Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Crowdstrike GmbH
Forums it-sa Expo Knowledge Forum D

Threat hunting insights to outsmart modern adversaries

At the heart of the presentation are the changing behaviors, new techniques and tactics of the most active attacker groups today.

calendar_today Tue, 22.10.2024, 13:15 - 13:30

event_available On site

place Forum, Booth 7A-106

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud

Event

This action is part of the event Forums it-sa Expo

Action description

The Crowdstrike Threat Hunting Report, based on telemetry from millions of sensors worldwide, annually presents the changing behaviors, techniques and tactics of the most active attacker groups - condensed into an essence in this presentation.

At the heart of the presentation are the changing behaviors, new techniques and tactics of the most active attacker groups today. The information was based on the latest edition of the Threat Hunting Report, which CrowdStrike publishes every year in August.

The report's findings and data on the most active attacker groups and their behavior are an essence of the analysis and observations of CrowdStrike's Counter Adversary Operations team, which has studied the threat actors and their behavior in detail for a year. Florian Hartmann, Manager Sales Engineering at CrowdStrike, also looks at which industries are particularly at risk and how the attackers try to corrupt them.


- Get to know the most active attacker groups at the moment
- Learn how the attackers' tactics and behavior have changed
- Find out which industries are most affected and
- How you can prepare for these new techniques
... read more

Language: English

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.