SM program by Marsh offers a ground-breaking new way to help businesses make more informed choices about cybersecurity products to manage cyber risk.

During this webcast, Marsh will provide an overview of the Cyber Catalyst program with a discussion of best practices for a multi-faceted approach to cyber risk management, followed by a vendor panel discussion looking at prominent cyber risks and solutions with cybersecurity experts from Forescout, CrowdStrike, and AXA XL.

"/>

Cyber Threat Intelligence Panel Discussion & Briefing - Northern Europe

Hosted by CrowdStrike, Anomali and Silobreaker

Tuesday, 30th March 2021 | 2PM BST

The threat landscape is becoming increasingly difficult to navigate. Not only are attackers developing new techniques to obtain access to security systems, but threats are growing in complexity and scale.

Join CrowdStrike, Anomali and Silobreaker for a virtual panel discussing the key security incidents and issues impacting Northern Europe including:

  • Top threats on the horizon and the importance of an inter-disciplinary threat intelligence strategy.
  • Ransomware attacks and Business Email Compromises: how are you addressing them?
  • Insider threats posed by working from home: how a distributed workforce impacts the security of your supply chain.
Speakers:

Derek Buchanen, EMEA Threat Intel Advisor
CrowdStrike

AJ Nash, Senior Director of Cyber Intelligence Strategy
Anomali

Max Mansson, Client Director
Silobreaker


Anna Rozehnalova, Head of Customer Success
Silobreaker

REGISTER FOR

THIS UPCOMING CROWDCAST

Information submitted on this form may be associated with other information we have collected and used pursuant to our  Privacy Notice.

Also please be aware that by completing this form you agree to data sharing between CrowdStrike and the named partners.
Market Presence


REGISTER TODAY TO:

  • Hear about the various moving pieces of the current wave of ransomware attacks and how you can use high fidelity threat intelligence to mitigate the risks associated with ransomware.
  • Discover the phases of a successful attack as well as the various types of actors involved in each of the stages.
  • Discover how you can sift through vast amounts of open-source intelligence and pair this with underground intelligence to help build a complete picture of the threat landscape
  • Learn about the fundamentals of ensuring maximal visibility and awareness of impending threats in your IT environment

Protecting companies of all sizes

From Small Business to Enterprise