Breakout sessions:

Learning tracks

Power your cybersecurity skills

Fal.Con provides you with an immersive learning experience, packed with actionable insights and cutting edge strategies. Our curated breakout sessions, expert presentations, workshops, and panels are presented by CrowdStrike, industry experts, and your peers covering both business topics and technical deep dives.

Browse the 80+ sessions available on-demand in Fal.Con Digital.

Track 1: Endpoint Detection & Response


Key takeaways include:

• Learn about attack trends and what you can do to best protect your organization

• Understand the latest innovations and how to get the most out of them – from Charlotte AI to incident workbench

• Hear how your peers are tackling the latest challenges

Endpoint is where you run your business and where most attacks begin. That’s why endpoint security continues to be the foundation of a modern cyber defense. Whether you’re a seasoned CrowdStrike Falcon® Insight XDR customer or just getting started with the CrowdStrike Falcon® platform.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 2: Identity Threat Detection & Response


Key takeaways include:

• Learn about modern identity-based attacks and why they’re hard to detect without the right tools

• Understand CrowdStrike's unique, unified identity protection that stops identity-based attacks in real-time

• Listen to customers share their deployment experience with Falcon Identity Protection and business values realized

Last year, 75% of attacks were malware-free, with adversaries typically using valid identity credentials for entry1. That’s why we’re committed to delivering excellent identity security. Learn how CrowdStrike Falcon® Identity Protection provides unified security across hybrid identity environments to detect lateral movement, enforce risk-based conditional access, and stop identity-based attacks in real-time.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 3: Cloud Security


Key takeaways include:

• How Falcon Cloud Security removes complexity, empowers DevSecOps, and eliminates blinds spots by scanning everything to discover all assets, across cloud environments and apps

• How to shutdown adversaries with industry-leading cloud detection and response

• Best practices to simplify your development process by integrating security earlier in the app development lifecycle

Increasing cloud adoption means increasing cybersecurity threats. Cloud intrusions escalated by a staggering 75% in 2023, with cloud-conscious cases rising by 110%.1 Learn how CrowdStrike Falcon® Cloud Security can help you stay ahead of threats by correlating cloud risks to apps and services.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 4: Next-Gen SIEM


Key takeaways include:

• Best practices and approaches to shutting down adversaries with blazing-fast search, live collaboration, and clear incident visualization

• How to slash SOC costs by consolidating tools and automating manual tasks

• Achieve instant time-to-value with effortless data onboarding

Stopping modern attacks requires security operations that match adversary speed. Legacy SIEMs aren’t up to the task. Discover how CrowdStrike Falcon® Next-Gen SIEM unifies first and third-party data, threat intelligence, AI, and workflow automation to stop breaches. Hear your peers explain how they achieved unprecedented speed and efficiency at a fraction of the cost of legacy SIEMs with the AI-native Falcon platform.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 5: Exposure Management


Key takeaways include:

• Why effective VM and exposure management starts with complete asset visibility, and how to identify your most critical assets

• Discover evolving vulnerability definitions, effective prioritization strategies, and the pivotal role of proactive security in breach prevention

• How to maximize your Falcon Exposure Management deployment to uncover useful capabilities and stop breaches before they happen

Vulnerability management (VM) and exposure management are absolutely vital for good security. New CISOs often choose VM as a priority but true implementation is difficult. The VM of today is not what it once was. Join us for a discussion on the evolution of VM, both as a product and as a practice, and unlock CrowdStrike Falcon® Exposure Management’s AI-powered approach that puts control where it belongs – in your hands.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 6: IT Automation


Key takeaways include:

• Ask any question about any asset and take quick action throughout IT and Security workflows

• Save time and money by replacing legacy point products to unify IT and Security workflows in a single platform

• Streamline key IT and Security use cases like IT operations, compliance, forensic investigations, and vulnerability management

IT and Security teams typically use 10+ tools for fleet management and monitoring, leading to slow, disjointed workflows. With CrowdStrike Falcon® for IT, streamline your IT and Security operations, compliance, forensic investigations, and vulnerability management. Discover protection that will save you time and money.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 7: Threat Intelligence & Hunting


Key takeaways include:

• Learn about the latest adversary tradecraft and how to stop it

• Understand how AI democratizes threat intelligence for security analysts of every skill level

• Understand how to hunt threats and why it’s critical to defeat advanced intrusions

Today’s threat landscape is characterized by adversaries who are increasingly fast and elusive. In a world where attacks can happen in minutes, CrowdStrike’s industry-leading threat intelligence and hunting teams ensure you’re prepared and one step ahead of the adversary. Learn from our experts on how to detect novel and evasive intrusions, respond within minutes, and move from a reactive threat response to a confident, intelligence-driven defense.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 8: Incident Response & Proactive Services


Key takeaways include:

• Test and exercise your IR decision making process

• Increase understanding of adversary attack methods and defensive countermeasures you can take to avoid a breach

• Learn more about the vetted ecosystem of services partners that enhance response, recovery, readiness, and cyber insurability

Hear from CrowdStrike’s world-class services team on the latest threats, attack trends, and success stories from our partners and customers. These from-the-frontlines insights, workshops, and tabletop exercises will help you be better prepared to defend against evolving adversaries. We’ll cover a multitude of topics including SEC readiness, ransomware defense, social engineering protection, threat landscape analysis, cyber insurability, as well as IR tips and tricks.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 9: CxO


Key takeaways include:

• Hear strategies for positioning cyber value to your board

• Learn from executives who are successfully consolidating security tools

• Demystify the CIO/CISO relationship and the importance of aligning on priorities and goals

• Gain financial insights and perspectives for positioning security programs with internal executive leaders

Today’s executives need tomorrow’s information to maintain pace with business, while also staying ahead of the adversary. Competition for funding, technology debt, and a cyber professional workforce shortage combined with security tool sprawl are only a few of the challenges executives face. This track, developed, produced, and chaired by former CISOs and CIOs at large private and public sector organizations, will enable you to hear from other visionary leaders who are implementing creative solutions to improve security and consolidate tools, reducing costs and increasing value for their organization.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 10: AI


Key takeaways include:

• Learn about CrowdStrike’s cutting edge innovations including AI-powered detection engineering, CrowdStrike’s award-winning genAI assistant (Charlotte AI), policy and privacy implications, and more

• Hear from featured industry partners, including NVIDIA and Google, on how they’re collaborating with CrowdStrike to advance the future of AI-powered cybersecurity

• Take your prompt engineering and workflow automation skills to the next level, learning insider tips and best practices from CrowdStrike experts

AI is fundamentally transforming modern cybersecurity, elevating both security teams and adversaries to new heights of speed and sophistication. Security teams are now armed with advanced detections, real-time recommendations, and genAI-powered workflows to stop breaches faster and more decisively than ever. In this track, hear from CrowdStrike’s senior data scientists, malware researchers, and strategic industry partners to understand how CrowdStrike is empowering organizations to apply cutting-edge AI across their security operations, and where we’re going next.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 11: Developer Accelerator


Key takeaways include:

• Discover CrowdStrike SDKs and partner integrations through targeted sessions, uncovering actionable insights, and best practices for real-world implementation

• Engage in interactive labs that deliver tangible, hands-on experience with CrowdStrike APIs and products

• Discuss practical strategies and techniques to address challenges and maximize the value of your CrowdStrike investment

Innovation and expertise converge in the CrowdStrike Developer Accelerator. Designed for developers, security analysts, incident responders, and technical specialists, this track offers an immersive exploration of CrowdStrike APIs, products, SDKs, and integrations.

The Developer Accelerator includes engaging technical overviews, targeted deep dives, and interactive labs designed to provide you with experience and practical insights to enhance your overall security posture.

See sessions for this track available to view on-demand in Fal.Con Digital.

Track 12: Hands-On Workshops

View Workshops

Key takeaways include:

• Interactive labs and detailed technical overviews in an environment conducive to Q&A for live feedback and deeper understanding

• Detect, counter, and mitigate modern cyber threats using advanced tools and strategies

• Test drive new capabilities and product enhancements that provide a competitive edge in cybersecurity practices

In today’s rapidly evolving threat landscape, hands-on experience with bleeding-edge cybersecurity tools is crucial. Dive into the CrowdStrike Falcon® Console and discover innovative features through technical briefings and interactive labs. Engage directly with tools designed to combat modern cyber threats, test drive new capabilities, and gain practical experience to enhance your security strategies and effectively stop breaches.

Register for digital access today