- ET
Online

Monthly CrowdTalks & Threat Intel Briefs

Want to have a better understanding of the CrowdStrike Falcon Platform modules? Or to learn more about some of today’s most important threat intelligence topics and nation-state adversaries? Then join CrowdStrike and DLT for the CrowdStrike Connect Series! The series will feature monthly CrowdTalks and Threat Intel Briefs. More information can be found below. Sign up today!

CrowdTalks
The CrowdStrike Falcon Platform offers a unique combination of technology and intelligence, all in a comprehensive platform for endpoint security. The industry’s first true security cloud, CrowdStrike Falcon deploys in minutes to deliver real-time protection and actionable threat intelligence from day one and seamlessly unifies next-gen AV with best-in-class endpoint detection and response, backed by 24/7 managed threat hunting. Join us to learn how to leverage this single agent and single platform to deliver outcomes that go beyond endpoint security!

Threat Intel Briefs
The public sector is fighting each and every day to stay one step ahead of our nations adversaries. CrowdStrike enables more thorough threat analysis and better operational outcomes by providing customers with a more complete picture of the cyber threat landscape and high-fidelity insight into adversaries’ TTPs, infrastructure, capabilities, and motive and intent. With new threats coming online every day, harnessing next-generation technology and practices is the only way to stop attackers in their tracks. Join us so you can stay one step ahead of your adversaries!

CS 2021 year in review and 2020 Predictions
2021 Cyber Year in Review and 2020 Predictions. Download this session to hear insights from CrowdStrike’s leading experts: Adam Meyers, SVP, Intelligence, CrowdStrike and Jake Kwon, Strategic Threat Advisor – Federal, CrowdStrike, as they reflect on 2021, discuss potential trends public sector organizations will face in 2022, and how they can protect their equities against the continual challenges posed in cyberspace.

Register Now
eCrime Social Engineering Operations
eCrime Social Engineering Operations. eCrime actors have continually sought to capitalize on current events, human emotion, and sensitive data to manipulate real human behaviors as part of a cyber attack. This brief covers the necessary circumstances and infrastructure used in recent social engineering techniques to lure past victims – including public sector and educational institutions – into providing information or performing actions that support financially-motivated crimes.

Watch On-Demand
Nowhere to Hide: A Review of CrowdStrike’s Threat Hunting Findings Over the Last Year
Nowhere to Hide: A Review of CrowdStrike’s Threat Hunting Findings Over the Last Year. This month’s threat intelligence briefing for government and education will focus on the just released 2021 Nowhere to Hide Report. For yet another year, CrowdStrike’s OverWatch threat hunting service managed to disrupt a record number of interactive intrusion attempts by identifying malicious activity early and stopping adversaries in their tracks.

Watch On-Demand
CrowdScore and Incidents: Incidents with Lateral Movement
CrowdScore and Incidents: Incidents with Lateral Movement. CrowdScore was designed to make your job easier and more efficient by automatically gathering and measuring the Threat Level in real-time. Learn more.

Request Now
Incident Response, Strategic Advisory and Technical Services
Cloud Security. We will cover everything you need to know from Cloud Security, Lessons Learned & Best Practices To Secure The New Normal Multi-Cloud World.

Request Now
Incident Response and Remote Remediation, PSFalcon
Incident Response and Remote Remediation, PSFalcon. With special guest speaker from SC School District.

Request Now
Watch the Threats, Response, and Understanding the Data
Responding to and Hunting for Threats. Understanding and Using the Data. Join us to dive into the data, and understand what to look for when observing or looking for artifacts within your environment.

Request Now
CrowdStrike Webinar Series Brief #6: Blurring The Line Between Statecraft and Tradecraft
Brief #6: Blurring The Line Between Statecraft and Tradecraft, Speaker Jason Rivera. Join CrowdStrike as they evaluate advanced nation-state adversaries are engaging in cyber operations that blur the lines between nation-state objectives and organized crime.

Watch Now
CrowdStrike Tech Talk: Using CrowdStrike for Software Savings
Tech Talk: Using CrowdStrike for Software Savings Since CrowdStrike collects a vast amount of benign meta-data, there are many non-security use cases you can tap into such as Identify unused software licenses, finding insights on application Issues, and get situational awareness.

Request Now
CrowdStrike Tech Talk: SOC Triad
Tech Talk: Delivering the SOC Visibility Triad Join us we illustrate a comprehensive approach to detecting and responding to threats that include the network, endpoints and everything in between.

Request Now
Emerging Threat: Access Brokers & the Implications to State & Federal Government Entities
Emerging Threat: Access Brokers & the Implications to State & Federal Government Entities, Speaker Jason Rivers. Join CrowdStrike for a brief to review emerging threats targeting federal, state, and local governments.

Watch Now
CS Connect Series: Identity Protection and Zero trust
Identity Protection and Zero Trust. Join to see insights and analytics across your enterprise, seeing live threats and events as they happen with no logs. We'll also discuss Zero Trust policy challenges against live events, integrating with MFA and SSO to extend the reach of each into legacy and the cloud alike.

Request Now
CrowdStrike Connect Series: Understanding the Primary Drivers and Capabilities of Nation-State Threat, Speaker Jason Rivera
Understanding the Primary Drivers and Capabilities of Nation-State Threats, Speaker Jason Rivers. Join CrowdStrike for a brief to review the Big 4 nation-state threat actors, which include Russia, China, Iran, and North Korea.

Watch Now
CS Connect: Digital Risk Reconnaissance Across the Dark Web and Beyond
Digital Risk Reconnaissance Across the Dark Web and Beyond Join our upcoming Tech Talk as we go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better protect their brand, employees, technology, and sensitive data.

Request Now
CrowdStrike Connect Series: Getting Ahead of RansomwareOperations Lifecycle
Getting Ahead of the Ransomware Operations Lifecycle, speaker Jason Rivera. Join as we discuss CrowdStrike’s most current understanding regarding the ever-prevalent ransomware threat, and to characterize observations around how the ransomware ecosystem has evolved over the last couple years.

Watch Now
Zero Trust With CrowdStrike and Zscaler
Zero Trust With CrowdStrike and Zscaler Watch this Tech Talk on-demand as CrowdStrike and Zscaler cover Zero Trust capabilities to bring you endpoint to Application Security.

Click for Another Chance
CrowdStrike and AWS: Security and Compliance
CrowdStrike and AWS: Security and Compliance Join the September Tech Talk and learn more about how to comply with critical security requirements.

Tuesday, Sept 21st -- 1:00p.m., EST

Register Now

Threat Intelligence Resources

DLT Solutions brings you the most up-to-date resources to keep you informed on CrowdStrike Threat Intelligence reporting. CrowdStrike’s groundbreaking intelligence reports present customers and the global cybersecurity community with the latest developments and defenses for an increasingly dangerous threat landscape.

 

Padlock superimposed on U.S. flag

Understanding the Impact of Election Interference Campaigns This Election Day
During a recent webinar entitled “Protecting Our Nation’s Election Infrastructure in 2020,” Adam Meyers, SVP of Intelligence at CrowdStrike, explained the motivations behind attacks launched by threat actors who are targeting government agencies and private companies. He also explained the methods and tools that these malicious actors are using in an attempt to influence elections and shape opinions.

 

Ballot going into a ballot box. Text reads: Election Day 2020: How CrowdStrike is Using Technology to Protect Voter Data

Election Day 2020: How CrowdStrike is Using Technology to Protect Voter Data
Adam Meyers, SVP of Intelligence at CrowdStrike, explains how CrowdStrike tracks threat actors from different countries by code names and how CrowdStrike Intelligence tracks sophisticated (techniques tactics and procedures (TTPs). Adam offers insights into how his team not only observes these threats, but also explains the tools that both nation-states and eCriminals use, such as phishing, propaganda, and human enable operations.