Webinarserie NIS2 og andre aktuelle cybersikkerhedsemner

On-demand events:

30. marts 2023, 11.00-12.00

NIS2 direktivet – seneste opdateringer og hvad det betyder for dig (On-Demand)

NIS2-direktivet får stor betydning for, hvordan mange danske virksomheder og offentlige institutioner skal håndtere cyber- og informationssikkerhed i fremtiden – især hvis I varetager samfundskritiske funktioner. I slutningen af 2022 blev NIS2-direktivets tekst offentliggjort og nedtællingen for implementering er begyndt.

Er du i tvivl om, hvad NIS2 betyder for jeres organisation, og hvordan I skal forholde jer til de nye regler, så tilmeld dig vores gratis webinar.

På blot én time vil erhvervsjuridisk rådgiver og partner, Emil Bisgaard fra Poul Schmith/Kammeradvokaten gennemgå sikkerhedskrav, anvendelsesområder, styring af risici, tilsyn, påbud og bøder for overtrædelse af direktivet. Kort sagt – give dig overblik over alt, du som it-sikkerhedsansvarlig skal vide om NIS2. På webinaret får du også mulighed for at stille spørgsmål til Emil Bisgaard.

Taler: Emil Bisgaard, erhvervsjuridisk rådgiver og partner, Poul Schmith/Kammeradvokaten

Moderator: Henrik Skovfoged, Business Unit Manager, Trifork Security A/S


16. maj 2023, 10.00-11.00

’State of the art’-sikkerhed er mere end bare værktøjer (On-Demand)

Cyberkriminelle og statslige aktører udvikler sig konstant og får hele tiden adgang til mere avancerede værktøjer, hvilket får trusselsbilledet til at ændre sig kontinuerligt. For at sikre sig mod cyberangreb skal man kende til angriberen og dennes motiv, for det er vigtigt hele tiden at være et skridt foran angriberen. Hør mere om CrowdStrikes tilgang til at bekæmpe cyberangreb og hvordan vi hjælper virksomheder over hele verden med at beskytte deres data.

Taler: Mikkel Planck, Senior Cybersecurity Specialist, Crowdstrike


8. juni 2023, 10.00-11.00

Usikre identiteter (On-Demand)

I forlængelse af den konstante udvikling i trusselsbilledet, gør aktører ofte brug af legitime identiteter i organisationer. CrowdStrike fortæller, at 80% af alle sikkerhedsbrud har relation til kompromitterede identiteter. I dette webinar vil Trifork Security fortælle om de udfordringer, der kan opstå med håndtering af identiteter. Vi vil give eksempler fra virkeligheden og fortælle om de værktøjer, der kan hjælpe med at give et overblik over dette emne og forbedre jeres sikkerhed. 

Taler: Christian Bech Henriksen, Cyber Security Consultant, Trifork Security

TILMELD DIG
Venligst fravælg webinars du ikke ønsker at deltage i.

Privatliv: Vi behandler de personlige data, du deler med os, i overensstemmelse med vores erklæring om beskyttelse af personlige oplysninger
Tilmeld nu

THE Forrester WaveTM

Enterprise Detection & Response, Q1 2020

Get Forrester’s evaluation of the 12 most significant EDR vendors

Try It FREE

By submitting my contact information, I consent to the processing of my data by CrowdStrike and its partners, including to CrowdStrike contacting me and sharing information with its partners. I acknowledge that information submitted may be used by and associated with other information CrowdStrike has collected and used pursuant to its Privacy Notice.

CROWDSTRIKE EXECUTIVE SPEAKERS

Get peace of mind, and join the world's most secure businesses using CrowdStrike to stop breaches.

Deloitte
Market Presence

Download this report to learn:

  • The roles that threat hunting and cyber threat intelligence play in Forrester’s assessment that “CrowdStrike continues to lead on strategy and execution”
  • What differentiates CrowdStrike in the EDR space and why it received the highest possible score in 11 criteria
  • Why Forrester states that CrowdStrike® Falcon capabilities are often the “benchmark other client references use when describing capabilities they wish were available in their selected products”
Registrer nu
Case Study: Oak Hill Advisors

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download
2020 Global Threat Report

2020 Global Threat Report

Get an overview of the trends in attackers tactics and practical recommendations to keep your organization protected.

Download
Case Study: Financial Services Comp...

Case Study: Financial Services Comp...

See how a finanical services leader rolled out CrowdStrike to over 60,000 endpoints and 15,000 servers.

Download
Case Study: Greenhill & Co.

Case Study: Greenhill & Co.

Hear how CIO John Shaffer, provides end-to-end protection for Greenhill's global operations.

Download
Data Sheet: CrowdStrike Falcon For...

Data Sheet: CrowdStrike Falcon For...

See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
View More

Related Resources

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download
View More
Video Thumbnail
Play Buttom

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

  • Highly Targeted

    Financial services is the #1 targeted industry by cybercriminals.

  • Regulatory Compliance

    Financial services companies must achieve compliance or risk heavy fines and loss of business.

  • Sophisticated & Persistent Attacks

    Financial institutions are required to protect customer data regardless of where it is located.

Text

Text

Video Thumbnail
Play Buttom

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

SEE HOW CROWDSTRIKE STACKS UP

Try it free

Information submitted on this form may be associated with other information we have collected and used pursuant to our  Privacy Notice.

FALCON PREVENT
FOR HOME USE

Enable employees who use a home system to access corporate resources to work safely and productively. To learn more, visit the Falcon Prevent for Home Use FAQ.

Get Falcon Prevent

Falcon Firewall Management: Host Firewall

Falcon Firewall Management provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies

Start Free Trial

Black Hat USA

Calander

August 6-11, 2022

Location: Mandalay Bay Convention Center, Las Vegas

Schedule

Friday

August 6

Saturday

August 7

Sunday

August 8

Monday

August 9

Tuesday

August 10

Wednesday

August 11

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

8:00 am - 9:00 am

Registration

Front Desk

9:00 am - 9:30 am

Opening Keynote & Breakfast

Speaker: Daniel Cuthbert | Global Head of Security Research for Banco Santander

Main Hall

9:30 am - 6:00 pm

Trainings

Presenter: Craig Young | Tripwire

Rose Hall, 2nd Floor

SPONSORSHIPS

PROUDLY SPONSORED BY OUR ALLIANCE PARTNERS

Related Resources Points

Related Resources Sub Points

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Jessica Liu

Stuart Wiggins

Senior Strategic Threat intelligence Advisor, CrowdStrike


Stuart has spent over 13 years working in cyber intelligence and is passionate about using threat intelligence to improve cyber defences and reduce the impact of malicious cyber activity. His focus is to help guide clients through all aspects of threat intelligence. Prior to CrowdStrike, Stuart started his career as an intelligence analyst in the UK Civil Service and has worked in a variety of operational and strategic roles covering a variety of national security and cyber security related topics, including a three year posting the to the United States where he worked with various U.S. Federal Government agencies.

Megan Dolores

Alistair Thomson

Head of Product Development and Innovation, Adarma


Alistair heads up product development and innovation at Adarma. Specialising in cyber threat detection and investigations, Alistair develops leading-edge defence and intelligence capabilities for large enterprises. While at Adarma Alistair has been the driving force behind the development and standardisation of the Adarma portfolio, with a particular passion for how we operationalise threat intelligence for our customers.

Debra Carrol

Nick Pattinson

Head of Cyber Security Operations at Curry’s


Experienced Senior Cybersecurity leader with a history of working in the retail and banking industry. Skilled in Service Delivery, Server Architecture, ITIL, People Management, Information Security, IAM, Security Incident Response, SOC, Security Controls and Vulnerability Management. Strong operations professional with a Msc focused in Strategic Information Systems from Strathclyde University. CEH, CISA and CISM accredited.

Jessica Liu

Jessica Liu

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Megan Dolores

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Debra Carrol

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Jessica Liu

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Megan Dolores

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Jessica Liu

Debra Carrol

CEO / CFO

This is her 15th year at Edison Elementary School and her 10th year teaching fourth grade. So far, fourth grade is her favorite grade to teach! Mrs. Carroll was the 2011 Newell Unified School District Teacher of the Year, and received her National Board Certification in 2013.

Show All