webcast to learn: -The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why -Best of breed vs. comprehensive suites which approach do your peers prefer and what are the advantages and challenges of each? -How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity]]>

Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers? As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy from enhancing efficacy to reducing complexity and agent bloat. A new webcast, State of the Endpoint: The Buyer Mindset, discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss todays most important security issues. Join them as they explore the findings from a new research report, Trends in Endpoint Security: A State of Constant Change, a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward. Join this webcast to learn: -The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why -Best of breed vs. comprehensive suites which approach do your peers prefer and what are the advantages and challenges of each? -How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity]]>
Mon, 09 Oct 2017 19:26:26 GMT /slideshow/state-of-endpoint-security-the-buyers-mindset/80622240 CrowdStrike@slideshare.net(CrowdStrike) State of Endpoint Security: The Buyers Mindset CrowdStrike Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers? As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy from enhancing efficacy to reducing complexity and agent bloat. A new webcast, State of the Endpoint: The Buyer Mindset, discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss todays most important security issues. Join them as they explore the findings from a new research report, Trends in Endpoint Security: A State of Constant Change, a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward. Join this webcast to learn: -The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why -Best of breed vs. comprehensive suites which approach do your peers prefer and what are the advantages and challenges of each? -How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikeesgstateofendpointcc-171009192626-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Where is endpoint security headed? How do your priorities and capabilities compare to those of your peers? As the battle against breaches rages on, many enterprises are focused on revamping their endpoint security strategy from enhancing efficacy to reducing complexity and agent bloat. A new webcast, State of the Endpoint: The Buyer Mindset, discusses the current state of endpoint security and offers insights from an all-star panel of thought leaders, including Internationally recognized cybersecurity leader and CrowdStrike Co-founder Dmitri Alperovitch, VP of Product Marketing Dan Larson, and other experts as they discuss todays most important security issues. Join them as they explore the findings from a new research report, Trends in Endpoint Security: A State of Constant Change, a study conducted by ESG and commissioned by CrowdStrike and other technology vendors. The panel will provide their impressions of the data in the survey and how the viewpoints revealed mesh with current technology trends, offering insights that can help inform your security strategy going forward. Join this webcast to learn: -The current state of Antivirus (AV) including how many organizations are choosing to change vendors and why -Best of breed vs. comprehensive suites which approach do your peers prefer and what are the advantages and challenges of each? -How solutions are affecting endpoints and your IT Security peers, including the increase in agents installed and the impact of increased complexity
State of Endpoint Security: The Buyers Mindset from CrowdStrike
]]>
7319 5 https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikeesgstateofendpointcc-171009192626-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them /slideshow/understanding-fileless-or-nonmalware-attacks-and-how-to-stop-them/78244887 crowdstrikefilelesscrowdcastss-170725183300
How adversaries use fileless attacks to evade your security and what you can do about it Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks, where no executable file is written to disk. Download this presentation provided by CrowdStrike security experts to learn why so many of todays adversaries are abandoning yesterdays malware and relying on an evolving array of fileless exploits. Youll learn how fileless attacks are conceived and executed and why they are successfully evading the standard security measures employed by most organizations. Youll also receive guidance on the best practices for defending your organization against these stealthy, damaging attacks. The following presentation includes: --How a fileless attack is executed see how an end-to-end attack unfolds --Why fileless attacks are having so much success evading legacy security solutions --How you can protect your organization from being victimized by a fileless attack, including the security technologies and policies that are most effective]]>

How adversaries use fileless attacks to evade your security and what you can do about it Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks, where no executable file is written to disk. Download this presentation provided by CrowdStrike security experts to learn why so many of todays adversaries are abandoning yesterdays malware and relying on an evolving array of fileless exploits. Youll learn how fileless attacks are conceived and executed and why they are successfully evading the standard security measures employed by most organizations. Youll also receive guidance on the best practices for defending your organization against these stealthy, damaging attacks. The following presentation includes: --How a fileless attack is executed see how an end-to-end attack unfolds --Why fileless attacks are having so much success evading legacy security solutions --How you can protect your organization from being victimized by a fileless attack, including the security technologies and policies that are most effective]]>
Tue, 25 Jul 2017 18:33:00 GMT /slideshow/understanding-fileless-or-nonmalware-attacks-and-how-to-stop-them/78244887 CrowdStrike@slideshare.net(CrowdStrike) Understanding Fileless (or Non-Malware) Attacks and How to Stop Them CrowdStrike How adversaries use fileless attacks to evade your security and what you can do about it Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks, where no executable file is written to disk. Download this presentation provided by CrowdStrike security experts to learn why so many of todays adversaries are abandoning yesterdays malware and relying on an evolving array of fileless exploits. Youll learn how fileless attacks are conceived and executed and why they are successfully evading the standard security measures employed by most organizations. Youll also receive guidance on the best practices for defending your organization against these stealthy, damaging attacks. The following presentation includes: --How a fileless attack is executed see how an end-to-end attack unfolds --Why fileless attacks are having so much success evading legacy security solutions --How you can protect your organization from being victimized by a fileless attack, including the security technologies and policies that are most effective <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikefilelesscrowdcastss-170725183300-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How adversaries use fileless attacks to evade your security and what you can do about it Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks, where no executable file is written to disk. Download this presentation provided by CrowdStrike security experts to learn why so many of todays adversaries are abandoning yesterdays malware and relying on an evolving array of fileless exploits. Youll learn how fileless attacks are conceived and executed and why they are successfully evading the standard security measures employed by most organizations. Youll also receive guidance on the best practices for defending your organization against these stealthy, damaging attacks. The following presentation includes: --How a fileless attack is executed see how an end-to-end attack unfolds --Why fileless attacks are having so much success evading legacy security solutions --How you can protect your organization from being victimized by a fileless attack, including the security technologies and policies that are most effective
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them from CrowdStrike
]]>
3181 5 https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikefilelesscrowdcastss-170725183300-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Cyber Security Extortion: Defending Against Digital Shakedowns /slideshow/cyber-extortion-defending-against-digital-shakedowns/77184842 slidesharecrowdstrikedatanapping-170622182532
Real world lessons from CrowdStrike Services experts investigating complex cyber extortion attacks The criminal act of theft is as old as civilization itself, but in the cyber realm new ways to steal your organization's data or profit by holding it hostage, continue to evolve. With each advancement in security technology, adversaries work tirelessly on new techniques to bypass your defenses. This webcast, "Cyber Extortion: Digital Shakedowns and How to Stop Them" examines the evolution of cyber extortion techniques, including the latest "datanapping" exploits. Whether it's an attack on a major movie studio, a massive healthcare system, or a global entertainment platform, recent extortion attempts demonstrate how critical it is to understand today's threat landscape so you can ensure that your organization mounts the best defense possible. Download this presentation to learn what security experts from the cyber defense frontlines are discussing. Learn about: The range of extortion techniques being used today, including commonalities and differences in approaches Commodity type ransomware/datanapping vs. hands-on attacks how are they alike and what are their differences? Potential outcomes of paying vs. not paying when attempting to recover data after an attack Real world examples of successful attacks and those that were thwarted or mitigated Strategies for keeping your organization from being targeted and what to do if you become the victim of a cyber shakedown]]>

Real world lessons from CrowdStrike Services experts investigating complex cyber extortion attacks The criminal act of theft is as old as civilization itself, but in the cyber realm new ways to steal your organization's data or profit by holding it hostage, continue to evolve. With each advancement in security technology, adversaries work tirelessly on new techniques to bypass your defenses. This webcast, "Cyber Extortion: Digital Shakedowns and How to Stop Them" examines the evolution of cyber extortion techniques, including the latest "datanapping" exploits. Whether it's an attack on a major movie studio, a massive healthcare system, or a global entertainment platform, recent extortion attempts demonstrate how critical it is to understand today's threat landscape so you can ensure that your organization mounts the best defense possible. Download this presentation to learn what security experts from the cyber defense frontlines are discussing. Learn about: The range of extortion techniques being used today, including commonalities and differences in approaches Commodity type ransomware/datanapping vs. hands-on attacks how are they alike and what are their differences? Potential outcomes of paying vs. not paying when attempting to recover data after an attack Real world examples of successful attacks and those that were thwarted or mitigated Strategies for keeping your organization from being targeted and what to do if you become the victim of a cyber shakedown]]>
Thu, 22 Jun 2017 18:25:32 GMT /slideshow/cyber-extortion-defending-against-digital-shakedowns/77184842 CrowdStrike@slideshare.net(CrowdStrike) Cyber Security Extortion: Defending Against Digital Shakedowns CrowdStrike Real world lessons from CrowdStrike Services experts investigating complex cyber extortion attacks The criminal act of theft is as old as civilization itself, but in the cyber realm new ways to steal your organization's data or profit by holding it hostage, continue to evolve. With each advancement in security technology, adversaries work tirelessly on new techniques to bypass your defenses. This webcast, "Cyber Extortion: Digital Shakedowns and How to Stop Them" examines the evolution of cyber extortion techniques, including the latest "datanapping" exploits. Whether it's an attack on a major movie studio, a massive healthcare system, or a global entertainment platform, recent extortion attempts demonstrate how critical it is to understand today's threat landscape so you can ensure that your organization mounts the best defense possible. Download this presentation to learn what security experts from the cyber defense frontlines are discussing. Learn about: The range of extortion techniques being used today, including commonalities and differences in approaches Commodity type ransomware/datanapping vs. hands-on attacks how are they alike and what are their differences? Potential outcomes of paying vs. not paying when attempting to recover data after an attack Real world examples of successful attacks and those that were thwarted or mitigated Strategies for keeping your organization from being targeted and what to do if you become the victim of a cyber shakedown <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slidesharecrowdstrikedatanapping-170622182532-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Real world lessons from CrowdStrike Services experts investigating complex cyber extortion attacks The criminal act of theft is as old as civilization itself, but in the cyber realm new ways to steal your organization&#39;s data or profit by holding it hostage, continue to evolve. With each advancement in security technology, adversaries work tirelessly on new techniques to bypass your defenses. This webcast, &quot;Cyber Extortion: Digital Shakedowns and How to Stop Them&quot; examines the evolution of cyber extortion techniques, including the latest &quot;datanapping&quot; exploits. Whether it&#39;s an attack on a major movie studio, a massive healthcare system, or a global entertainment platform, recent extortion attempts demonstrate how critical it is to understand today&#39;s threat landscape so you can ensure that your organization mounts the best defense possible. Download this presentation to learn what security experts from the cyber defense frontlines are discussing. Learn about: The range of extortion techniques being used today, including commonalities and differences in approaches Commodity type ransomware/datanapping vs. hands-on attacks how are they alike and what are their differences? Potential outcomes of paying vs. not paying when attempting to recover data after an attack Real world examples of successful attacks and those that were thwarted or mitigated Strategies for keeping your organization from being targeted and what to do if you become the victim of a cyber shakedown
Cyber Security Extortion: Defending Against Digital Shakedowns from CrowdStrike
]]>
2468 5 https://cdn.slidesharecdn.com/ss_thumbnails/slidesharecrowdstrikedatanapping-170622182532-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
An Inside Look At The WannaCry Ransomware Outbreak /slideshow/an-inside-look-at-the-wannacry-ransomware-outbreak/76270074 crowdstikewannacrycrowdcastslides-170523183554
Gain in-depth information on the massive WannaCry ransomware attack On Friday, May 12, the WannaCry ransomware variant swept the globe. In a short period of time, WannaCry (also known as Wanna Decryptor and WannaCryptor) infected over 230,000 systems in 150 countries. It was a particularly effective piece of malware because it not only encrypted data and held it for ransom, but it also spread like wildfire to other systems. Entire organizations found themselves looking at a ransom note on their screens and wondering what to do next. As the situation continues to unfold, please join us as Adam Myers, VP of Threat Intelligence at CrowdStrike, presents an in-depth look at the WannaCry ransomware. Register for this webcast to learn: -A complete technical understanding of the WannaCry threat -What analysts were seeing on the day of the WannaCry outbreak -How to prevent WannaCry infections and protect against ransomware going forward]]>

Gain in-depth information on the massive WannaCry ransomware attack On Friday, May 12, the WannaCry ransomware variant swept the globe. In a short period of time, WannaCry (also known as Wanna Decryptor and WannaCryptor) infected over 230,000 systems in 150 countries. It was a particularly effective piece of malware because it not only encrypted data and held it for ransom, but it also spread like wildfire to other systems. Entire organizations found themselves looking at a ransom note on their screens and wondering what to do next. As the situation continues to unfold, please join us as Adam Myers, VP of Threat Intelligence at CrowdStrike, presents an in-depth look at the WannaCry ransomware. Register for this webcast to learn: -A complete technical understanding of the WannaCry threat -What analysts were seeing on the day of the WannaCry outbreak -How to prevent WannaCry infections and protect against ransomware going forward]]>
Tue, 23 May 2017 18:35:54 GMT /slideshow/an-inside-look-at-the-wannacry-ransomware-outbreak/76270074 CrowdStrike@slideshare.net(CrowdStrike) An Inside Look At The WannaCry Ransomware Outbreak CrowdStrike Gain in-depth information on the massive WannaCry ransomware attack On Friday, May 12, the WannaCry ransomware variant swept the globe. In a short period of time, WannaCry (also known as Wanna Decryptor and WannaCryptor) infected over 230,000 systems in 150 countries. It was a particularly effective piece of malware because it not only encrypted data and held it for ransom, but it also spread like wildfire to other systems. Entire organizations found themselves looking at a ransom note on their screens and wondering what to do next. As the situation continues to unfold, please join us as Adam Myers, VP of Threat Intelligence at CrowdStrike, presents an in-depth look at the WannaCry ransomware. Register for this webcast to learn: -A complete technical understanding of the WannaCry threat -What analysts were seeing on the day of the WannaCry outbreak -How to prevent WannaCry infections and protect against ransomware going forward <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdstikewannacrycrowdcastslides-170523183554-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Gain in-depth information on the massive WannaCry ransomware attack On Friday, May 12, the WannaCry ransomware variant swept the globe. In a short period of time, WannaCry (also known as Wanna Decryptor and WannaCryptor) infected over 230,000 systems in 150 countries. It was a particularly effective piece of malware because it not only encrypted data and held it for ransom, but it also spread like wildfire to other systems. Entire organizations found themselves looking at a ransom note on their screens and wondering what to do next. As the situation continues to unfold, please join us as Adam Myers, VP of Threat Intelligence at CrowdStrike, presents an in-depth look at the WannaCry ransomware. Register for this webcast to learn: -A complete technical understanding of the WannaCry threat -What analysts were seeing on the day of the WannaCry outbreak -How to prevent WannaCry infections and protect against ransomware going forward
An Inside Look At The WannaCry Ransomware Outbreak from CrowdStrike
]]>
1831 7 https://cdn.slidesharecdn.com/ss_thumbnails/crowdstikewannacrycrowdcastslides-170523183554-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting /slideshow/proactive-threat-hunting-gamechanging-endpoint-protection-beyond-alerting/75820526 overwatchcrowdcast-170509154435
Falcon OverWatch Experts Hunt 24/7 To Stop Incidents Before They Become Breaches Is your IT security team suffering from alert fatigue? For many organizations, chasing down every security alert can tax an already overburdened IT department, often resulting in a breach that might have been avoided. Adding to this challenge is an increase in sophisticated threats that strike so fast and frequently, traditional methods of investigation and response cant offer adequate protection. A new webcast from CrowdStrike, Proactive Threat Hunting: Game-Changing Endpoint Protection Above and Beyond Alerting, discusses why so many organizations are vulnerable to unseen threats and alert fatigue, and why having an approach that is both reactive and proactive is key. Youll also learn about Falcon OverWatch, CrowdStrikes proactive threat hunting service that investigates and responds to threats immediately, dramatically increasing your ability to react before a damaging breach occurs. Download the webcast slides to learn: --How constantly reacting to alerts prevents you from getting ahead of the potentially damaging threats designed to bypass standard endpoint security --Why an approach that includes proactive threat hunting, sometimes called Managed Detection and Response, is key to increasing protection against new and advanced threats --How CrowdStrike Falcon OverWatch can provide 24/7 managed threat hunting, augmenting your security efforts with a team of cyber intrusion detection analysts and investigators who proactively identify and prioritize incidents before they become damaging breaches ]]>

Falcon OverWatch Experts Hunt 24/7 To Stop Incidents Before They Become Breaches Is your IT security team suffering from alert fatigue? For many organizations, chasing down every security alert can tax an already overburdened IT department, often resulting in a breach that might have been avoided. Adding to this challenge is an increase in sophisticated threats that strike so fast and frequently, traditional methods of investigation and response cant offer adequate protection. A new webcast from CrowdStrike, Proactive Threat Hunting: Game-Changing Endpoint Protection Above and Beyond Alerting, discusses why so many organizations are vulnerable to unseen threats and alert fatigue, and why having an approach that is both reactive and proactive is key. Youll also learn about Falcon OverWatch, CrowdStrikes proactive threat hunting service that investigates and responds to threats immediately, dramatically increasing your ability to react before a damaging breach occurs. Download the webcast slides to learn: --How constantly reacting to alerts prevents you from getting ahead of the potentially damaging threats designed to bypass standard endpoint security --Why an approach that includes proactive threat hunting, sometimes called Managed Detection and Response, is key to increasing protection against new and advanced threats --How CrowdStrike Falcon OverWatch can provide 24/7 managed threat hunting, augmenting your security efforts with a team of cyber intrusion detection analysts and investigators who proactively identify and prioritize incidents before they become damaging breaches ]]>
Tue, 09 May 2017 15:44:35 GMT /slideshow/proactive-threat-hunting-gamechanging-endpoint-protection-beyond-alerting/75820526 CrowdStrike@slideshare.net(CrowdStrike) Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting CrowdStrike Falcon OverWatch Experts Hunt 24/7 To Stop Incidents Before They Become Breaches Is your IT security team suffering from alert fatigue? For many organizations, chasing down every security alert can tax an already overburdened IT department, often resulting in a breach that might have been avoided. Adding to this challenge is an increase in sophisticated threats that strike so fast and frequently, traditional methods of investigation and response cant offer adequate protection. A new webcast from CrowdStrike, Proactive Threat Hunting: Game-Changing Endpoint Protection Above and Beyond Alerting, discusses why so many organizations are vulnerable to unseen threats and alert fatigue, and why having an approach that is both reactive and proactive is key. Youll also learn about Falcon OverWatch, CrowdStrikes proactive threat hunting service that investigates and responds to threats immediately, dramatically increasing your ability to react before a damaging breach occurs. Download the webcast slides to learn: --How constantly reacting to alerts prevents you from getting ahead of the potentially damaging threats designed to bypass standard endpoint security --Why an approach that includes proactive threat hunting, sometimes called Managed Detection and Response, is key to increasing protection against new and advanced threats --How CrowdStrike Falcon OverWatch can provide 24/7 managed threat hunting, augmenting your security efforts with a team of cyber intrusion detection analysts and investigators who proactively identify and prioritize incidents before they become damaging breaches <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/overwatchcrowdcast-170509154435-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Falcon OverWatch Experts Hunt 24/7 To Stop Incidents Before They Become Breaches Is your IT security team suffering from alert fatigue? For many organizations, chasing down every security alert can tax an already overburdened IT department, often resulting in a breach that might have been avoided. Adding to this challenge is an increase in sophisticated threats that strike so fast and frequently, traditional methods of investigation and response cant offer adequate protection. A new webcast from CrowdStrike, Proactive Threat Hunting: Game-Changing Endpoint Protection Above and Beyond Alerting, discusses why so many organizations are vulnerable to unseen threats and alert fatigue, and why having an approach that is both reactive and proactive is key. Youll also learn about Falcon OverWatch, CrowdStrikes proactive threat hunting service that investigates and responds to threats immediately, dramatically increasing your ability to react before a damaging breach occurs. Download the webcast slides to learn: --How constantly reacting to alerts prevents you from getting ahead of the potentially damaging threats designed to bypass standard endpoint security --Why an approach that includes proactive threat hunting, sometimes called Managed Detection and Response, is key to increasing protection against new and advanced threats --How CrowdStrike Falcon OverWatch can provide 24/7 managed threat hunting, augmenting your security efforts with a team of cyber intrusion detection analysts and investigators who proactively identify and prioritize incidents before they become damaging breaches
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting from CrowdStrike
]]>
2869 5 https://cdn.slidesharecdn.com/ss_thumbnails/overwatchcrowdcast-170509154435-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM /slideshow/defending-against-threats-targeting-the-mac-platform/74960761 crowdstrikemacpreventioncrowdcast-170412225608
CrowdStrike Falcon with next-gen AV protects your Mac-based organization If your organization has moved to a Mac-based platform, or are considering it, you may be aware that threats targeting Mac devices are on the rise. A new webcast from CrowdStrike, "Defending Against Threats Targeting the Mac Platform" discusses how the increase in Mac adoptions has given rise to a new class of targeted threats and explains why standard security solutions can't protect you. In this CrowdCast, Peter Ingebrigtsen, as discussed why more companies are switching to the Mac platform, the new threats targeting Macs, and what you can do to better protect your organization. Download the slides to learn: Why more IT departments are switching to the Mac platform How new threats targeting Macs are able to bypass standard security measures How CrowdStrike's next-gen AV employs machine learning and behavioral analytics to defend against threats aimed at the Mac platform On-Demand CrowdCast Link: https://www.crowdstrike.com/resources/crowdcasts/defending-threats-targeting-mac-platform/]]>

CrowdStrike Falcon with next-gen AV protects your Mac-based organization If your organization has moved to a Mac-based platform, or are considering it, you may be aware that threats targeting Mac devices are on the rise. A new webcast from CrowdStrike, "Defending Against Threats Targeting the Mac Platform" discusses how the increase in Mac adoptions has given rise to a new class of targeted threats and explains why standard security solutions can't protect you. In this CrowdCast, Peter Ingebrigtsen, as discussed why more companies are switching to the Mac platform, the new threats targeting Macs, and what you can do to better protect your organization. Download the slides to learn: Why more IT departments are switching to the Mac platform How new threats targeting Macs are able to bypass standard security measures How CrowdStrike's next-gen AV employs machine learning and behavioral analytics to defend against threats aimed at the Mac platform On-Demand CrowdCast Link: https://www.crowdstrike.com/resources/crowdcasts/defending-threats-targeting-mac-platform/]]>
Wed, 12 Apr 2017 22:56:08 GMT /slideshow/defending-against-threats-targeting-the-mac-platform/74960761 CrowdStrike@slideshare.net(CrowdStrike) DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM CrowdStrike CrowdStrike Falcon with next-gen AV protects your Mac-based organization If your organization has moved to a Mac-based platform, or are considering it, you may be aware that threats targeting Mac devices are on the rise. A new webcast from CrowdStrike, "Defending Against Threats Targeting the Mac Platform" discusses how the increase in Mac adoptions has given rise to a new class of targeted threats and explains why standard security solutions can't protect you. In this CrowdCast, Peter Ingebrigtsen, as discussed why more companies are switching to the Mac platform, the new threats targeting Macs, and what you can do to better protect your organization. Download the slides to learn: Why more IT departments are switching to the Mac platform How new threats targeting Macs are able to bypass standard security measures How CrowdStrike's next-gen AV employs machine learning and behavioral analytics to defend against threats aimed at the Mac platform On-Demand CrowdCast Link: https://www.crowdstrike.com/resources/crowdcasts/defending-threats-targeting-mac-platform/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikemacpreventioncrowdcast-170412225608-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> CrowdStrike Falcon with next-gen AV protects your Mac-based organization If your organization has moved to a Mac-based platform, or are considering it, you may be aware that threats targeting Mac devices are on the rise. A new webcast from CrowdStrike, &quot;Defending Against Threats Targeting the Mac Platform&quot; discusses how the increase in Mac adoptions has given rise to a new class of targeted threats and explains why standard security solutions can&#39;t protect you. In this CrowdCast, Peter Ingebrigtsen, as discussed why more companies are switching to the Mac platform, the new threats targeting Macs, and what you can do to better protect your organization. Download the slides to learn: Why more IT departments are switching to the Mac platform How new threats targeting Macs are able to bypass standard security measures How CrowdStrike&#39;s next-gen AV employs machine learning and behavioral analytics to defend against threats aimed at the Mac platform On-Demand CrowdCast Link: https://www.crowdstrike.com/resources/crowdcasts/defending-threats-targeting-mac-platform/
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM from CrowdStrike
]]>
1210 3 https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikemacpreventioncrowdcast-170412225608-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard Approaches To Stop It? /slideshow/crowdstrike-crowdcast-is-ransomware-morphing-beyond-the-ability-of-standard-approaches-to-stop-it/74104898 crowdstrikeransomwarecc-170331235149
Learn how to prevent & detect even the most complex file-less ransomware exploits Ransomware continues to evolve as perpetrators develop new exploits with consequences that can be dramatic and immediate. The purveyors of ransomware continue to prosper with adversaries developing new strains such as Zepto and Cerber that are proving to be more challenging than ever. Other exploits can alter programmable logic controller (PLC) parameters and adversely impact mechanical systems. Clearly, new defense approaches are needed because organizations can no longer rely on backups and conventional security solutions to protect them. Join CrowdStrike Senior Security Architect Dan Brown as he offers details on these sophisticated new ransomware threats, and reveals recent innovations designed to offer better protection including new indicator of attack (IOA) behavioral analysis methodologies that can detect and prevent even the most complex file-less ransomware exploits. Attend this CrowdCast where Dan will discuss: --The challenges of defending against dangerous new variants, such as Zepto and Cerber --Real-world examples of ransomware in action and the sophisticated tactics being used by a variety of adversaries --How the CrowdStrike Falcon cloud-delivered platform can defend your organization against new super strains of ransomware that use sophisticated malware-free tactics ]]>

Learn how to prevent & detect even the most complex file-less ransomware exploits Ransomware continues to evolve as perpetrators develop new exploits with consequences that can be dramatic and immediate. The purveyors of ransomware continue to prosper with adversaries developing new strains such as Zepto and Cerber that are proving to be more challenging than ever. Other exploits can alter programmable logic controller (PLC) parameters and adversely impact mechanical systems. Clearly, new defense approaches are needed because organizations can no longer rely on backups and conventional security solutions to protect them. Join CrowdStrike Senior Security Architect Dan Brown as he offers details on these sophisticated new ransomware threats, and reveals recent innovations designed to offer better protection including new indicator of attack (IOA) behavioral analysis methodologies that can detect and prevent even the most complex file-less ransomware exploits. Attend this CrowdCast where Dan will discuss: --The challenges of defending against dangerous new variants, such as Zepto and Cerber --Real-world examples of ransomware in action and the sophisticated tactics being used by a variety of adversaries --How the CrowdStrike Falcon cloud-delivered platform can defend your organization against new super strains of ransomware that use sophisticated malware-free tactics ]]>
Fri, 31 Mar 2017 23:51:49 GMT /slideshow/crowdstrike-crowdcast-is-ransomware-morphing-beyond-the-ability-of-standard-approaches-to-stop-it/74104898 CrowdStrike@slideshare.net(CrowdStrike) CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard Approaches To Stop It? CrowdStrike Learn how to prevent & detect even the most complex file-less ransomware exploits Ransomware continues to evolve as perpetrators develop new exploits with consequences that can be dramatic and immediate. The purveyors of ransomware continue to prosper with adversaries developing new strains such as Zepto and Cerber that are proving to be more challenging than ever. Other exploits can alter programmable logic controller (PLC) parameters and adversely impact mechanical systems. Clearly, new defense approaches are needed because organizations can no longer rely on backups and conventional security solutions to protect them. Join CrowdStrike Senior Security Architect Dan Brown as he offers details on these sophisticated new ransomware threats, and reveals recent innovations designed to offer better protection including new indicator of attack (IOA) behavioral analysis methodologies that can detect and prevent even the most complex file-less ransomware exploits. Attend this CrowdCast where Dan will discuss: --The challenges of defending against dangerous new variants, such as Zepto and Cerber --Real-world examples of ransomware in action and the sophisticated tactics being used by a variety of adversaries --How the CrowdStrike Falcon cloud-delivered platform can defend your organization against new super strains of ransomware that use sophisticated malware-free tactics <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikeransomwarecc-170331235149-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn how to prevent &amp; detect even the most complex file-less ransomware exploits Ransomware continues to evolve as perpetrators develop new exploits with consequences that can be dramatic and immediate. The purveyors of ransomware continue to prosper with adversaries developing new strains such as Zepto and Cerber that are proving to be more challenging than ever. Other exploits can alter programmable logic controller (PLC) parameters and adversely impact mechanical systems. Clearly, new defense approaches are needed because organizations can no longer rely on backups and conventional security solutions to protect them. Join CrowdStrike Senior Security Architect Dan Brown as he offers details on these sophisticated new ransomware threats, and reveals recent innovations designed to offer better protection including new indicator of attack (IOA) behavioral analysis methodologies that can detect and prevent even the most complex file-less ransomware exploits. Attend this CrowdCast where Dan will discuss: --The challenges of defending against dangerous new variants, such as Zepto and Cerber --Real-world examples of ransomware in action and the sophisticated tactics being used by a variety of adversaries --How the CrowdStrike Falcon cloud-delivered platform can defend your organization against new super strains of ransomware that use sophisticated malware-free tactics
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard Approaches To Stop It? from CrowdStrike
]]>
1174 5 https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikeransomwarecc-170331235149-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
How to Replace Your Legacy Antivirus Solution with CrowdStrike /slideshow/how-to-replace-your-legacy-antivirus-solution-with-crowdstrike-73035840/73035840 thetimehascometoreplaceyourav-170310224258
THE TIME HAS COME TO REPLACE YOUR ANTIVIRUS SOLUTION Legacy AV products are failing to stop modern threats. Thats why AV replacement is a hot topic in the industry and why enterprises in every sector are looking for answers. As breaches continue to dominate the headlines, you need to know that there is a new approach that can close the wide security gap left by yesterdays AV solutions. Defending against todays sophisticated polymorphic threats requires new weapons and thats just what the CrowdStrike Falcon Platform delivers. The key to this new approach is going beyond malware to addressing the most complex and persistent cyber threats at every stage of the kill chain. CrowdStrike does this by combining next-gen antivirus, endpoint detection and response (EDR), and a managed threat hunting service all cloud-delivered with a single lightweight agent. In this CrowdCast, Dan Larson, VP, Product Marketing will discuss: --The typical challenges with legacy antivirus, from efficacy to complexity & bulky architecture --How CrowdStrike stands above competitive offerings by providing robust threat prevention leveraging artificial intelligence and machine learning --How Falcons lightweight sensor and cloud architecture dramatically reduces operational burden --How you can seamlessly migrate from legacy antivirus to CrowdStrike Falcon --Why CrowdStrike was positioned as a Visionary in the 2017 Gartner Magic Quadrant for Endpoint Protection Solutions and what it says about our standing as an effective AV replacement]]>

THE TIME HAS COME TO REPLACE YOUR ANTIVIRUS SOLUTION Legacy AV products are failing to stop modern threats. Thats why AV replacement is a hot topic in the industry and why enterprises in every sector are looking for answers. As breaches continue to dominate the headlines, you need to know that there is a new approach that can close the wide security gap left by yesterdays AV solutions. Defending against todays sophisticated polymorphic threats requires new weapons and thats just what the CrowdStrike Falcon Platform delivers. The key to this new approach is going beyond malware to addressing the most complex and persistent cyber threats at every stage of the kill chain. CrowdStrike does this by combining next-gen antivirus, endpoint detection and response (EDR), and a managed threat hunting service all cloud-delivered with a single lightweight agent. In this CrowdCast, Dan Larson, VP, Product Marketing will discuss: --The typical challenges with legacy antivirus, from efficacy to complexity & bulky architecture --How CrowdStrike stands above competitive offerings by providing robust threat prevention leveraging artificial intelligence and machine learning --How Falcons lightweight sensor and cloud architecture dramatically reduces operational burden --How you can seamlessly migrate from legacy antivirus to CrowdStrike Falcon --Why CrowdStrike was positioned as a Visionary in the 2017 Gartner Magic Quadrant for Endpoint Protection Solutions and what it says about our standing as an effective AV replacement]]>
Fri, 10 Mar 2017 22:42:58 GMT /slideshow/how-to-replace-your-legacy-antivirus-solution-with-crowdstrike-73035840/73035840 CrowdStrike@slideshare.net(CrowdStrike) How to Replace Your Legacy Antivirus Solution with CrowdStrike CrowdStrike THE TIME HAS COME TO REPLACE YOUR ANTIVIRUS SOLUTION Legacy AV products are failing to stop modern threats. Thats why AV replacement is a hot topic in the industry and why enterprises in every sector are looking for answers. As breaches continue to dominate the headlines, you need to know that there is a new approach that can close the wide security gap left by yesterdays AV solutions. Defending against todays sophisticated polymorphic threats requires new weapons and thats just what the CrowdStrike Falcon Platform delivers. The key to this new approach is going beyond malware to addressing the most complex and persistent cyber threats at every stage of the kill chain. CrowdStrike does this by combining next-gen antivirus, endpoint detection and response (EDR), and a managed threat hunting service all cloud-delivered with a single lightweight agent. In this CrowdCast, Dan Larson, VP, Product Marketing will discuss: --The typical challenges with legacy antivirus, from efficacy to complexity & bulky architecture --How CrowdStrike stands above competitive offerings by providing robust threat prevention leveraging artificial intelligence and machine learning --How Falcons lightweight sensor and cloud architecture dramatically reduces operational burden --How you can seamlessly migrate from legacy antivirus to CrowdStrike Falcon --Why CrowdStrike was positioned as a Visionary in the 2017 Gartner Magic Quadrant for Endpoint Protection Solutions and what it says about our standing as an effective AV replacement <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thetimehascometoreplaceyourav-170310224258-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> THE TIME HAS COME TO REPLACE YOUR ANTIVIRUS SOLUTION Legacy AV products are failing to stop modern threats. Thats why AV replacement is a hot topic in the industry and why enterprises in every sector are looking for answers. As breaches continue to dominate the headlines, you need to know that there is a new approach that can close the wide security gap left by yesterdays AV solutions. Defending against todays sophisticated polymorphic threats requires new weapons and thats just what the CrowdStrike Falcon Platform delivers. The key to this new approach is going beyond malware to addressing the most complex and persistent cyber threats at every stage of the kill chain. CrowdStrike does this by combining next-gen antivirus, endpoint detection and response (EDR), and a managed threat hunting service all cloud-delivered with a single lightweight agent. In this CrowdCast, Dan Larson, VP, Product Marketing will discuss: --The typical challenges with legacy antivirus, from efficacy to complexity &amp; bulky architecture --How CrowdStrike stands above competitive offerings by providing robust threat prevention leveraging artificial intelligence and machine learning --How Falcons lightweight sensor and cloud architecture dramatically reduces operational burden --How you can seamlessly migrate from legacy antivirus to CrowdStrike Falcon --Why CrowdStrike was positioned as a Visionary in the 2017 Gartner Magic Quadrant for Endpoint Protection Solutions and what it says about our standing as an effective AV replacement
How to Replace Your Legacy Antivirus Solution with CrowdStrike from CrowdStrike
]]>
3114 9 https://cdn.slidesharecdn.com/ss_thumbnails/thetimehascometoreplaceyourav-170310224258-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Cloud-Enabled: The Future of Endpoint Security /slideshow/cloudenabled-the-future-of-endpoint-security/72428833 futureofendpointsecuritycc-170221194042
As the cost and complexity of deploying and maintaining on-premises security continues to rise, many endpoint security providers have embraced the cloud as the ideal way to deliver their solutions. Yet, incorporating cloud services into legacy architectures limits their ability to fully engage the tremendous power the cloud offers. CrowdStrike Falcon recognized the value of cloud-delivery from the beginning, developing architecture built from the ground up to take full advantage of the cloud. CrowdStrikes cloud-powered endpoint security not only ensures rapid deployment and infinite scalability, it increases your security posture by enabling real-time advanced threat protection across even the largest, distributed enterprises. In this CrowdCast, Jackie Castelli, Sr. Product Manager will discuss: The advantages of endpoint protection purpose-built for the cloud why it allows you to take full advantage of the clouds power The common concerns organizations face when evaluating cloud-based endpoint security - can privacy and control be assured? Real-world examples demonstrating the unique advantages offered by CrowdStrike Falcons innovative cloud-powered platform]]>

As the cost and complexity of deploying and maintaining on-premises security continues to rise, many endpoint security providers have embraced the cloud as the ideal way to deliver their solutions. Yet, incorporating cloud services into legacy architectures limits their ability to fully engage the tremendous power the cloud offers. CrowdStrike Falcon recognized the value of cloud-delivery from the beginning, developing architecture built from the ground up to take full advantage of the cloud. CrowdStrikes cloud-powered endpoint security not only ensures rapid deployment and infinite scalability, it increases your security posture by enabling real-time advanced threat protection across even the largest, distributed enterprises. In this CrowdCast, Jackie Castelli, Sr. Product Manager will discuss: The advantages of endpoint protection purpose-built for the cloud why it allows you to take full advantage of the clouds power The common concerns organizations face when evaluating cloud-based endpoint security - can privacy and control be assured? Real-world examples demonstrating the unique advantages offered by CrowdStrike Falcons innovative cloud-powered platform]]>
Tue, 21 Feb 2017 19:40:42 GMT /slideshow/cloudenabled-the-future-of-endpoint-security/72428833 CrowdStrike@slideshare.net(CrowdStrike) Cloud-Enabled: The Future of Endpoint Security CrowdStrike As the cost and complexity of deploying and maintaining on-premises security continues to rise, many endpoint security providers have embraced the cloud as the ideal way to deliver their solutions. Yet, incorporating cloud services into legacy architectures limits their ability to fully engage the tremendous power the cloud offers. CrowdStrike Falcon recognized the value of cloud-delivery from the beginning, developing architecture built from the ground up to take full advantage of the cloud. CrowdStrikes cloud-powered endpoint security not only ensures rapid deployment and infinite scalability, it increases your security posture by enabling real-time advanced threat protection across even the largest, distributed enterprises. In this CrowdCast, Jackie Castelli, Sr. Product Manager will discuss: The advantages of endpoint protection purpose-built for the cloud why it allows you to take full advantage of the clouds power The common concerns organizations face when evaluating cloud-based endpoint security - can privacy and control be assured? Real-world examples demonstrating the unique advantages offered by CrowdStrike Falcons innovative cloud-powered platform <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/futureofendpointsecuritycc-170221194042-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As the cost and complexity of deploying and maintaining on-premises security continues to rise, many endpoint security providers have embraced the cloud as the ideal way to deliver their solutions. Yet, incorporating cloud services into legacy architectures limits their ability to fully engage the tremendous power the cloud offers. CrowdStrike Falcon recognized the value of cloud-delivery from the beginning, developing architecture built from the ground up to take full advantage of the cloud. CrowdStrikes cloud-powered endpoint security not only ensures rapid deployment and infinite scalability, it increases your security posture by enabling real-time advanced threat protection across even the largest, distributed enterprises. In this CrowdCast, Jackie Castelli, Sr. Product Manager will discuss: The advantages of endpoint protection purpose-built for the cloud why it allows you to take full advantage of the clouds power The common concerns organizations face when evaluating cloud-based endpoint security - can privacy and control be assured? Real-world examples demonstrating the unique advantages offered by CrowdStrike Falcons innovative cloud-powered platform
Cloud-Enabled: The Future of Endpoint Security from CrowdStrike
]]>
3148 8 https://cdn.slidesharecdn.com/ss_thumbnails/futureofendpointsecuritycc-170221194042-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Bear Hunting: History and Attribution of Russian Intelligence Operations /slideshow/bear-hunting-history-and-attribution-of-russian-intelligence-operations/70872247 crowdstrikebearhuntingcrowdcast-170110170157
Learn about the history of Russian intelligence influence operations and the cyber actors implementing them today. In June 2016, CrowdStrike exposed unprecedented efforts by Russian intelligence services to interfere in the U.S. election via the hacking and subsequent leaking of information from political organizations and individuals. Election manipulation was not a new activity for the Russians - they have engaged in these influence operations consistently for the better part of the last two decades inside and outside of Russia. In this CrowdCast, CrowdStrike experts Adam Meyers, VP of Intelligence, and Dmitri Alperovitch, Co-Founder & CTO, will provide a detailed overview of the history of Russian intelligence influence operations going back decades and provide a deep dive overview of various BEAR (including FANCY BEAR AND COZY BEAR) intrusion sets and their tactics, techniques and procedures (TTPs). They will also discuss the considerable attribution evidence that CrowdStrike has collected from a variety of investigations into their operations and lay out the case for the Russian government connection to these hacks.]]>

Learn about the history of Russian intelligence influence operations and the cyber actors implementing them today. In June 2016, CrowdStrike exposed unprecedented efforts by Russian intelligence services to interfere in the U.S. election via the hacking and subsequent leaking of information from political organizations and individuals. Election manipulation was not a new activity for the Russians - they have engaged in these influence operations consistently for the better part of the last two decades inside and outside of Russia. In this CrowdCast, CrowdStrike experts Adam Meyers, VP of Intelligence, and Dmitri Alperovitch, Co-Founder & CTO, will provide a detailed overview of the history of Russian intelligence influence operations going back decades and provide a deep dive overview of various BEAR (including FANCY BEAR AND COZY BEAR) intrusion sets and their tactics, techniques and procedures (TTPs). They will also discuss the considerable attribution evidence that CrowdStrike has collected from a variety of investigations into their operations and lay out the case for the Russian government connection to these hacks.]]>
Tue, 10 Jan 2017 17:01:57 GMT /slideshow/bear-hunting-history-and-attribution-of-russian-intelligence-operations/70872247 CrowdStrike@slideshare.net(CrowdStrike) Bear Hunting: History and Attribution of Russian Intelligence Operations CrowdStrike Learn about the history of Russian intelligence influence operations and the cyber actors implementing them today. In June 2016, CrowdStrike exposed unprecedented efforts by Russian intelligence services to interfere in the U.S. election via the hacking and subsequent leaking of information from political organizations and individuals. Election manipulation was not a new activity for the Russians - they have engaged in these influence operations consistently for the better part of the last two decades inside and outside of Russia. In this CrowdCast, CrowdStrike experts Adam Meyers, VP of Intelligence, and Dmitri Alperovitch, Co-Founder & CTO, will provide a detailed overview of the history of Russian intelligence influence operations going back decades and provide a deep dive overview of various BEAR (including FANCY BEAR AND COZY BEAR) intrusion sets and their tactics, techniques and procedures (TTPs). They will also discuss the considerable attribution evidence that CrowdStrike has collected from a variety of investigations into their operations and lay out the case for the Russian government connection to these hacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikebearhuntingcrowdcast-170110170157-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn about the history of Russian intelligence influence operations and the cyber actors implementing them today. In June 2016, CrowdStrike exposed unprecedented efforts by Russian intelligence services to interfere in the U.S. election via the hacking and subsequent leaking of information from political organizations and individuals. Election manipulation was not a new activity for the Russians - they have engaged in these influence operations consistently for the better part of the last two decades inside and outside of Russia. In this CrowdCast, CrowdStrike experts Adam Meyers, VP of Intelligence, and Dmitri Alperovitch, Co-Founder &amp; CTO, will provide a detailed overview of the history of Russian intelligence influence operations going back decades and provide a deep dive overview of various BEAR (including FANCY BEAR AND COZY BEAR) intrusion sets and their tactics, techniques and procedures (TTPs). They will also discuss the considerable attribution evidence that CrowdStrike has collected from a variety of investigations into their operations and lay out the case for the Russian government connection to these hacks.
Bear Hunting: History and Attribution of Russian Intelligence Operations from CrowdStrike
]]>
5120 12 https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikebearhuntingcrowdcast-170110170157-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
You Can't Stop The Breach Without Prevention And Detection /slideshow/you-cant-stop-the-breach-without-prevention-and-detection/67472196 forrestercrowdstrike10-161020200043
Crowdstrike And Guest Forrester Share Keys To Mastering The Endpoint CrowdStrike VP, Product Management Rod Murchison and guest speaker Chris Sherman, Forrester Research analyst, will discuss how modern approaches must balance prevention with detection capabilities in the context of an overall security strategy. Ultimately, this will give security professionals the ability to better deal with the influx of new device types and data access requirements while reducing the likelihood of compromise. In this CrowdCast, Forrester and CrowdStrike will present: - Forresters Targeted-Attack Hierarchy of Needs - The six core requirements to a successful endpoint security strategy - Preparing for and responding to targeted intrusions and attacks - How CrowdStrike lines up with Forresters Hierarchy of Needs framework]]>

Crowdstrike And Guest Forrester Share Keys To Mastering The Endpoint CrowdStrike VP, Product Management Rod Murchison and guest speaker Chris Sherman, Forrester Research analyst, will discuss how modern approaches must balance prevention with detection capabilities in the context of an overall security strategy. Ultimately, this will give security professionals the ability to better deal with the influx of new device types and data access requirements while reducing the likelihood of compromise. In this CrowdCast, Forrester and CrowdStrike will present: - Forresters Targeted-Attack Hierarchy of Needs - The six core requirements to a successful endpoint security strategy - Preparing for and responding to targeted intrusions and attacks - How CrowdStrike lines up with Forresters Hierarchy of Needs framework]]>
Thu, 20 Oct 2016 20:00:42 GMT /slideshow/you-cant-stop-the-breach-without-prevention-and-detection/67472196 CrowdStrike@slideshare.net(CrowdStrike) You Can't Stop The Breach Without Prevention And Detection CrowdStrike Crowdstrike And Guest Forrester Share Keys To Mastering The Endpoint CrowdStrike VP, Product Management Rod Murchison and guest speaker Chris Sherman, Forrester Research analyst, will discuss how modern approaches must balance prevention with detection capabilities in the context of an overall security strategy. Ultimately, this will give security professionals the ability to better deal with the influx of new device types and data access requirements while reducing the likelihood of compromise. In this CrowdCast, Forrester and CrowdStrike will present: - Forresters Targeted-Attack Hierarchy of Needs - The six core requirements to a successful endpoint security strategy - Preparing for and responding to targeted intrusions and attacks - How CrowdStrike lines up with Forresters Hierarchy of Needs framework <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forrestercrowdstrike10-161020200043-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Crowdstrike And Guest Forrester Share Keys To Mastering The Endpoint CrowdStrike VP, Product Management Rod Murchison and guest speaker Chris Sherman, Forrester Research analyst, will discuss how modern approaches must balance prevention with detection capabilities in the context of an overall security strategy. Ultimately, this will give security professionals the ability to better deal with the influx of new device types and data access requirements while reducing the likelihood of compromise. In this CrowdCast, Forrester and CrowdStrike will present: - Forresters Targeted-Attack Hierarchy of Needs - The six core requirements to a successful endpoint security strategy - Preparing for and responding to targeted intrusions and attacks - How CrowdStrike lines up with Forresters Hierarchy of Needs framework
You Can't Stop The Breach Without Prevention And Detection from CrowdStrike
]]>
1368 6 https://cdn.slidesharecdn.com/ss_thumbnails/forrestercrowdstrike10-161020200043-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Battling Unknown Malware with Machine Learning /slideshow/battling-unknown-malware-with-machine-learning/66689817 machinelearningcrowdcast-161003213448
Learn about the first signature-less engine to be integrated into VirusTotal. In this CrowdCast deck, CrowdStrikes Chief Scientist Dr. Sven Krasser offers an exclusive look under the hood of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe. Topics will include: - What CrowdStrike Falcon machine learning is and how it works - How to interpret results of machine learning-based threat detection - How users can benefit from the CrowdStrike Falcon machine learning engine - How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform]]>

Learn about the first signature-less engine to be integrated into VirusTotal. In this CrowdCast deck, CrowdStrikes Chief Scientist Dr. Sven Krasser offers an exclusive look under the hood of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe. Topics will include: - What CrowdStrike Falcon machine learning is and how it works - How to interpret results of machine learning-based threat detection - How users can benefit from the CrowdStrike Falcon machine learning engine - How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform]]>
Mon, 03 Oct 2016 21:34:48 GMT /slideshow/battling-unknown-malware-with-machine-learning/66689817 CrowdStrike@slideshare.net(CrowdStrike) Battling Unknown Malware with Machine Learning CrowdStrike Learn about the first signature-less engine to be integrated into VirusTotal. In this CrowdCast deck, CrowdStrikes Chief Scientist Dr. Sven Krasser offers an exclusive look under the hood of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe. Topics will include: - What CrowdStrike Falcon machine learning is and how it works - How to interpret results of machine learning-based threat detection - How users can benefit from the CrowdStrike Falcon machine learning engine - How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/machinelearningcrowdcast-161003213448-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn about the first signature-less engine to be integrated into VirusTotal. In this CrowdCast deck, CrowdStrikes Chief Scientist Dr. Sven Krasser offers an exclusive look under the hood of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe. Topics will include: - What CrowdStrike Falcon machine learning is and how it works - How to interpret results of machine learning-based threat detection - How users can benefit from the CrowdStrike Falcon machine learning engine - How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform
Battling Unknown Malware with Machine Learning from CrowdStrike
]]>
2051 2 https://cdn.slidesharecdn.com/ss_thumbnails/machinelearningcrowdcast-161003213448-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Java Journal & Pyresso: A Python-Based Framework for Debugging Java /CrowdStrike/java-journal-pyresso-a-pythonbased-framework-for-debugging-java javajournalpyspresso-160624232225
Despite the multitude of Java decompilers available, we often have the need to debug or trace malicious or obfuscated Java bytecode. Existing Java debuggers and tracers are mostly targeted towards Java developers, are closed-source, and are not meant to handle malicious or obfuscated targets. We present a new open-source cross-platform framework for debugging Java, written completely in Python, designed specifically for reverse engineering. We also present a Java method call tracer as a sample Python application that utilizes this framework.]]>

Despite the multitude of Java decompilers available, we often have the need to debug or trace malicious or obfuscated Java bytecode. Existing Java debuggers and tracers are mostly targeted towards Java developers, are closed-source, and are not meant to handle malicious or obfuscated targets. We present a new open-source cross-platform framework for debugging Java, written completely in Python, designed specifically for reverse engineering. We also present a Java method call tracer as a sample Python application that utilizes this framework.]]>
Fri, 24 Jun 2016 23:22:24 GMT /CrowdStrike/java-journal-pyresso-a-pythonbased-framework-for-debugging-java CrowdStrike@slideshare.net(CrowdStrike) Java Journal & Pyresso: A Python-Based Framework for Debugging Java CrowdStrike Despite the multitude of Java decompilers available, we often have the need to debug or trace malicious or obfuscated Java bytecode. Existing Java debuggers and tracers are mostly targeted towards Java developers, are closed-source, and are not meant to handle malicious or obfuscated targets. We present a new open-source cross-platform framework for debugging Java, written completely in Python, designed specifically for reverse engineering. We also present a Java method call tracer as a sample Python application that utilizes this framework. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/javajournalpyspresso-160624232225-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Despite the multitude of Java decompilers available, we often have the need to debug or trace malicious or obfuscated Java bytecode. Existing Java debuggers and tracers are mostly targeted towards Java developers, are closed-source, and are not meant to handle malicious or obfuscated targets. We present a new open-source cross-platform framework for debugging Java, written completely in Python, designed specifically for reverse engineering. We also present a Java method call tracer as a sample Python application that utilizes this framework.
Java Journal & Pyresso: A Python-Based Framework for Debugging Java from CrowdStrike
]]>
1898 6 https://cdn.slidesharecdn.com/ss_thumbnails/javajournalpyspresso-160624232225-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Venom /slideshow/venom-55186860/55186860 venom-ruxcon-151117025118-lva1-app6892
Dive into to the fascinating journey of this years VENOM vulnerability discovery. Learn how hypervisors work and where researchers should look for critical vulnerabilities. Find out how the VENOM vulnerability was found and why it went unnoticed for so many years. At Ruxcon 2016, Jason Geffner discussed the challenges of a coordinated vendor disclosure process.]]>

Dive into to the fascinating journey of this years VENOM vulnerability discovery. Learn how hypervisors work and where researchers should look for critical vulnerabilities. Find out how the VENOM vulnerability was found and why it went unnoticed for so many years. At Ruxcon 2016, Jason Geffner discussed the challenges of a coordinated vendor disclosure process.]]>
Tue, 17 Nov 2015 02:51:18 GMT /slideshow/venom-55186860/55186860 CrowdStrike@slideshare.net(CrowdStrike) Venom CrowdStrike Dive into to the fascinating journey of this years VENOM vulnerability discovery. Learn how hypervisors work and where researchers should look for critical vulnerabilities. Find out how the VENOM vulnerability was found and why it went unnoticed for so many years. At Ruxcon 2016, Jason Geffner discussed the challenges of a coordinated vendor disclosure process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/venom-ruxcon-151117025118-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Dive into to the fascinating journey of this years VENOM vulnerability discovery. Learn how hypervisors work and where researchers should look for critical vulnerabilities. Find out how the VENOM vulnerability was found and why it went unnoticed for so many years. At Ruxcon 2016, Jason Geffner discussed the challenges of a coordinated vendor disclosure process.
Venom from CrowdStrike
]]>
1608 7 https://cdn.slidesharecdn.com/ss_thumbnails/venom-ruxcon-151117025118-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
CrowdCasts Monthly: When Pandas Attack /CrowdStrike/crowdcasts-monthly-when-pandas-attack crowdcastwhenpandasattack-140829090453-phpapp01
When Pandas Attack: How to detect, attribute, and respond to malware-free intrusions. What can you do to protect your networks when todays advanced attackers are evading IOC-based detection? Learn how to find an attacker when there is no malware, no command and control, and file-based artifacts. ]]>

When Pandas Attack: How to detect, attribute, and respond to malware-free intrusions. What can you do to protect your networks when todays advanced attackers are evading IOC-based detection? Learn how to find an attacker when there is no malware, no command and control, and file-based artifacts. ]]>
Fri, 29 Aug 2014 09:04:53 GMT /CrowdStrike/crowdcasts-monthly-when-pandas-attack CrowdStrike@slideshare.net(CrowdStrike) CrowdCasts Monthly: When Pandas Attack CrowdStrike When Pandas Attack: How to detect, attribute, and respond to malware-free intrusions. What can you do to protect your networks when todays advanced attackers are evading IOC-based detection? Learn how to find an attacker when there is no malware, no command and control, and file-based artifacts. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastwhenpandasattack-140829090453-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When Pandas Attack: How to detect, attribute, and respond to malware-free intrusions. What can you do to protect your networks when todays advanced attackers are evading IOC-based detection? Learn how to find an attacker when there is no malware, no command and control, and file-based artifacts.
CrowdCasts Monthly: When Pandas Attack from CrowdStrike
]]>
4653 7 https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastwhenpandasattack-140829090453-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
CrowdCast Monthly: Operationalizing Intelligence /slideshow/crowdcast-monthly-operationalizing-intelligence-34141777/34141777 crowdcastmonthlyoperationalizingintelligence-140430143751-phpapp02
In todays threat environment, adversaries are constantly profiling and attacking your corporate infrastructure to access and collect your intellectual property, proprietary data, and trade secrets. Now, more than ever, Threat Intelligence is increasingly important for organizations who want to proactively defend against advanced threat actors. While many organizations today are collecting massive amount of threat intelligence, are they able to translate the information into an effective defense strategy? View the slides now to learn about threat intelligence for operational purposes, including real-world demonstrations of how to consume intelligence and integrate it with existing security infrastructure. Learn how to prioritize response by differentiating between commodity and targeted attacks and develop a defense that responds to specific methods used by advanced attackers.]]>

In todays threat environment, adversaries are constantly profiling and attacking your corporate infrastructure to access and collect your intellectual property, proprietary data, and trade secrets. Now, more than ever, Threat Intelligence is increasingly important for organizations who want to proactively defend against advanced threat actors. While many organizations today are collecting massive amount of threat intelligence, are they able to translate the information into an effective defense strategy? View the slides now to learn about threat intelligence for operational purposes, including real-world demonstrations of how to consume intelligence and integrate it with existing security infrastructure. Learn how to prioritize response by differentiating between commodity and targeted attacks and develop a defense that responds to specific methods used by advanced attackers.]]>
Wed, 30 Apr 2014 14:37:51 GMT /slideshow/crowdcast-monthly-operationalizing-intelligence-34141777/34141777 CrowdStrike@slideshare.net(CrowdStrike) CrowdCast Monthly: Operationalizing Intelligence CrowdStrike In todays threat environment, adversaries are constantly profiling and attacking your corporate infrastructure to access and collect your intellectual property, proprietary data, and trade secrets. Now, more than ever, Threat Intelligence is increasingly important for organizations who want to proactively defend against advanced threat actors. While many organizations today are collecting massive amount of threat intelligence, are they able to translate the information into an effective defense strategy? View the slides now to learn about threat intelligence for operational purposes, including real-world demonstrations of how to consume intelligence and integrate it with existing security infrastructure. Learn how to prioritize response by differentiating between commodity and targeted attacks and develop a defense that responds to specific methods used by advanced attackers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastmonthlyoperationalizingintelligence-140430143751-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In todays threat environment, adversaries are constantly profiling and attacking your corporate infrastructure to access and collect your intellectual property, proprietary data, and trade secrets. Now, more than ever, Threat Intelligence is increasingly important for organizations who want to proactively defend against advanced threat actors. While many organizations today are collecting massive amount of threat intelligence, are they able to translate the information into an effective defense strategy? View the slides now to learn about threat intelligence for operational purposes, including real-world demonstrations of how to consume intelligence and integrate it with existing security infrastructure. Learn how to prioritize response by differentiating between commodity and targeted attacks and develop a defense that responds to specific methods used by advanced attackers.
CrowdCast Monthly: Operationalizing Intelligence from CrowdStrike
]]>
6782 8 https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastmonthlyoperationalizingintelligence-140430143751-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
CrowdCasts Monthly: Going Beyond the Indicator /CrowdStrike/crowdcasts-monthly-going-beyond-the-indicator crowdcastmonthlygoingbeyondtheindicator-140402131921-phpapp01
Learn more about CrowdStrike Services. Request a free consultation on Proactive Response and Incident Response offerings: response.crowdstrike.com/services/]]>

Learn more about CrowdStrike Services. Request a free consultation on Proactive Response and Incident Response offerings: response.crowdstrike.com/services/]]>
Wed, 02 Apr 2014 13:19:21 GMT /CrowdStrike/crowdcasts-monthly-going-beyond-the-indicator CrowdStrike@slideshare.net(CrowdStrike) CrowdCasts Monthly: Going Beyond the Indicator CrowdStrike Learn more about CrowdStrike Services. Request a free consultation on Proactive Response and Incident Response offerings: response.crowdstrike.com/services/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastmonthlygoingbeyondtheindicator-140402131921-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn more about CrowdStrike Services. Request a free consultation on Proactive Response and Incident Response offerings: response.crowdstrike.com/services/
CrowdCasts Monthly: Going Beyond the Indicator from CrowdStrike
]]>
3649 6 https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastmonthlygoingbeyondtheindicator-140402131921-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
CrowdCasts Monthly: You Have an Adversary Problem /slideshow/crowd-casts-monthly-you-have-an-adversary-problem/27262315 crowdcastsmonthlyyouhaveanadversaryproblem-131016140939-phpapp01
You Have an Adversary Problem. Who's Targeting You and Why? Nation-States, Hacktivists, Industrial Spies, and Organized Criminal Groups are attacking your enterprise on a daily basis. Their goals range from espionage for technology advancement and disruption of critical infrastructure to for-profit theft of trade secrets and supporting a political agenda. You no longer have a malware problem, you have an adversary problem, and you must incorporate an intelligence-driven approach to your security strategy. During this CrowdCast, you will learn how to: Incorporate Actionable Intelligence into your existing enterprise security infrastructure Quickly understand the capabilities and artifacts of targeted attacked tradecraft Gain insight into the motivations and intentions of targeted attackers Make informed decisions based off of specific threat intelligence ]]>

You Have an Adversary Problem. Who's Targeting You and Why? Nation-States, Hacktivists, Industrial Spies, and Organized Criminal Groups are attacking your enterprise on a daily basis. Their goals range from espionage for technology advancement and disruption of critical infrastructure to for-profit theft of trade secrets and supporting a political agenda. You no longer have a malware problem, you have an adversary problem, and you must incorporate an intelligence-driven approach to your security strategy. During this CrowdCast, you will learn how to: Incorporate Actionable Intelligence into your existing enterprise security infrastructure Quickly understand the capabilities and artifacts of targeted attacked tradecraft Gain insight into the motivations and intentions of targeted attackers Make informed decisions based off of specific threat intelligence ]]>
Wed, 16 Oct 2013 14:09:38 GMT /slideshow/crowd-casts-monthly-you-have-an-adversary-problem/27262315 CrowdStrike@slideshare.net(CrowdStrike) CrowdCasts Monthly: You Have an Adversary Problem CrowdStrike You Have an Adversary Problem. Who's Targeting You and Why? Nation-States, Hacktivists, Industrial Spies, and Organized Criminal Groups are attacking your enterprise on a daily basis. Their goals range from espionage for technology advancement and disruption of critical infrastructure to for-profit theft of trade secrets and supporting a political agenda. You no longer have a malware problem, you have an adversary problem, and you must incorporate an intelligence-driven approach to your security strategy. During this CrowdCast, you will learn how to: Incorporate Actionable Intelligence into your existing enterprise security infrastructure Quickly understand the capabilities and artifacts of targeted attacked tradecraft Gain insight into the motivations and intentions of targeted attackers Make informed decisions based off of specific threat intelligence <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastsmonthlyyouhaveanadversaryproblem-131016140939-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> You Have an Adversary Problem. Who&#39;s Targeting You and Why? Nation-States, Hacktivists, Industrial Spies, and Organized Criminal Groups are attacking your enterprise on a daily basis. Their goals range from espionage for technology advancement and disruption of critical infrastructure to for-profit theft of trade secrets and supporting a political agenda. You no longer have a malware problem, you have an adversary problem, and you must incorporate an intelligence-driven approach to your security strategy. During this CrowdCast, you will learn how to: Incorporate Actionable Intelligence into your existing enterprise security infrastructure Quickly understand the capabilities and artifacts of targeted attacked tradecraft Gain insight into the motivations and intentions of targeted attackers Make informed decisions based off of specific threat intelligence
CrowdCasts Monthly: You Have an Adversary Problem from CrowdStrike
]]>
21363 7 https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastsmonthlyyouhaveanadversaryproblem-131016140939-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
CrowdCasts Monthly: Mitigating Pass the Hash /slideshow/crowd-cast-monthly-mitigating-pass-the-hash/26618483 crowdcastmonthlymitigatingpassthehash-130927085734-phpapp01
Sixteen years later and Pass the Hash (PtH) is still one of the most common techniques a targeted attacker can use to compromise a network. There have been many blogs, webinars, and papers covering different PtH mitigation strategies. With all the information about this particular security vulnerability, networks are still continuously attacked and infiltrated using this technique. It is time to look at the problem from a holistic approach and apply the communities' collective intelligence to make this process one of the most difficult for a targeted attacker to use. ]]>

Sixteen years later and Pass the Hash (PtH) is still one of the most common techniques a targeted attacker can use to compromise a network. There have been many blogs, webinars, and papers covering different PtH mitigation strategies. With all the information about this particular security vulnerability, networks are still continuously attacked and infiltrated using this technique. It is time to look at the problem from a holistic approach and apply the communities' collective intelligence to make this process one of the most difficult for a targeted attacker to use. ]]>
Fri, 27 Sep 2013 08:57:34 GMT /slideshow/crowd-cast-monthly-mitigating-pass-the-hash/26618483 CrowdStrike@slideshare.net(CrowdStrike) CrowdCasts Monthly: Mitigating Pass the Hash CrowdStrike Sixteen years later and Pass the Hash (PtH) is still one of the most common techniques a targeted attacker can use to compromise a network. There have been many blogs, webinars, and papers covering different PtH mitigation strategies. With all the information about this particular security vulnerability, networks are still continuously attacked and infiltrated using this technique. It is time to look at the problem from a holistic approach and apply the communities' collective intelligence to make this process one of the most difficult for a targeted attacker to use. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastmonthlymitigatingpassthehash-130927085734-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Sixteen years later and Pass the Hash (PtH) is still one of the most common techniques a targeted attacker can use to compromise a network. There have been many blogs, webinars, and papers covering different PtH mitigation strategies. With all the information about this particular security vulnerability, networks are still continuously attacked and infiltrated using this technique. It is time to look at the problem from a holistic approach and apply the communities&#39; collective intelligence to make this process one of the most difficult for a targeted attacker to use.
CrowdCasts Monthly: Mitigating Pass the Hash from CrowdStrike
]]>
2780 5 https://cdn.slidesharecdn.com/ss_thumbnails/crowdcastmonthlymitigatingpassthehash-130927085734-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
End-to-End Analysis of a Domain Generating Algorithm Malware Family /slideshow/endtoend-analysis-of-a-domain-generating/25244628 end-to-endanalysisofadomaingeneratingalgorithmmalwarefamily-slides-130814103104-phpapp02
Select malware families have used Domain Generating Algorithms (DGAs) over the past few years in an effort to evade traditional domain blacklists, allow for fast-flux domain registration and usage, and evade analysts abilities to predict attackers control servers. While novel work has been done by both private industry and academia with respect to detecting DGA-related network traffic, this presentation demonstrates end-to-end analysis of a DGA malware family, from binary deobfuscation to DGA analysis, to sinkholing, to domain registrant research, to attribution of the malwares author and accomplices. The malware family discussed in this presentation has thousands of active variants currently running on the Internet and has managed to stay off of the radar of all antivirus firms. Missed this presentation at Black Hat 2013? Take a look at the slides from Jason Geffner's session. This presentation brought to light how this malware is tied to an underground campaign that has been active for at least the past six years.]]>

Select malware families have used Domain Generating Algorithms (DGAs) over the past few years in an effort to evade traditional domain blacklists, allow for fast-flux domain registration and usage, and evade analysts abilities to predict attackers control servers. While novel work has been done by both private industry and academia with respect to detecting DGA-related network traffic, this presentation demonstrates end-to-end analysis of a DGA malware family, from binary deobfuscation to DGA analysis, to sinkholing, to domain registrant research, to attribution of the malwares author and accomplices. The malware family discussed in this presentation has thousands of active variants currently running on the Internet and has managed to stay off of the radar of all antivirus firms. Missed this presentation at Black Hat 2013? Take a look at the slides from Jason Geffner's session. This presentation brought to light how this malware is tied to an underground campaign that has been active for at least the past six years.]]>
Wed, 14 Aug 2013 10:31:04 GMT /slideshow/endtoend-analysis-of-a-domain-generating/25244628 CrowdStrike@slideshare.net(CrowdStrike) End-to-End Analysis of a Domain Generating Algorithm Malware Family CrowdStrike Select malware families have used Domain Generating Algorithms (DGAs) over the past few years in an effort to evade traditional domain blacklists, allow for fast-flux domain registration and usage, and evade analysts abilities to predict attackers control servers. While novel work has been done by both private industry and academia with respect to detecting DGA-related network traffic, this presentation demonstrates end-to-end analysis of a DGA malware family, from binary deobfuscation to DGA analysis, to sinkholing, to domain registrant research, to attribution of the malwares author and accomplices. The malware family discussed in this presentation has thousands of active variants currently running on the Internet and has managed to stay off of the radar of all antivirus firms. Missed this presentation at Black Hat 2013? Take a look at the slides from Jason Geffner's session. This presentation brought to light how this malware is tied to an underground campaign that has been active for at least the past six years. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/end-to-endanalysisofadomaingeneratingalgorithmmalwarefamily-slides-130814103104-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Select malware families have used Domain Generating Algorithms (DGAs) over the past few years in an effort to evade traditional domain blacklists, allow for fast-flux domain registration and usage, and evade analysts abilities to predict attackers control servers. While novel work has been done by both private industry and academia with respect to detecting DGA-related network traffic, this presentation demonstrates end-to-end analysis of a DGA malware family, from binary deobfuscation to DGA analysis, to sinkholing, to domain registrant research, to attribution of the malwares author and accomplices. The malware family discussed in this presentation has thousands of active variants currently running on the Internet and has managed to stay off of the radar of all antivirus firms. Missed this presentation at Black Hat 2013? Take a look at the slides from Jason Geffner&#39;s session. This presentation brought to light how this malware is tied to an underground campaign that has been active for at least the past six years.
End-to-End Analysis of a Domain Generating Algorithm Malware Family from CrowdStrike
]]>
9364 24 https://cdn.slidesharecdn.com/ss_thumbnails/end-to-endanalysisofadomaingeneratingalgorithmmalwarefamily-slides-130814103104-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-CrowdStrike-48x48.jpg?cb=1523357406 CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrikes core technology, the Falcon platform, stops breaches by preventing and responding to all types of attacks both malware and malware-free. CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Stop Breaches. Period. Find out how: www.crowdstrike.com www.crowdstrike.com https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikeesgstateofendpointcc-171009192626-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/state-of-endpoint-security-the-buyers-mindset/80622240 State of Endpoint Secu... https://cdn.slidesharecdn.com/ss_thumbnails/crowdstrikefilelesscrowdcastss-170725183300-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/understanding-fileless-or-nonmalware-attacks-and-how-to-stop-them/78244887 Understanding Fileless... https://cdn.slidesharecdn.com/ss_thumbnails/slidesharecrowdstrikedatanapping-170622182532-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-extortion-defending-against-digital-shakedowns/77184842 Cyber Security Extorti...