SETTING THE NEW STANDARD
FOR SECURITY IN THE CLOUD ERA
CrowdStrike is a leading cybersecurity company protecting customers from all cyber threats by leveraging its Security Cloud to stop breaches. From its inception in 2011, driven by George Kurtz’s vision, CrowdStrike was created as a different kind of cybersecurity company.
Cloud-native, CrowdStrike immediately brought a threat perspective, effectiveness, scalability, and flexibility never seen before in the industry – seamlessly aligning People, Technology, and Processes.
The CrowdStrike Falcon platform has revolutionized enterprise security for the cloud era. Its single lightweight-agent architecture leverages artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints and workloads on or off the network.
Systems Engineering Manager, MEA
CEH, CHFI, LPT, CCNP, CCFA, CCFR, CCFH, CSIRT, ITIL
Roland Daccache is a cybersecurity expert with over 12 years in the field.
Currently the Sales Engineering Team Leader at CrowdStrike META, Roland is a team builder of cybersecurity experts, and has run multiple large-scale projects including two major Security Operations Centers in the GCC.
Roland is an expert in digital forensics, threat hunting, and incident response, with expertise in solution architecture, EDR, NGFW, NGIPS, SIEM, and threat intelligence.
Roland regularly delivers keynotes and publishes articles in the regional cybersecurity e-outlets.
Speech Topic & Synopses
Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization’s network architecture. Zero trust security means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network. This added layer of security has been shown to prevent data breaches.
The Panel session will cover aspects of Zero Trust that include top cyber security companies CrowdStrike, Vectra and InfoBlox discussing three main questions:
- What is the strategy to achieve zero-trust architecture for their customer environments?
- How do you believe identity and endpoint contribute as main pillars for zero-trust architecture?
- What is your advice for enterprises in order to embark on the journey of building resilient zero-trust models from a wholistic view?