RSA Conference 2018

April 16-20, 2018
Moscone Center, San Francisco, CA

FireEye is ready for RSA Conference 2018, the largest information security conference that is taking place at the Moscone Center in San Francisco, CA from April 16 to April 20. With more than 400 exhibitors expected at the show, we want to make sure you know what FireEye is up to throughout the conference. The following is a Who, What, Where and When for FireEye at RSA Conference 2018.

FireEye Booth Location: North Hall, Booth #4135

Visit our command center to meet with a specialist, catch in-booth theater presentations from our experts, and explore our interactive demos on Mandiant Consulting, FireEye Intelligence and Managed Defense, and FireEye Solutions.

To register for a FREE expo pass,
use this code: X8SFIREE

Video

FireEye Thought Leadership

FireEye @ North Hall - Booth #4135


To register for a FREE expo pass,
use this code: X8SFIREE

Speaking Sessions

Speaker: Paul Nguyen​, Vice President and GM, Helix and Orchestration, FireEye
Location: The Four Seasons San Francisco
Date/Time: April 18, 2018 / 7:30am - 9:30am

Speaker: Martin Holste, CTO, Cloud, FireEye & Paul Lee, Senior Cloud Solutions Engineer, FireEye
Session Title: Cloud Defender: Detecting and Responding to Adversaries in AWS
Date/Time: April 18, 2018 / 9:00am - 11:00am

Speaker: Tyler Croak, Sr. Systems Engineer, FireEye
Session Title: Life and Death of the DA - Protecting and Securing Admins (Thycotic)
Date/Time: April 18, 2018 / 10:40am - 11:00am

Speakers: Christopher Glyer, Chief Security Architect, FireEye and Nicholas Carr, Senior Manager, Advanced Practices Detection & Analysis Team, FireEye
Session Title: APT32 and Beyond - Detecting the New Breed of Nation-State Attacks
Date/Time: April 19, 2018 / 12:00pm - 12:30pm

Speaker: Luke McNamara, Principal Analyst, FireEye
Session Title: Examining North Korea's Pursuit of Cryptocurrencies
Date/Time: April 19, 2018 / 3:00pm - 3:45pm

Booth Presentations: Tuesday, April 17

Time Speaker, Title Presentation Title Description
10:30am - 11:00am 10:30am - 11:00am Luke McNamara, Principal Analyst Luke McNamara, Principal Analyst APT 37 APT 37 This presentation will cover APT37’s history, targeting, and tactics, as well as explain implications relevant to all organizations from our findings on this group. This presentation will cover APT37’s history, targeting, and tactics, as well as explain implications relevant to all organizations from our findings on this group.
11:00am - 11:30am 11:00am - 11:30am Brad Bell, Principal Consultant Brad Bell, Principal Consultant Strategic Trends in Critical Security Functions Strategic Trends in Critical Security Functions Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements. Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements.
11:30am - 12:00pm 11:30am - 12:00pm Julian Dana, Director Julian Dana, Director Executive Breach Preparedness Executive Breach Preparedness Description to come. Description to come.
12:15pm - 12:45pm 12:15pm - 12:45pm Paul Nguyen, Vice President, Product Strategy and Product Management Paul Nguyen, Vice President, Product Strategy and Product Management Building the SOC of the Future Building the SOC of the Future Learn about the future of security operations and the capabilities required to stay ahead of the curve. Learn about the future of security operations and the capabilities required to stay ahead of the curve.
1:00pm - 1:30pm 1:00pm - 1:30pm John Laliberte, SVP, Engineering John Laliberte, SVP, Engineering The Future of Endpoint Security The Future of Endpoint Security Protecting traditional and non-traditional endpoints at scale against adversaries that use fully automated playbooks to achieve their mission. Protecting traditional and non-traditional endpoints at scale against adversaries that use fully automated playbooks to achieve their mission.
1:45pm - 2:15pm 1:45pm - 2:15pm Luke McNamara, Principal Analyst Luke McNamara, Principal Analyst Cryptocurrencies & Cyber Threat Activity Cryptocurrencies & Cyber Threat Activity Beyond the news headlines, explore how cryptocurrencies are being used—and targeted—by adversaries, and what this says about changes in the cyber-crime landscape. Beyond the news headlines, explore how cryptocurrencies are being used—and targeted—by adversaries, and what this says about changes in the cyber-crime landscape.
2:30pm - 3:00pm 2:30pm - 3:00pm Josh Madeley, Principal Consulstant and Stu Reynolds, Senior Manager, Security & Intelligence Architecture Group Josh Madeley, Principal Consulstant and Stu Reynolds, Senior Manager, Security & Intelligence Architecture Group The Threat from Iran The Threat from Iran Come learn about FireEye’s insights into three Iranian threat actors—APT33, APT34, and APT35—and how their activity is becoming more prolific. Come learn about FireEye’s insights into three Iranian threat actors—APT33, APT34, and APT35—and how their activity is becoming more prolific.
3:15pm - 3:45pm 3:15pm - 3:45pm Christopher Glyer, Chief Security Architect Christopher Glyer, Chief Security Architect M-Trends 2018 M-Trends 2018 Review of key highlights and observations from Mandiant's 2017 investigations. Review of key highlights and observations from Mandiant's 2017 investigations.
4:00pm - 4:30pm 4:00pm - 4:30pm Vasu Jakkal, EVP & CMO Vasu Jakkal, EVP & CMO We Are FireEye We Are FireEye Learn how FireEye fights evil and protects customers by uniquely combining unparalleled frontline expertise and intelligence with world-class technology. Learn how FireEye fights evil and protects customers by uniquely combining unparalleled frontline expertise and intelligence with world-class technology.
4:45pm - 5:15pm 4:45pm - 5:15pm John Miller, Senior Manager, Analysis John Miller, Senior Manager, Analysis Threat Landscape Threat Landscape This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it. This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it.

Booth Presentations: Wednesday, April 18

Time Speaker, Title Presentation Title Description
10:30am - 11:00am 10:30am - 11:00am Julian Dana, Director Julian Dana, Director Executive Breach Preparedness Executive Breach Preparedness Description to come. Description to come.
11:00am - 11:30am 11:00am - 11:30am Barbara Massa, EVP, Worldwide Human Resources Barbara Massa, EVP, Worldwide Human Resources We Are FireEye We Are FireEye Learn how FireEye fights evil and protects customers by uniquely combining unparalleled frontline expertise and intelligence with world-class technology. Learn how FireEye fights evil and protects customers by uniquely combining unparalleled frontline expertise and intelligence with world-class technology.
11:30am - 12:00pm 11:30am - 12:00pm Luke McNamara, Principal Analyst Luke McNamara, Principal Analyst Cryptocurrencies & Cyber Threat Activity Cryptocurrencies & Cyber Threat Activity Beyond the news headlines, explore how cryptocurrencies are being used—and targeted—by adversaries, and what this says about changes in the cyber-crime landscape. Beyond the news headlines, explore how cryptocurrencies are being used—and targeted—by adversaries, and what this says about changes in the cyber-crime landscape.
12:30pm - 1:30pm 12:30pm - 1:30pm Christopher Glyer, Chief Security Architect Christopher Glyer, Chief Security Architect State of the Hack State of the Hack Description to come. Description to come.
1:45pm - 2:15pm 1:45pm - 2:15pm Josh Madeley, Principal Consulstant and Stu Reynolds, Senior Manager, Security & Intelligence Architecture Group Josh Madeley, Principal Consulstant and Stu Reynolds, Senior Manager, Security & Intelligence Architecture Group The Threat from Iran The Threat from Iran Come learn about FireEye’s insights into three Iranian threat actors—APT33, APT34, and APT35—and how their activity is becoming more prolific. Come learn about FireEye’s insights into three Iranian threat actors—APT33, APT34, and APT35—and how their activity is becoming more prolific.
2:30pm - 3:00pm 2:30pm - 3:00pm Brad Bell, Principal Consultant Brad Bell, Principal Consultant Strategic Trends in Critical Security Functions Strategic Trends in Critical Security Functions Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements. Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements.
3:15pm - 3:45pm 3:15pm - 3:45pm Christopher Glyer, Chief Security Architect Christopher Glyer, Chief Security Architect M-Trends 2018 M-Trends 2018 Review of key highlights and observations from Mandiant's 2017 investigations. Review of key highlights and observations from Mandiant's 2017 investigations.
4:00pm - 4:30pm 4:00pm - 4:30pm John Laliberte, SVP, Engineering John Laliberte, SVP, Engineering The Future of Endpoint Security The Future of Endpoint Security Protecting traditional and non-traditional endpoints at scale against adversaries that use fully automated playbooks to achieve their mission. Protecting traditional and non-traditional endpoints at scale against adversaries that use fully automated playbooks to achieve their mission.
4:45pm - 5:15pm 1:00pm - 1:30pm John Miller, Senior Manager, Analysis John Miller, Senior Manager, Analysis Threat Landscape Threat Landscape This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it. This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it.

Booth Presentations: Thursday, April 19

Time Speaker, Title Presentation Title Description
10:30am - 11:00am 10:30am - 11:00am John Miller, Senior Manager, Analysis John Miller, Senior Manager, Analysis APT 37 APT 37 This presentation will cover APT37’s history, targeting, and tactics, as well as explain implications relevant to all organizations from our findings on this group. This presentation will cover APT37’s history, targeting, and tactics, as well as explain implications relevant to all organizations from our findings on this group.
11:30am - 12:00pm 11:30am - 12:00pm John Miller, Senior Manager, Analysis John Miller, Senior Manager, Analysis Threat Landscape Threat Landscape This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it. This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it.
12:30pm - 1:00pm 12:30pm - 1:00pm Brad Bell, Principal Consultant Brad Bell, Principal Consultant Strategic Trends in Critical Security Functions Strategic Trends in Critical Security Functions Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements. Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements.
1:00pm - 1:30pm 12:15pm - 12:45pm Paul Nguyen, Vice President, Product Strategy and Product Management Paul Nguyen, Vice President, Product Strategy and Product Management Building the SOC of the Future Building the SOC of the Future Learn about the future of security operations and the capabilities required to stay ahead of the curve. Learn about the future of security operations and the capabilities required to stay ahead of the curve.

Come see FireEye at RSA Conference 2018