Breakout sessions:
Learning topics
Powering cybersecurity skills
Fal.Con Europe provided an immersive learning experience, packed with actionable insights and cutting edge strategies. Our curated breakout sessions, expert presentations, workshops, and panels were presented by CrowdStrike, industry experts, and your peers covering both business topics and technical deep dives.
We’ve handpicked sessions from Fal.Con Europe for you to watch at your own pace on-demand across Endpoint, Identity, Cloud, and Next-Gen SIEM.
Topic 1: Endpoint Detection & Response
Key takeaways include:
• Learn about attack trends and what you can do to best protect your organisation
• Understand the latest innovations and how to get the most out of them – from Charlotte AI to incident workbench
• Hear how your peers are tackling the latest challenges
Endpoint is where you run your business and where most attacks begin. That’s why endpoint security continues to be the foundation of a modern cyber [...]
Topic 2: Identity Threat Detection & Response
Key takeaways include:
• Learn about modern identity-based attacks and why they’re hard to detect without the right tools
• Understand CrowdStrike's unique, unified identity protection that stops identity-based attacks in real-time
• Listen to customers share their deployment experience with Falcon Identity Protection and business values realized
Last year, 75% of attacks were malware-free, with adversaries typically using valid identity credentials for entry1. That’s why we’re committed [...]
Topic 3: Cloud Security
Key takeaways include:
• How Falcon Cloud Security removes complexity, empowers DevSecOps, and eliminates blinds spots by scanning everything to discover all assets, across cloud environments and apps
• How to shutdown adversaries with industry-leading cloud detection and response
• Best practices to simplify your development process by integrating security earlier in the app development lifecycle
Increasing cloud adoption means increasing cybersecurity threats. Cloud intrusions escalated by a staggering 75% in 2023, with cloud-conscious cases rising [...]
Topic 4: Next-Gen SIEM
Key takeaways include:
• Best practices and approaches to shutting down adversaries with blazing-fast search, live collaboration, and clear incident visualization
• How to slash SOC costs by consolidating tools and automating manual tasks
• Achieve instant time-to-value with effortless data onboarding
Stopping modern attacks requires security operations that match adversary speed. Legacy SIEMs aren’t up to the task. Discover how CrowdStrike [...]
Topic 5: Exposure Management
Key takeaways include:
• Why effective VM and exposure management starts with complete asset visibility, and how to identify your most critical assets
• Discover evolving vulnerability definitions, effective prioritization strategies, and the pivotal role of proactive security in breach prevention
• How to maximize your Falcon Exposure Management deployment to uncover useful capabilities and stop breaches before they happen
Vulnerability management (VM) and exposure management are absolutely vital for good security. New CISOs often choose VM as a priority but true [...]
Topic 6: IT Automation
Key takeaways include:
• Ask any question about any asset and take quick action throughout IT and Security workflows
• Save time and money by replacing legacy point products to unify IT and Security workflows in a single platform
• Streamline key IT and Security use cases like IT operations, compliance, forensic investigations, and vulnerability management
IT and Security teams typically use 10+ tools for fleet management and monitoring, leading to slow, disjointed workflows. With CrowdStrike [...]
Topic 7: Threat Intelligence & Hunting
Key takeaways include:
• Learn about the latest adversary tradecraft and how to stop it
• Understand how AI democratizes threat intelligence for security analysts of every skill level
• Understand how to hunt threats and why it’s critical to defeat advanced intrusions
Today’s threat landscape is characterized by adversaries who are increasingly fast and elusive. In a world where attacks can happen in minutes, [...]
Topic 8: Incident Response & Proactive Services
Key takeaways include:
• Test and exercise your IR decision making process
• Increase understanding of adversary attack methods and defensive countermeasures you can take to avoid a breach
• Learn more about the vetted ecosystem of services partners that enhance response, recovery, readiness, and cyber insurability
Hear from CrowdStrike’s world-class services team on the latest threats, attack trends, and success stories from our partners and customers. These [...]
Topic 9: CxO
Key takeaways include:
• Hear strategies for positioning cyber value to your board
• Learn from executives who are successfully consolidating security tools
• Demystify the CIO/CISO relationship and the importance of aligning on priorities and goals
• Gain financial insights and perspectives for positioning security programs with internal executive leaders
Today’s executives need tomorrow’s information to maintain pace with business, while also staying ahead of the adversary. Competition for funding, [...]
Topic 10: AI
Key takeaways include:
• Learn about CrowdStrike’s cutting edge innovations including AI-powered detection engineering, CrowdStrike’s award-winning genAI assistant (Charlotte AI), policy and privacy implications, and more
• Hear from featured industry partners, including NVIDIA and Google, on how they’re collaborating with CrowdStrike to advance the future of AI-powered cybersecurity
• Take your prompt engineering and workflow automation skills to the next level, learning insider tips and best practices from CrowdStrike experts
AI is fundamentally transforming modern cybersecurity, elevating both security teams and adversaries to new heights of speed and sophistication. Security [...]
Topic 11: Developer Accelerator
Key takeaways include:
• Discover CrowdStrike SDKs and partner integrations through targeted sessions, uncovering actionable insights, and best practices for real-world implementation
• Engage in interactive labs that deliver tangible, hands-on experience with CrowdStrike APIs and products
• Discuss practical strategies and techniques to address challenges and maximize the value of your CrowdStrike investment
Innovation and expertise converge in the CrowdStrike Developer Accelerator. Designed for developers, security analysts, incident responders, and technical [...]
Topic 12: Hands-On Workshops
Key takeaways include:
• Interactive labs and detailed technical overviews in an environment conducive to Q&A for live feedback and deeper understanding
• Detect, counter, and mitigate modern cyber threats using advanced tools and strategies
• Test drive new capabilities and product enhancements that provide a competitive edge in cybersecurity practices
In today’s rapidly evolving threat landscape, hands-on experience with bleeding-edge cybersecurity tools is crucial. Dive into the CrowdStrike [...]