Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When the Adversary Shows Up in Person

Physical security and IT security have gone hand in hand for a long time. While cybersecurity teams are rightfully focused on protecting their virtual environments, they should also have an eye on whether an adversary is walking through the front door. “Anytime there’s a physical boundary, an adversary is going to look to cross over that — whether it be in person or using some technology to get over that boundary,” Adam says in this episode on physical security threats.

Charlotte AI - Agentic Workflows: Data Egress Pattern Analysis

Sensitive data moves in and out of your organization every day. But how do you know when routine becomes risky? With Charlotte AI Agentic Workflows, CrowdStrike helps you fast-track the hunt for suspicious file activity—so you don’t have to. From after-hours uploads to unsanctioned cloud storage, Charlotte AI helps you analyze file movement across your environment. By reviewing Falcon Data Protection events, applying a foundational model, and generating a structured, actionable report, this demo shows how agentic automation brings clarity to chaos—no log diving required.

Falcon Exposure Management AI Asset Criticality: Demo Drill Down

Security teams are overwhelmed by thousands of assets and alerts, with no clear path to prioritize what matters most. Falcon Exposure Management’s AI Asset Criticality feature delivers scalable, intelligent asset classification powered by human insight and machine learning. This demo shows how teams can move from manual tagging to AI-driven prioritization, helping them focus on critical risks, sharpen attack path analysis, and stay ahead of threats.

Client-Side Exploitation Attack Path

Client-side exploit delivery methods like malicious documents or browser-based attacks are among the most common ways adversaries gain initial access. But without visibility into these entry points, many attack paths go undetected. This demo shows how Falcon Exposure Management identifies and maps attack paths that begin with client-side exploitation. By combining exploit visibility with real network context and asset criticality, security teams can uncover hidden lateral movement risks and take action fast.

Falcon Adversary OverWatch with Next-Gen SIEM

Discover how CrowdStrike Falcon Adversary OverWatch with Next-Gen SIEM expands threat hunting across endpoints, identities, cloud, and third-party data to stop breaches quickly. By correlating subtle signals and enhancing them with world-class intelligence, OverWatch helps detect threats earlier and reduce alert fatigue. Gain 24/7 proactive threat hunting across your entire environment because breaches never wait.

AI Powered Risk Scoring with Falcon Next-Gen SIEM

Speed and precision are critical to stopping fast-moving threats. Falcon Next-Gen SIEM uses AI-powered risk scoring to help security teams focus on what matters most. By analyzing behavior, threat actor ties, prevention history, and business context, it surfaces high-risk threats automatically—driving smarter triage and faster response. Risk scoring powers UEBA for deeper, contextual visibility across users and assets. With dynamic prioritization and real-time insights, teams can cut through noise and act quickly.

Charlotte AI - Agentic Workflows - Impossible Time Travel

Logins from New York and Singapore—two minutes apart? That’s not time travel, that’s trouble. CrowdStrike’s Charlotte AI spots these impossible login anomalies instantly. By correlating RDP activity, calculating travel speeds, and taking risk-based action, Charlotte AI Agentic Workflows deliver real-time response to your SOC. No dashboards. No log diving. Just lightning-fast threat detection and action.

Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them.