Nordic CrowdStrike Days March
CrowdStrike is happy to invite you to CrowdStrike Days in the Nordics
Sweden
Date: Wednesday, 22 March 2023
Time: 09:00 - 17:00 CET
Location: Nordic Light Hotel, Vasaplan 7, 111 20 Stockholm
Denmark
Date: Thursday, 23 March 2023
Time: 09:00 - 17:00 CET
Location: Haaning Collection, Smørmosevej 16, 2880 Bagsværd
Nordics / Virtual
Date: Thursday, 23 March 2023
Time: 13:00 - 15:30 CET
REGISTER TODAY
THE Forrester WaveTM
Enterprise Detection & Response, Q1 2020
Get Forrester’s evaluation of the 12 most significant EDR vendors
Try It FREE
CROWDSTRIKE EXECUTIVE SPEAKERS
Get peace of mind, and join the world's most secure businesses using CrowdStrike to stop breaches.
Download this report to learn:
- The roles that threat hunting and cyber threat intelligence play in Forrester’s assessment that “CrowdStrike continues to lead on strategy and execution”
- What differentiates CrowdStrike in the EDR space and why it received the highest possible score in 11 criteria
- Why Forrester states that CrowdStrike® Falcon capabilities are often the “benchmark other client references use when describing capabilities they wish were available in their selected products”
Related Resources
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Download2020 Global Threat Report
Get an overview of the trends in attackers tactics and practical recommendations to keep your organization protected.
DownloadCase Study: Financial Services Comp...
See how a finanical services leader rolled out CrowdStrike to over 60,000 endpoints and 15,000 servers.
DownloadCase Study: Greenhill & Co.
Hear how CIO John Shaffer, provides end-to-end protection for Greenhill's global operations.
DownloadData Sheet: CrowdStrike Falcon For...
See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadForrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadRelated Resources
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadAndy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
-
Highly Targeted
Financial services is the #1 targeted industry by cybercriminals.
-
Regulatory Compliance
Financial services companies must achieve compliance or risk heavy fines and loss of business.
-
Sophisticated & Persistent Attacks
Financial institutions are required to protect customer data regardless of where it is located.
Text
Text
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
SEE HOW CROWDSTRIKE STACKS UP
Try it free
FALCON PREVENT
FOR HOME USE
Enable employees who use a home system to access corporate resources to work safely and productively. To learn more, visit the Falcon Prevent for Home Use FAQ.
Get Falcon PreventFalcon Firewall Management: Host Firewall
Falcon Firewall Management provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies
Start Free TrialNordic CrowdStrike Days March
March 22 - 23, 2023
STOCKHOLM
March 22
COPENHAGEN
March 23
VIRTUAL
March 23
Monday
August 9
Tuesday
August 10
Wednesday
August 11
Registration
Welcome & Introduction
What you didn’t know about Crowdstrike
Speaker: Mikkel Planck | Senior Cybersecurity Specialist
Break
The current offensive threat – a realistic, real life exploitation demo
Speaker: Anders Blecko | Senior Solutions Engineer
In this session we will showcase and talk about the tools, tactics and techniques that are very commonly used and easily available to perform hands-on malicious activities on public facing resources.
The #1 risk to your assets - Identities, how to properly protect them
Speaker: Bastian Jacobsson | Security Engineer
Lunch
Introduction to the afternoon sessions
2023 European Cyber Security Predictions
Speaker: Stuart Wiggins | Strategic Threat Advisor
This session will provide you with the findings from the newest 2023 Global Threat Report. The Global Threat Report is leveraging data from trillions of daily events from the CrowdStrike Falcon platform and insights from CrowdStrike Falcon OverWatch. It covers the latest activities of the world’s most dangerous adversaries and CrowdStrike’s recommendations for protecting businesses against modern attacks.
See What They See, Know What They Know: CrowdStrike Falcon Surface
Speaker: Stuart Wiggins | Strategic Threat Advisor
In this session we will be demonstrating our adversary-centric approach to external attack surface management (EASM). During this session we will be demonstrating the industry’s only adversary-driven EASM and how this complements your existing CrowdStrike investment to allow you to better understand your external attack surface and make more risk-informed decisions about how to protect both known and (previously) unknown infrastructure. We will cover how Surface exposes shadow IT and maintains a continuously updated asset inventory that not only maps your corporate attack surface, but will map out subsidiaries as well as your cloud footprint.
Break
Detecting and stopping breaches - tooling and techniques to address skills shortages
Speaker: Mikkel Planck | Senior Cybersecurity Specialist
Every senior manager will recognize the struggles of hiring the right people, in a job market where security professionals are a resource in high demand, and supply is severely constrained. With employees increasingly working from home and abroad, the ability to respond to adversaries becomes even more complicated and time critical. Tooling, automation and services are key to getting ahead of attackers and stop breaches, and in this session we discuss how technologies help to address skills shortages in a proactive manner.
Wrap up
Networking
Registration
Welcome & Introduction
What you didn’t know about Crowdstrike
Speaker: Mikkel Planck | Senior Cybersecurity Specialist
Break
The current offensive threat – a realistic, real life exploitation demo
Speaker: Anders Blecko | Senior Solutions Engineer
In this session we will showcase and talk about the tools, tactics and techniques that are very commonly used and easily available to perform hands-on malicious activities on public facing resources.
The #1 risk to your assets - Identities, how to properly protect them
Speaker: Bastian Jacobsson | Security Engineer
Lunch
Introduction to the afternoon sessions
Detecting and stopping breaches - tooling and techniques to address skills shortages
Speaker: Mikkel Planck | Senior Cybersecurity Specialist
Every senior manager will recognize the struggles of hiring the right people, in a job market where security professionals are a resource in high demand, and supply is severely constrained. With employees increasingly working from home and abroad, the ability to respond to adversaries becomes even more complicated and time critical. Tooling, automation and services are key to getting ahead of attackers and stop breaches, and in this session we discuss how technologies help to address skills shortages in a proactive manner.
2023 European Cyber Security Predictions
Speaker: Stuart Wiggins | Strategic Threat Advisor
This session will provide you with the findings from the newest 2023 Global Threat Report. The Global Threat Report is leveraging data from trillions of daily events from the CrowdStrike Falcon platform and insights from CrowdStrike Falcon OverWatch. It covers the latest activities of the world’s most dangerous adversaries and CrowdStrike’s recommendations for protecting businesses against modern attacks.
Break
See What They See, Know What They Know: CrowdStrike Falcon Surface
Speaker: Stuart Wiggins | Strategic Threat Advisor
In this session we will be demonstrating our adversary-centric approach to external attack surface management (EASM). During this session we will be demonstrating the industry’s only adversary-driven EASM and how this complements your existing CrowdStrike investment to allow you to better understand your external attack surface and make more risk-informed decisions about how to protect both known and (previously) unknown infrastructure. We will cover how Surface exposes shadow IT and maintains a continuously updated asset inventory that not only maps your corporate attack surface, but will map out subsidiaries as well as your cloud footprint.
Wrap up
Networking
Introduction to the afternoon sessions
Detecting and stopping breaches - tooling and techniques to address skills shortages
Speaker: Mikkel Planck | Senior Cybersecurity Specialist
Every senior manager will recognize the struggles of hiring the right people, in a job market where security professionals are a resource in high demand, and supply is severely constrained. With employees increasingly working from home and abroad, the ability to respond to adversaries becomes even more complicated and time critical. Tooling, automation and services are key to getting ahead of attackers and stop breaches, and in this session we discuss how technologies help to address skills shortages in a proactive manner.
2023 European Cyber Security Predictions
Speaker: Stuart Wiggins | Strategic Threat Advisor
This session will provide you with the findings from the newest 2023 Global Threat Report. The Global Threat Report is leveraging data from trillions of daily events from the CrowdStrike Falcon platform and insights from CrowdStrike Falcon OverWatch. It covers the latest activities of the world’s most dangerous adversaries and CrowdStrike’s recommendations for protecting businesses against modern attacks.
Break
See What They See, Know What They Know: CrowdStrike Falcon Surface
Speaker: Stuart Wiggins | Strategic Threat Advisor
In this session we will be demonstrating our adversary-centric approach to external attack surface management (EASM). During this session we will be demonstrating the industry’s only adversary-driven EASM and how this complements your existing CrowdStrike investment to allow you to better understand your external attack surface and make more risk-informed decisions about how to protect both known and (previously) unknown infrastructure. We will cover how Surface exposes shadow IT and maintains a continuously updated asset inventory that not only maps your corporate attack surface, but will map out subsidiaries as well as your cloud footprint.
Wrap up
Networking
SPONSORSHIPS
PROUDLY SPONSORED BY OUR ALLIANCE PARTNERS
Related Resources Points
Related Resources Sub Points
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Chris Lydon
Security Sales Specialist - BT
TBC
Ross Penny
Identity Protection Engineer, CrowdStrike
Ross works as one of CrowdStrike's Identity Protection subject-matter-experts, covering EMEA. He has worked in the identity, authentication and credential management space for most of his career, with roles at Telefonica, Citrix and most recently at Veridium, where he was Chief Product Officer.
Show All