CrowdStrike Hacking Exposed with participating partner, Optiv

CrowdStrike Hacking Exposed Meet Up with Participating Partner, Optiv
Join us for lunch to observe new attack techniques, defeat ransomware, spearphishing attacks and malware-free intrusions and test your elite hacking skills. 

Be Hacker Aware
Observe new attack techniques that have been uncovered by CrowdStrike's threat hunting and incident response teams including: initial attack vectors and persistence, lateral movement and data exfiltration techniques.

See New Techniques
Discover new techniques for dealing with malware, ransomware, spearphishing, and malware-free intrusions. Leave knowing how to determine what activity is happening in your environment and how easily you can identify and stop that activity.

Bring Your Own Attack
Using malware, exploits or other hacking tools, try to exfiltrate data from a system protected by CrowdStrike Falcon, a unified next-gen av, edr and managed threat hunting platform, delivered via the cloud. Win Beats by Dr Dre Headphones.


Location:
Hyde Park Prime Steakhouse - 21 Main Street Westlake, OH 44145

Due to limited capacity at the venue, we will only accept 2 guests per company. We apologize for any inconvenience. 

Thursday, April 6th at 11:30am - 1:30pm


Event Agenda


Networking Breakfast 
Commences at 8:30am
The Changing Threat Landscape - Jerry Dixon
Strategic highlights from our Global Threat Report 
Mind the Gap - Kieran Mongan
Defining cybercrime risk and creating a robust and adaptable security program framework.
Building a Resilient Incident Response Program - David Boda 
Building a program that can defend against a breach
Briefing Concludes 
Concludes at 10:30am. Followed by refreshments and networking

Download a free sample

Please, in order to be able to read our free chapter, put your email in the form below and you'll receive in your inbox our awesome free sample.

Event Agenda

Registration 11:30AM

Lunch and Networking 11:45AM
Welcome: CrowdStrike and Optiv 12:00PM
Next Gen AV, EDR & Managed Threat Hunting: Seeing & Stopping Attacks
12:10PM
Bring Your Own Attack: Put Falcon Host to the test! Participants are invited to attack a system protected by Falcon Host. Attendees will get real time visibility into the attack and an understanding of how Falcon Host detects and prevents targeted attacks. 
1:15PM

Event Close
1:30PM

Event Agenda


 Falcon2.png

Agenda test
test
test
test
test
test




Event Speakers












BASIC PACKAGE

  • PDF Book
  • Work Guide

PREMIUM PACKAGE

  • PDF Book
  • Work Guide
  • 9 Interviews
  • 5hs Consultation

MASTER PACKAGE

  • PDF Book
  • Work Guide
  • 15 Interviews
  • 10hs Consultation
  • Workshop Entrance
  • Design Materials