Falcon Complete Live Attack & Defend Demo Falcon Cloud Security

On-Demand

In this webinar, we will dive into a realistic attack scenario where a Java web server installed in a Docker container is exploited. Our team of seasoned Falcon Complete analysts will demonstrate how they leverage the cutting-edge capabilities of Falcon Cloud Security to swiftly and effectively investigate the attack. You will witness the power of the Falcon Complete team as they perform live remediation within the cloud workload environment, thwarting the threat and protecting sensitive data.

Key Takeaways from the Webinar:

  • Understanding the attack scenario: We will provide insights into the exploitation of a Java web server within a Docker container and the potential risks it poses to your organisation's security.
  • Introducing Falcon Cloud Security: Explore the comprehensive features and benefits of securing cloud workload environments and fortifying your defences against sophisticated threats.
  • Live investigation and remediation: Witness our Falcon Complete analysts in action as they utilise Falcon Cloud Security to investigate the attack, identify the root cause, and promptly remediate the threat.
  • Best practices and proactive defence: Learn effective strategies and preventive measures to safeguard your Java web servers running in Docker containers and enhance your overall security posture.

This webinar is a must-attend for IT professionals, cybersecurity enthusiasts, and anyone interested in extending or strengthening their knowledge of cloud workload protection and securing Java web servers in Docker containers.

Register Today

Read More

THE Forrester WaveTM

Enterprise Detection & Response, Q1 2020

Get Forrester’s evaluation of the 12 most significant EDR vendors

Try It FREE

CROWDSTRIKE EXECUTIVE SPEAKERS

Get peace of mind, and join the world's most secure businesses using CrowdStrike to stop breaches.

Deloitte
Market Presence

Download this report to learn:

  • The roles that threat hunting and cyber threat intelligence play in Forrester’s assessment that “CrowdStrike continues to lead on strategy and execution”
  • What differentiates CrowdStrike in the EDR space and why it received the highest possible score in 11 criteria
  • Why Forrester states that CrowdStrike® Falcon capabilities are often the “benchmark other client references use when describing capabilities they wish were available in their selected products”
Read Now
Case Study: Oak Hill Advisors

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download
2020 Global Threat Report

2020 Global Threat Report

Get an overview of the trends in attackers tactics and practical recommendations to keep your organization protected.

Download
Case Study: Financial Services Comp...

Case Study: Financial Services Comp...

See how a finanical services leader rolled out CrowdStrike to over 60,000 endpoints and 15,000 servers.

Download
Case Study: Greenhill & Co.

Case Study: Greenhill & Co.

Hear how CIO John Shaffer, provides end-to-end protection for Greenhill's global operations.

Download
Data Sheet: CrowdStrike Falcon For...

Data Sheet: CrowdStrike Falcon For...

See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
View More

Events

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download
View More
Video Thumbnail
Play Buttom

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

  • Highly Targeted

    Financial services is the #1 targeted industry by cybercriminals.

  • Regulatory Compliance

    Financial services companies must achieve compliance or risk heavy fines and loss of business.

  • Sophisticated & Persistent Attacks

    Financial institutions are required to protect customer data regardless of where it is located.

Text

Text

Video Thumbnail
Play Buttom

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

SEE HOW CROWDSTRIKE STACKS UP

Try it free

Information submitted on this form may be associated with other information we have collected and used pursuant to our  Privacy Notice.

FALCON PREVENT
FOR HOME USE

Enable employees who use a home system to access corporate resources to work safely and productively. To learn more, visit the Falcon Prevent for Home Use FAQ.

Get Falcon Prevent

Falcon Firewall Management: Host Firewall

Falcon Firewall Management provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies

Start Free Trial

Black Hat USA

Calander

August 6-11, 2022

Location: Mandalay Bay Convention Center, Las Vegas

Schedule

Friday

August 6

Saturday

August 7

Sunday

August 8

Monday

August 9

Tuesday

August 10

Wednesday

August 11

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

SPONSORSHIPS

PROUDLY SPONSORED BY OUR ALLIANCE PARTNERS

Related Resources Points

Related Resources Sub Points

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Bethany Cooper

Bethany Cooper

Senior Analyst, Falcon Complete


Bethany is a “digital forensicator” and malware analyst with a passion for learning. She has dedicated her career battling evil in cyberspace.

Justin Allen

Justin Allen

Falcon Complete Lead


A three year veteran of CrowdStrike, prior to that Justin spent over ten years with the Royal Australian Air Force working as an engineer in cyber security incident response.

Daniel Parker

Daniel Parker

Principal Analyst, Falcon Complete


Dan has been a part of our Falcon Complete team for two years now and sits as one of our Principal Analysts. He brings a background in SOC Incident Response and Monitoring as well as over ten years in the industry.

Brendan Yaun

Brendan Yaun

Senior Analyst, Falcon Complete


Brendan joined CrowdStrike as a Senior Analyst for Falcon Complete last year. Prior to joining CrowdStrike, he spent nine years in the Australian Army, before joining the Department of Defence as a Cyber Security Specialist.

Jessica Liu

Megan Dolores

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Debra Carrol

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Jessica Liu

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Megan Dolores

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Debra Carrol

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Show All