How to Protect Your Small Business from Cyber Attacks
On-Demand CrowdCast
It’s no surprise that 70% of cyberattacks hit small to medium sized businesses last year. Cyber criminals know – and target SMBs – as most lack enterprise-level security, staff or time to identify and defend against them.
Understanding your company's risk, and how to best protect your business – when budgets and resources are limited - is your first line of defense.
Join Kendra Kendall, CrowdStrike Technical Marketing Engineer, and Liviu Arsene, Director Threat Research and Reporting to learn:
- Why small- and medium-sized businesses are targeted
- Types of attacks that threat actors use against small and medium businesses
- Top industries most frequently targeted and at higher risk
- How CrowdStrike can help protect your business from attack
THE Forrester WaveTM
Enterprise Detection & Response, Q1 2020
Get Forrester’s evaluation of the 12 most significant EDR vendors
Try It FREE
CROWDSTRIKE EXECUTIVE SPEAKERS
Get peace of mind, and join the world's most secure businesses using CrowdStrike to stop breaches.

Download this report to learn:
- The roles that threat hunting and cyber threat intelligence play in Forrester’s assessment that “CrowdStrike continues to lead on strategy and execution”
- What differentiates CrowdStrike in the EDR space and why it received the highest possible score in 11 criteria
- Why Forrester states that CrowdStrike® Falcon capabilities are often the “benchmark other client references use when describing capabilities they wish were available in their selected products”
Related Resources

Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Download
2020 Global Threat Report
Get an overview of the trends in attackers tactics and practical recommendations to keep your organization protected.
Download
Case Study: Financial Services Comp...
See how a finanical services leader rolled out CrowdStrike to over 60,000 endpoints and 15,000 servers.
Download
Case Study: Greenhill & Co.
Hear how CIO John Shaffer, provides end-to-end protection for Greenhill's global operations.
Download
Data Sheet: CrowdStrike Falcon For...
See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks.
Download
Forrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
Download
Forrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
Download
Forrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
Download
Forrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadRelated Resources
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Download
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
-
Highly Targeted
Financial services is the #1 targeted industry by cybercriminals.
-
Regulatory Compliance
Financial services companies must achieve compliance or risk heavy fines and loss of business.
-
Sophisticated & Persistent Attacks
Financial institutions are required to protect customer data regardless of where it is located.
Text
Text
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
SEE HOW CROWDSTRIKE STACKS UP
Try it free
FALCON PREVENT
FOR HOME USE
Enable employees who use a home system to access corporate resources to work safely and productively. To learn more, visit the Falcon Prevent for Home Use FAQ.
Get Falcon PreventFalcon Firewall Management: Host Firewall
Falcon Firewall Management provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies
Start Free TrialBlack Hat USA
August 6-11, 2022
Location: Mandalay Bay Convention Center, Las Vegas
Schedule
Friday
August 6
Saturday
August 7
Sunday
August 8
Monday
August 9
Tuesday
August 10
Wednesday
August 11
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
Registration
Front Desk
Opening Keynote & Breakfast
Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander
Main Hall
Trainings
Presenter: Craig Young | Tripwire
Rose Hall, 2nd Floor
SPONSORSHIPS
PROUDLY SPONSORED BY OUR ALLIANCE PARTNERS










Related Resources Points
Related Resources Sub Points
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Liviu Arsene
Director, Threat Research and Reporting
Liviu Arsene is a Director, Threat Research and Reporting, at CrowdStrike, with a strong background in security and technology. He has been in the cybersecurity industry for over a decade, and his experience spans malware research, outbreaks and the threat landscape. He has authored/co-authored investigations and reports on threats across a wide variety of industry verticals. He researches global trends and developments in cybersecurity, focusing on malware and threats while assessing their impact on infrastructures. His passions revolve around technologies and gadgets, particularly on their security applications and long-term strategic impact. When he's not online, he's either taking something apart or putting it back together again.
Kendra Kendall
Technical Marketing Engineer
Kendra Kendall is a Technical Marketing Engineer at CrowdStrike. She has worked in a variety of information technology roles – including help desk, systems administration, and in pre-sales engineering. She leverages her experience in being the user of cybersecurity technologies and working on the IT operations side in her role at CrowdStrike. She is passionate about cybersecurity, technical enablement, and IT operations.
Show All