This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.


Register for Seattle Under ATT&CK: Putting Today's Cyber Threats in Focus with MITRE Framework

Seattle Under ATT&CK: Putting Today's Cyber Threats in Focus with MITRE Framework

Information submitted on this form may be associated with other information we have collected and used pursuant to our Privacy Notice

Seattle Under ATT&CK: Putting Today's Cyber Threats in Focus with MITRE Framework

EDR and threat hunting provide an unprecedented level of visibility into your enterprise, which is critical to understanding malicious actors' ever-changing behaviors and TTPs. CrowdStrike is positioned on the front lines of cloud-native EDR, supported by Falcon OverWatch, home of the industry's leading managed threat hunters. This combination of data + expertise unlocks the deepest levels of visibility into the behaviors of today's threat actors, and drives important insights for building effective defenses.

Join CrowdStrike's Karl Scheuerman for new perspectives on the most important and unique tactics and techniques in use by today's adversaries. You will see how old techniques have evolved new twists, as well as new developments that highlight the dynamic nature of the cybersecurity threats. Seen through the lens of MITRE ATT&CK, you'll walk away with a clear and concise understanding of today's latest threats, and what actions you can take to protect your organization.

Registration and Continental Breakfast 9:30 - 10:00AM
Welcome & Introductions
Understanding MITRE ATT&CK
Current behavior trends with real-world case studies
10:00 - 11:15AM
Morning Break 11:15 - 11:30AM
Current behavior trends with real-world case studies (continued)
Demonstration - Achieving full-spectrum visibility (a.k.a. “The MITRE Demo”)
11:30 - 1:00PM
Wrap Up and Networking
1:00 - 2:00PM


  • Understand current attack behaviors in use by today’s intruders, from experts who observe their activities every day
  • Leverage MITRE ATT&CK to put threats in focus, with clear language that is easy to explain across your organization
  • Come away with quick, actionable plans you can use to stop today’s adversaries and prevent breaches
  • Learn the best practices you need to stay ahead of the adversary: detect threats in 1 minute, investigate in 10 minutes, and remediate in 60 minutes.


If you manage a security operations center; are a security analyst or incident responder; or threat hunter this immersive and interactive seminar will help you build a more mature proactive hunting program, and identify unknown, undetected threats before they become a mega-breach.

*We offer 3 hours of CPE Credits for this workshop. You will receive your certificate during the session.


Send us your questions for the CrowdStrike team to address during the Q&A. Please submit your questions to [email protected].

CrowdStrike Expert

Karl Scheuerman, Senior Strategic Intrusion Analyst, CrowdStrike

Karl Scheuerman is a Senior Strategic Intrusion Analyst at CrowdStrike where his duties have included threat hunting and strategic research on adversary activity. Karl began his career as an Air Force intelligence officer and he continues to serve part-time in the Air National Guard as the Director of Operations for a cyber intelligence squadron. Prior to joining Crowdstrike, he also worked as a cyber threat analyst for the Department of Energy's Pacific Northwest National Laboratory. Karl earned a Bachelor of Science degree from the U.S. Air Force Academy and a Master of Public Policy degree with an emphasis in International Security from the University of Maryland, College Park and he holds multiple SANS certifications.