CrowdStrike’s 2021 Global Threat Report identified significant nation-state-based targeted attacks and operations focused on cloud environments. These attacks have been observed from mature adversaries in China, Iran, Democratic People's Republic of Korea (DPRK), Russia, eCrime groups and others.
Based on these observations, this webinar from CrowdStrike steps through modern Linux Malware attacks in Red Hat environments with the CrowdStrike Falcon platform. You'll hear directly from CrowdStrike Solution Architects as they walk through a series of demos including using CrowdStrike’s newly certified Ansible Collection to deploy and configure the Falcon sensor on Red Hat Enterprise Linux (RHEL) hosts.
The discussion will include the latest threat intelligence relating to Indicators of Compromise (IOCs) and Indicators of Attack (IOAs) and how to hunt for malicious activity in Red Hat environments.
CrowdStrike's Solution Architects will demonstrate:
You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.
Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately. Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.
Always add key takeaways. Something like this....In this session, you’ll learn about: