Falcon Complete Live Attack & Defend Demo Falcon Cloud Security
On-Demand
In this webinar, we will dive into a realistic attack scenario where a Java web server installed in a Docker container is exploited. Our team of seasoned Falcon Complete analysts will demonstrate how they leverage the cutting-edge capabilities of Falcon Cloud Security to swiftly and effectively investigate the attack. You will witness the power of the Falcon Complete team as they perform live remediation within the cloud workload environment, thwarting the threat and protecting sensitive data.
Key Takeaways from the Webinar:
- Understanding the attack scenario: We will provide insights into the exploitation of a Java web server within a Docker container and the potential risks it poses to your organisation's security.
- Introducing Falcon Cloud Security: Explore the comprehensive features and benefits of securing cloud workload environments and fortifying your defences against sophisticated threats.
- Live investigation and remediation: Witness our Falcon Complete analysts in action as they utilise Falcon Cloud Security to investigate the attack, identify the root cause, and promptly remediate the threat.
- Best practices and proactive defence: Learn effective strategies and preventive measures to safeguard your Java web servers running in Docker containers and enhance your overall security posture.
This webinar is a must-attend for IT professionals, cybersecurity enthusiasts, and anyone interested in extending or strengthening their knowledge of cloud workload protection and securing Java web servers in Docker containers.
THE Forrester WaveTM
Enterprise Detection & Response, Q1 2020
Get Forrester’s evaluation of the 12 most significant EDR vendors
Try It FREE
CROWDSTRIKE EXECUTIVE SPEAKERS
Get peace of mind, and join the world's most secure businesses using CrowdStrike to stop breaches.
Download this report to learn:
- The roles that threat hunting and cyber threat intelligence play in Forrester’s assessment that “CrowdStrike continues to lead on strategy and execution”
- What differentiates CrowdStrike in the EDR space and why it received the highest possible score in 11 criteria
- Why Forrester states that CrowdStrike® Falcon capabilities are often the “benchmark other client references use when describing capabilities they wish were available in their selected products”
Related Resources
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Download2020 Global Threat Report
Get an overview of the trends in attackers tactics and practical recommendations to keep your organization protected.
DownloadCase Study: Financial Services Comp...
See how a finanical services leader rolled out CrowdStrike to over 60,000 endpoints and 15,000 servers.
DownloadCase Study: Greenhill & Co.
Hear how CIO John Shaffer, provides end-to-end protection for Greenhill's global operations.
DownloadData Sheet: CrowdStrike Falcon For...
See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadEvents
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadAndy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
-
Highly Targeted
Financial services is the #1 targeted industry by cybercriminals.
-
Regulatory Compliance
Financial services companies must achieve compliance or risk heavy fines and loss of business.
-
Sophisticated & Persistent Attacks
Financial institutions are required to protect customer data regardless of where it is located.
Text
Text
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
SEE HOW CROWDSTRIKE STACKS UP
Try it free
FALCON PREVENT
FOR HOME USE
Enable employees who use a home system to access corporate resources to work safely and productively. To learn more, visit the Falcon Prevent for Home Use FAQ.
Get Falcon PreventFalcon Firewall Management: Host Firewall
Falcon Firewall Management provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies
Start Free TrialBlack Hat USA
August 6-11, 2022
Location: Mandalay Bay Convention Center, Las Vegas
Schedule
Friday
August 6
Saturday
August 7
Sunday
August 8
Monday
August 9
Tuesday
August 10
Wednesday
August 11
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
SPONSORSHIPS
PROUDLY SPONSORED BY OUR ALLIANCE PARTNERS
Related Resources Points
Related Resources Sub Points
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Bethany Cooper
Senior Analyst, Falcon Complete
Bethany is a “digital forensicator” and malware analyst with a passion for learning. She has dedicated her career battling evil in cyberspace.
Justin Allen
Falcon Complete Lead
A three year veteran of CrowdStrike, prior to that Justin spent over ten years with the Royal Australian Air Force working as an engineer in cyber security incident response.
Show All