Overcoming K-12 Cybersecurity Challenges
Cyber criminals have increasingly used ransomware, cloud exploitations, credential theft to test K-12 cyber defenses. These data rich environments require cybersecurity that will secure an organization while taking into account the funding and staff shortages that may face schools. Listen in on one school's cybersecurity mission and successful program as we cover the current K-12 threat landscape before diving into how Portland Public Schools...
October 17, 2023
Organizer:
CrowdStrike Location:
Webcast
FAL.CON 2023
The future of cybersecurity starts here. Join us at Fal.Con to hear from CrowdStrike co-founder and CEO George Kurtz, president Michael Sentonas, and some very special guests as we unleash the next wave of security innovation to unify protection across endpoints, cloud workloads, identity and data. Fal.Con is where the greatest minds in cybersecurity come together to protect and power businesses. If you want to network with industry experts, e...
September 18-21, 2023
Organizer:
CrowdStrike Location:
Las Vegas, NV
EP6: Public Health (SLED)
The Market Intelligence Coffee Chat Live Coaching Series is the perfect opportunity to gain valuable insights into the latest IT investment trends and developments shaping the industry. Learn from experts in the field to gain a deeper understanding of actionable insights that are vital to your success in the public sector market. Join the TD SYNNEX Public Sector Market Insights team as they explore key topics which will cover the following: tr...
Visibility, Control, Security: CrowdStr...
State and local government organizations are being targeted by threat actors more than ever. During this webinar, we will discuss how CrowdStrike is maintaining the trust of citizens, staying ahead of your adversaries, and securing digital government. Join CrowdStrike's Debbi Blyth, Executive Strategist, and Chuck Hankle, Security Solution Architect, to discuss how they are responding to the evolving Cloud and Identity Security challenges face...
Revolutionizing Zero Trust Architecture
Join us for an informative technical showcase on August 17th at 10 am PST as we explore how Okta, AWS, CrowdStrike, and Zscaler are revolutionizing a Zero Trust Architecture (ZTA) to combat sophisticated threats and simplify complex IT infrastructures. Discover how the seamless integrations between these best-of-breed technologies can help you enhance your security posture and accelerate your organization's modernization to the cloud. Tune in...
EP5: Public Health (FED)
The Market Intelligence Coffee Chat Live Coaching Series is the perfect opportunity to gain valuable insights into the latest IT investment trends and developments shaping the industry. Learn from experts in the field to gain a deeper understanding of actionable insights that are vital to your success in the public sector market. Join the TD SYNNEX Public Sector Market Insights team as they explore key topics which will cover the following: tr...
CrowdStrike Technical Summit
Join CrowdStrike on May 23rd in Reston for an introductory, hands-on workshop to learn about threat hunting techniques and the tools needed to combat today’s cyber threats. Threat hunting is becoming increasingly important as organizations seek to stay ahead of the latest cyber threats and rapidly respond to any potential attacks. You will leave with an understanding of how top organizations are using the CrowdStrike Falcon Platform to q...
How to Reduce Cyber Risk With Modern Lo...
Organizations are facing an acceleration of cybersecurity risks, but the technology they have in place to monitor and manage data logs is often limited in its ability to identify and analyze incidents in real-time. Data ingestion can come at a high cost, forcing companies to examine only limited data sets and retain it for shorter timeframes, exposing companies to significant operational and security blind spots. In response to these challenge...
CrowdStrike Coffee Chat Live Coaching:...
The Department of Defense Enterprise Software Initiative (ESI) program is designed to offer DoD customers with discounts based off of GSA Schedule Contract pricing through negotiated Blanket Purchase Agreements (BPA). All awarded ESI BPA’s are the Department of Defenses preferred method of IT procurement in accordance with the Defense Federal Acquisition Regulation Supplement (DFARS) Section 208.74. Software product category of Informati...
CrowdStrike Coffee Chat Live Coaching:...
The Texas DIR contract is an important procurement vehicle for Texas-based customers seeking to purchase the latest information technology software products and related services. Texas DIR leverages the buying power of the State of Texas and delivers access to hundreds of products and services at volume discount pricing. This contract includes Software as a Service, products and related services. Through this contract, state and local governme...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.