Endpoint Detection & Response (EDR) , Next-Generation Technologies & Secure Development , Open XDR

Detection and Response: Closing Gaps Adversaries Exploit

CrowdStrike CTO Fabio Fratucello Discusses XDR, SIEM, Automated Workflows
Fabio Fratucello, CTO, APAC, CrowdStrike

Adversaries are continually exploiting organizations faster than ever before. The time between when an adversary gains access to a system and when they launch an attack is now just minutes. If defense teams miss an alert or an automated defensive response doesn't take place, it could result in a successful breach or a ransomware attack.

Fabio Fratucello, CTO for Asia-Pacific and Japan at CrowdStrike, says, "Defenders need to continue to advance their defensive capabilities. They need to be able to streamline operation and reduce time when performing detection and response functions."

In this exclusive videocast, Fratucello discusses:

  • The challenges in detecting malicious activity;
  • How XDR software differs from endpoint detection and response software;
  • How SIEM is evolving and how automated workflows can enhance response times.

Fratucello is a technology and security executive with over 25 years of international experience working for private companies and large multinationals in a variety of management, technical and advisory roles. He focuses on accelerating growth and driving strategic direction, technology innovation and partnerships for CrowdStrike around the globe and is responsible for developing and executing on CrowdStrike's regional technology road map and helping customers to develop cyber defense strategies, manage their cyber risks and achieve success on their cyber journey.


About the Author

Jeremy Kirk

Jeremy Kirk

Executive Editor, Security and Technology, ISMG

Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.