product
- What you can do with CrowdStrike
- Each module provided by CrowdStrike
- NGAV(Prevent/USB/FW)
- EDR(Falcon Insight)
- Threat Hunting (OverWatch)
- IT Asset Management (Discover)
- Vulnerability Management (Spotlight)
- Threat Intelligence (Intelligence/Sandbox)
- Identity Protection (ITD/ITP)
- Cloud Security (CNAPP)
- EASM(Surface)
service
Application for evaluation machine
- FAQ
CrowdStrike
CrowdStrike
Due to telework, which has become commonplace today, and the cloud shift accompanying business expansion, the number of assets exposed to the public is increasing rapidly.
On the other hand, it is not easy to grasp not only assets that are used internally but also assets that have been disclosed to the public, and as the number of unmanaged assets increases, cyber-attacks targeting them are being launched more than ever.
In this seminar, we will introduce the points to be aware of when implementing "Management/understanding of assets that are targets of cyber attacks = Attack Surface Management (ASM)".
We will also introduce specific solutions provided by CrowdStrike, which we handle.
Schedule/Application
schedule |
time |
venue |
Application |
Scheduling |
- |
- |
- |
How to participate in the online seminar
- Please register the necessary information from "Apply here" at the top of this page.
- We will email you the login URL for the online seminar by 17:00 the day before the event. *
- On the day of the event, when it is time, please access from the login URL and listen to the lecture.
※セキュリティポリシーなどの関係で届かない可能性がございます。届いていない場合は、crowdstrike_info@macnica.co.jpまでご連絡ください。
*Registration is required to attend. Please refrain from sharing your login URL.
Event requirements
Venue |
Held as an online seminar *You can perform a connection test in advance from the following URL. https://zoom.us/test |
---|---|
Capacity | 100 people ※We will close the reception as soon as we reach the capacity. |
subject |
|
Preparation |
What to prepare on the day
|
Cost | Free (pre-registration required) |
Program
What is Attack Surface Management (ASM)?
|
|
What is the necessity of ASM in terms of recent attack methods?
|
|
What are the points to be aware of when implementing ASM?
|
|
Summary
|
*The program is subject to change without notice. Please note. Please check this web page for the latest information.
Inquiry/Document request
In charge of Macnica CrowdStrike Co., Ltd.
- TEL:045-476-2010
- E-mail:crowdstrike_info@macnica.co.jp
Mon-Fri 8:45-17:30