Nordic CrowdStrike Days June
CrowdStrike is happy to invite you to our next CrowdStrike Days in Copenhagen or Stockholm.
Denmark
Date: Wednesday, 14 June 2023
Time: 12:30 - 17:30 CEST
Location: Langelinie Pavillonen, Langelinie 10, 2100 Copenhagen
Sweden
Date: Thursday, 15 June 2023
Time: 12:30 - 17:30 CEST
Location: 7A Odenplan, Norrtullsgatan 6, 113 26 Stockholm
Nordics / Virtual
Date: Wednesday, 14 June 2023
Time: 13:30 - 15:45 CEST
CrowdStrike is happy to invite you to our next CrowdStrike Days in Copenhagen or Stockholm. We have put together an exciting agenda with top speakers like CrowdStrike’s CTO EMEA Zeki Turedi and Zscaler’s CISO EMEA, Tony Fergusson, who will provide you with the latest updates on important cyber security topics, covering:
- The rise of the criminally motivated threat actor
- Zero Trust
- Incident Response
Don’t miss the opportunities to network with experts and peers during the networking sessions.
If you are unable to join the in-person event, you can join us at the virtual event.
Seats are limited - sign up now to save your seat.
REGISTER TODAY
THE Forrester WaveTM
Enterprise Detection & Response, Q1 2020
Get Forrester’s evaluation of the 12 most significant EDR vendors
Try It FREE
CROWDSTRIKE EXECUTIVE SPEAKERS
Get peace of mind, and join the world's most secure businesses using CrowdStrike to stop breaches.
Download this report to learn:
- The roles that threat hunting and cyber threat intelligence play in Forrester’s assessment that “CrowdStrike continues to lead on strategy and execution”
- What differentiates CrowdStrike in the EDR space and why it received the highest possible score in 11 criteria
- Why Forrester states that CrowdStrike® Falcon capabilities are often the “benchmark other client references use when describing capabilities they wish were available in their selected products”
Related Resources
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Download2020 Global Threat Report
Get an overview of the trends in attackers tactics and practical recommendations to keep your organization protected.
DownloadCase Study: Financial Services Comp...
See how a finanical services leader rolled out CrowdStrike to over 60,000 endpoints and 15,000 servers.
DownloadCase Study: Greenhill & Co.
Hear how CIO John Shaffer, provides end-to-end protection for Greenhill's global operations.
DownloadData Sheet: CrowdStrike Falcon For...
See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadRelated Resources
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadAndy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
-
Highly Targeted
Financial services is the #1 targeted industry by cybercriminals.
-
Regulatory Compliance
Financial services companies must achieve compliance or risk heavy fines and loss of business.
-
Sophisticated & Persistent Attacks
Financial institutions are required to protect customer data regardless of where it is located.
Text
Text
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
SEE HOW CROWDSTRIKE STACKS UP
Try it free
FALCON PREVENT
FOR HOME USE
Enable employees who use a home system to access corporate resources to work safely and productively. To learn more, visit the Falcon Prevent for Home Use FAQ.
Get Falcon PreventFalcon Firewall Management: Host Firewall
Falcon Firewall Management provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies
Start Free TrialNordic CrowdStrike Days June
June 14 - 15, 2023
COPENHAGEN
June 14
STOCKHOLM
June 15
VIRTUAL
June 14
Monday
August 9
Tuesday
August 10
Wednesday
August 11
Arrival and light lunch
Welcome & Introduction
The rise of the criminally motivated threat actor
Speaker: Zeki Turedi | CTO EMEA, CrowdStrike
SPIDER, a criminally motivated threat actor who harnesses multiple toolsets to take unsuspected organisations to ransom. 2022 has seen the change in how criminal organisations (SPIDER) target and victimise unexpected organisations. The actor has learnt, pivoted and changed tactics. This keynote session will provide a review of the latest trends and evolution of the SPIDER as well detail how we all can jointly defend and protect against them.
A platform approach to cyber security
Organizations need visibility and control across all security domains such as endpoint, identity, cloud, web, email, network, and firewall to truly assess the scope of an advanced attack and take action quickly and at scale Extended Detection and Response (XDR) aims to tackle this exact issue, extending capabilities beyond the endpoint. Learn how your organization can supercharge detection and response across your enterprise with one unified command console from CrowdStrike.
Break
Zero Trust
Speaker: Tony Fergusson | CISO EMEA, Zscaler
Tony Fergusson, Zscaler EMEA CISO, digs into how zero trust has the power to transform how you connect and secure your enterprise in a hyper-distributed world. He will help to separate fact from fiction on the way to implementing true zero trust, while avoiding the pitfalls of false approaches.
Incident Response
Speaker: Eric Johnson | CrowdStrike Professional Services Leader, Northern Europe Enterprise
All organizations will at some point encounter a cyber incident they will have to respond to it and manage it effectively. The speed, efficiency and experience applied in the response to an incident can be the difference in saving hundreds of thousands in direct costs of a cyber incident and countless dollars in in-direct costs.
In this presentation you will hear about CrowdStrike’s Incident Response Services and CrowdStrike’s Services Retainer to learn how CrowdStrike works collaboratively with organizations to handle critical security incidents, resolve immediate issues and implement a long-term solution to stop recurrences.
Networking
Arrival and light lunch
Welcome & Introduction
The rise of the criminally motivated threat actor
Speaker: Zeki Turedi | CTO EMEA, CrowdStrike
SPIDER, a criminally motivated threat actor who harnesses multiple toolsets to take unsuspected organisations to ransom. 2022 has seen the change in how criminal organisations (SPIDER) target and victimise unexpected organisations. The actor has learnt, pivoted and changed tactics. This keynote session will provide a review of the latest trends and evolution of the SPIDER as well detail how we all can jointly defend and protect against them.
A platform approach to cyber security
Organizations need visibility and control across all security domains such as endpoint, identity, cloud, web, email, network, and firewall to truly assess the scope of an advanced attack and take action quickly and at scale Extended Detection and Response (XDR) aims to tackle this exact issue, extending capabilities beyond the endpoint. Learn how your organization can supercharge detection and response across your enterprise with one unified command console from CrowdStrike.
Break
Zero Trust
Speaker: Tony Fergusson | CISO EMEA, Zscaler
Tony Fergusson, Zscaler EMEA CISO, digs into how zero trust has the power to transform how you connect and secure your enterprise in a hyper-distributed world. He will help to separate fact from fiction on the way to implementing true zero trust, while avoiding the pitfalls of false approaches.
Incident Response
Speaker: Eric Johnson | CrowdStrike Professional Services Leader, Northern Europe Enterprise
All organizations will at some point encounter a cyber incident they will have to respond to it and manage it effectively. The speed, efficiency and experience applied in the response to an incident can be the difference in saving hundreds of thousands in direct costs of a cyber incident and countless dollars in in-direct costs.
In this presentation you will hear about CrowdStrike’s Incident Response Services and CrowdStrike’s Services Retainer to learn how CrowdStrike works collaboratively with organizations to handle critical security incidents, resolve immediate issues and implement a long-term solution to stop recurrences.
Networking
Welcome & Introduction
The rise of the criminally motivated threat actor
Speaker: Zeki Turedi | CTO EMEA, CrowdStrike
SPIDER, a criminally motivated threat actor who harnesses multiple toolsets to take unsuspected organisations to ransom. 2022 has seen the change in how criminal organisations (SPIDER) target and victimise unexpected organisations. The actor has learnt, pivoted and changed tactics. This keynote session will provide a review of the latest trends and evolution of the SPIDER as well detail how we all can jointly defend and protect against them.
A platform approach to cyber security
Organizations need visibility and control across all security domains such as endpoint, identity, cloud, web, email, network, and firewall to truly assess the scope of an advanced attack and take action quickly and at scale Extended Detection and Response (XDR) aims to tackle this exact issue, extending capabilities beyond the endpoint. Learn how your organization can supercharge detection and response across your enterprise with one unified command console from CrowdStrike.
Break
Zero Trust
Speaker: Tony Fergusson | CISO EMEA, Zscaler
Tony Fergusson, Zscaler EMEA CISO, digs into how zero trust has the power to transform how you connect and secure your enterprise in a hyper-distributed world. He will help to separate fact from fiction on the way to implementing true zero trust, while avoiding the pitfalls of false approaches.
Incident Response
Speaker: Eric Johnson | CrowdStrike Professional Services Leader, Northern Europe Enterprise
All organizations will at some point encounter a cyber incident they will have to respond to it and manage it effectively. The speed, efficiency and experience applied in the response to an incident can be the difference in saving hundreds of thousands in direct costs of a cyber incident and countless dollars in in-direct costs.
In this presentation you will hear about CrowdStrike’s Incident Response Services and CrowdStrike’s Services Retainer to learn how CrowdStrike works collaboratively with organizations to handle critical security incidents, resolve immediate issues and implement a long-term solution to stop recurrences.
SPONSORSHIPS
PROUDLY SPONSORED BY OUR ALLIANCE PARTNERS
Related Resources Points
Related Resources Sub Points
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Zeki Turedi
CTO EMEA, CrowdStrike
An influential, tenacious and highly motivated cybersecurity executive, Zeki has professional experience specialising in Endpoint and Network Cyber Security, Threat Intelligence as well as extensive Incident Response & Forensic knowledge. Zeki acts as a trusted advisor and strategist for organisations across EMEA focussing and assisting on how to lower and manage cyber risk as well as build their cyber maturity. At CrowdStrike, Zeki also focuses on technology strategy & innovation.
Tony Fergusson
CISO EMEA, Zscaler
Tony has 25 years of Enterprise IT experience with a strong understanding of the enterprise landscape and executive engagement focused on network and security transformation, this includes designing and managing complex IT infrastructure to enable and secure the enterprise.
Show All