Webinars
On Demand Webinars
Filter webinars by:
Solution / Service
Industry
Region
UNC2452: What We Know So Far
Get all the latest information on UNC2452, the actor behind the SolarWinds supply chain compromise.
Survey Says: A Modern SOC Requires XDR
Hear why XDR is so important for security teams to address today’s advanced attacks.
Survey Says: A Modern SOC Requires XDR
Hear why XDR is so important for security teams to address today’s advanced attacks.
Threat Intelligence Briefing, hosted by Nextgov
Tune in to hear what’s at stake for government agencies, from critical infrastructure to risk management.
Living Off The Land on a Private Island: An Overview of UNC1945
Learn about UNC1945, a Mandiant tracked group, who operates against a tailored set of targets within the financial and professional consulting industries by leveraging access to third-party networks.
To XDR or Not to XDR?
Explore the promise of XDR and on how to supercharge automation and effectiveness in the security operations center.
Cyber Summit 2020
Hear keynotes from some of FireEye’s leading experts and informative sessions on a range of topics.
FIN11: A Widespread Ransomware and Extortion Operation
Learn about FIN11, a financially motivated threat group impacting organizations across multiple sectors & geographies.
The Convergence of Security & Network Architectures
Hear from iboss and FireEye how to better protect the evolving cloud environment with a multi-vector defense solution.
Connect the Dots of Your Security Evidence: The Role of XDR
Learn how organizations are deploying XDR to detect and respond to attacks faster at a fraction of the cost.
Cloud Security: Not Just a Visibility Problem Anymore
Watch as frontline response experts & former CISOs share how to better manage effective cloud security.
How Continuous Validation Helps Protect the Supply Chain
Learn how intelligence-led validation can help tighten controls and reduce risk around the supply chain.
FireEye Helix Explained: Multi-Stage Rules
Tune in as our expert panel shares how to optimize functionality in Helix to better manage rules, alerts and much more.
Opening the Books on Ghostwriter
Join threat intelligence expert, Lee Foster, as he describes the discovery and details of the Ghostwriter campaign.
Extend Network Protection & Forensics to Microsoft Azure
Hear experts at Keysight & FireEye share best practices for network, cloud security & forensics in Azure environments.
Community Resilience: Working to Improve Cybersecurity
Explore how threat intelligence & peer collaboration can extend cyber resilience beyond a single campus boundary.
Mitigate Ransomware Risks with a Enterprise Content Firewall
Hear how to better protect all your communication channels using joint Accellion & FireEye solutions.
Building a Ransomware Defense
Hear how advanced detection, prevention & front line response practices are the best defense against ransomware attacks.
Cybersecurity Expertise & Female Leadership
Hear about the opportunities that exist for women in cyber security and insights into preparing for board level roles.
Ransomware Legal Implications and Proactive Solutions
Hear this expert panel for a discussion on ransomware and how to address legal implications and manage insurance risk.
BrightTALK Local California: The Future of Events
Hear how two of the Golden State’s top CMOs are adapting their strategies to drive results during & after the pandemic.
Understanding & countering threats in higher education
An interactive discussion about cyber threats facing higher education & how you can prioritize your limited resources.
FireEye Virtual Summit | Empower. Evolve. Defend.
Hear best practices, research, and strategies to empower organizations to evolve their cyber security posture.
Integrating Better Intelligence for Better Security
Hear our expert panel discuss how a combined Anomali-FireEye solution can drive better integrated security.
Enabling Secure Remote Access for Your Campus
Hear how to adapt a college or university cybersecurity strategy in today's security landscape.
Current Landscape of Mid-Market Threat Intelligence
Watch this joint webinar with One Source as experts highlight how to better address mid market targeted cyber threats.
2020 Mandiant Security Effectiveness Report Findings
Hear why a majority of tested attacks are able to infiltrate without detection & why security validation is critical.
FireEye Helix Explained - Dashboards and Reports
Join this expert panel as they share tips to boost the effectiveness of your security operations with Helix.
Security Effectiveness Strategies
Tune in for a robust exchange with Mandiant cyber security experts, on how to validate & improve your security posture.
Intel Led Threat Protection For SaaS-Mobile Environment
Hear how FireEye’s detection capabilities can be combined with CipherCloud to stop malicious content from being shared.
Threat Intel Drives Effective Vulnerability Management
Learn how CTI helps drive better-informed vulnerability management decisions & effectively manage the associated risks.
Knowing is Half the Battle: Cloud Visibility and Protection
Join cloud expert Martin Holste & featured Forrester analyst Andras Cser, share how to optimize your cloud solution.
Breach preparedness using cyber risk assessment & mitigation
Hear experts share how to best evaluate and manage cyber risk for state, local and public sector organizations.
They Come in the Night: Emerging Ransomware Trends
Uncover the latest ransomware research including new trends in intrusion vectors, dwell time, deployment & tactics.
FireEye Helix Explained - Mandiant Query Language Searches
Tune in to hear in depth MQL best practices & platform features to help optimize SOC effectiveness.
Security Tips For Remote Access During COVID-19
Hear our experts share best practices that will enable your remote workforce rollout while reducing security risks.
M-Trends 2020: Insights into Today’s Cyber Attacks
Join us for this webinar as FireEye Mandiant experts discuss highlights & case studies from the M-Trends 2020 report.
2020 Security Technology for the Multi-Cloud
Hear this panel of experts discuss multi-cloud adoption & the challenges of securing organizations against cyber attacks
Operationalizing Cyber Threat Intel
Join us as we look specifically at how cyber threat intelligence can help improve computer network defense operations.
The Board Landscape
Learn how women who are cyber professionals can uniquely position themselves for senior leadership & Board roles.
Protect All Files from Malware with a Content Firewall
Learn the value of seeing, controlling, securing, & tracking what enters, moves through and leaves your organization.
Instrumenting Cloud Security to Validate Critical Controls
Learn how a proactive and measurable approach can enable your organization to identify risks before a breach.
Investigation on Demand: Use Cases for SOC support
Better investigations can lead to better decision-making during security events. FireEye Expertise On Demand can help.
How to Resolve the Cyber Skills Gap
Hear about the cyber skills crisis in line with the evolving threat landscape & mitigation options.
Perspective on Iranian Attacks & Practical Mitigations
Watch this webinar, as our experts provide an overview on the current threat landscape from Iran.
FireEye Chat - Insights into 2020 and Beyond
In this episode of FireEye Chat, we dive deeper into election security and the emerging role of the general counsel.
Validate Cyber Security Effectiveness
Learn more about the new FireEye Purple Team Assessment., which combines FireEye Mandiant expertise & Verodin SIP.
The Road Ahead: Cyber Security in 2020 and Beyond
Hear insights into various topics discussed in our report, The Road Ahead: Cyber Security in 2020 and Beyond.
The Shifting Balance: Expertise, Automation & Cybersecurity
AI machine or human expert? Learn how to identify which approach to take when solving cybersecurity challenges.
Ransomware Cripples Local Governments: Prepare and Respond
Learn how to protect the government sector's most important assets from ransomware attacks and steps to remediate.
FireEye Chat - Front and Center on SOC optimization
Hear FireEye experts firsthand, share why you need to work smarter, not harder when it comes to SOC optimization.
Solutions for Effective Network Security in the Cloud
Hear industry experts share how you can ensure that data flowing into the cloud doesn’t leave an opening for attackers.
Keeping Local Governments Safe from Ransomware
Hear how local government leaders can protect their most important assets from ransomware attacks.
More Cloud, More Problems?
Join this webinar to ensure that your organization’s cloud strategy is less of a problem than you might think.
Cyber Threats Impacting Healthcare Today
Hear FireEye and Beazley present a webinar that discusses the latest breach and threat landscape trends in Healthcare.
Higher Ed Cyber Threats
Hear experts share what you need to know to better defend your campus.
Protecting the Academy: Cyber Threats for Higher Education
Find out more about the top cyber threats facing higher education institutions today.
Double Dragon: APT41, an espionage & crime operation
Learn more about FireEye’s newly named threat group, APT41 and why they are a threat to contend with.
Ask the Expert Interview at BlackHat | Ground Truth about the Cyber Skills Shortage
Cyber security practitioners are already at a disadvantage in the asymmetric battle for the fate of their company’s and customers’ networks and have much to teach the rest of us about how organizations can overcome the shortfall. Watch expert Danny Slack, as he talks about stories and strategies from the cyber defender’s perspective.
Expert Panel at BlackHat | CISO's Toolbox: Strategies for Success
Watch this recording of industry experts at BlackHat 2019, share what CISOs need to be successful at their job, discover the challenges CISOs are facing and the ways they are solving them, plus many more interesting insights.
FireEye Chat | Front and Center with Colin Carmichael and Jason Martin on the Cybersecurity Skills Shortage
The rise of technology, combined with more complex cyber security products and cyber threats, have gradually increased the demand for experienced, trained experts to fill a growing number of critical security roles in industry and government worldwide.
Interview: Tim Appleby on Cloud Security Solutions for Government
Recorded live at the AWS Public Sector Summit 2019, Tim Appleby, Director of Federal Programs at FireEye discusses how the public sector is embracing cloud and managing risk.
Interview: Martin Holste on the Future of Security in the Cloud
Recorded live at the AWS Public Sector Summit 2019, Martin Holste, Cloud Services CTO at FireEye discusses the future of security in the cloud.
Recorded live at the AWS Public Sector Summit: Cloud Security Breakfast Briefing
Tune in to this video, which features event highlights and tips from our panel of cloud security subject matter experts at the recent AWS Public Sector Summit.
Recorded live at the AWS Public Sector Summit: Top 5 Cloud Myths Busted
See a recorded video presentation from the Cloud Security Breakfast Briefing, hosted by FireEye and AWS, as Martin Holste, Cloud Services CTO at FireEye helps debunk several common myths that jeopardize your fast, secure, migration to the cloud.
Cloud Security Solutions for Government: Recorded at AWS Public Sector Summit
In this briefing, hear experts from AWS and FireEye address how organizations can achieve the security needed to protect user credentials, proactively identify vulnerabilities and centralize security monitoring.
AWS Public Sector Summit: Cloud Security and the Shared Responsibility Model
Watch Stephen Alexander, National Security Senior Solutions Architect at AWS as he discusses driving cloud security and understanding the shared responsibility model.
Recorded at the AWS Public Sector Summit: Government Cloud Adoption
In this video, Tim Appleby, FireEye's Director of Federal Programs discusses government cloud adoption and how to develop and Implement an effective cloud assurance program.
FireEye Virtual Summit | Cyber Security Resilience, Research and Results
Executive Track: This track was designed for Executives & Board Members, General Counsel and all C-level personnel
FireEye Virtual Summit | Cyber Security Resilience, Research and Results
Practitioner Track: Designed for Security Researchers, Analysts, Frontline Responders, & Managers.
How FireEye Protects FireEye
FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.
Help, my users have been hacked! What happened and how do I respond?
Watch this webinar as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
A Review of Cyber Resilience -- Past, Present, and Future
While cyber-attacks are inevitable, proper preparation is the essential element that sets resilient organizations apart from the rest in managing risk, minimizing damage, and recovering quickly from any incidents. Join us as we discuss three strategic imperatives to strengthen cyber resilience
The Cyber Skills Gap: A Practitioner’s Perspective
The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. Watch this webinar for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats.
Simplifying Security Operations with ONE Platform
Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.
Cyber Threats and Elections: What You Need to Know
Election security has become a growing priority for governments and citizens alike on a global scale. Join this webinar to uncover the differing threats facing entities within an election’s ecosystem.
How To Train Your Email Security Dragon
The numbers make stark reading. 281 billion emails sent daily to over two billion business users. 91% of all cyber-attacks start with an email and it only takes ONE with malicious intent to impact your organization. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned. Learn more about how you can better protect your organization.
Green Demon Denied
A great Managed Detection and Response (MDR) service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
Using Risk Management to Optimize Cybersecurity Costs
Cyber risk management is a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs. In this webinar, we highlight how to help executives effectively implement cyber risk management practices today.
APT Groups: How They Think, What They Want, and How to Fight Them
Hear David Grout, FireEye EMEA Chief Technology Officer explain how effective cyber threat intelligence (CTI) helps you understand APT groups’ intents and tactics so you can stay ahead of attacks, instead of just reacting to them.
A Red Team Case Study
Join this webinar, to get a case study detailed in the FireEye M-Trends 2019 report, where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
Threat Intelligence on the Frontlines
Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities don't miss the latest real-world intelligence findings that have impacted the industry.
Defensive Security Techniques You Can Use Now
Get a deep dive on a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.
Understanding, Combating, and Identifying Insider Threats for Government
Learn why organizations must stay vigilant against external threats while keeping a keen eye on the risk that insider threats pose.
The Role of the General Counsel in Cyber Security Decision-Making
In this video, Alexa King, EVP and General Counsel sits down with Karen Kukoda, FireEye Senior Director of Strategic Alliances, to discuss not only the role the General Counsel plays in cyber security, but also the duties of the board of directors in overseeing cyber security.
Higher Education Cyber Threat Report Webinar
Examine the current risk environment – based on data from the latest FireEye M-Trends report – and unpack what it means for higher education professionals. We’ll offer fresh insights for understanding and preventing advanced attacks and give practical advice for reducing your cyber risk.
A 360-Degree View of the Latest APT Groups
Get a high-level overview on how nation-state interests are driving APT activity and insight into the most recent APT groups investigated by FireEye.
Code Triage: Why Healthcare is Facing More Cyber Attacks and How to Protect Your Organization
Learn more about what healthcare security teams need to understand to battle the unique security concerns they face.
Defending Against Cyber Threats
Join this expert panel as they discuss the latest industry topics including: Top 5 cyber threats businesses face today, Notable cyber attack methods and strategies and how to protect against them, Solutions for network visibility, breach detection and response, Recommendations for improving security and steps to take today.
FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it.
How to Develop and Implement an Effective Cloud Assurance Program for Government
Join FireEye’s Ron Bushar, Vice President & CTO - Government Solutions, as he shares steps and best practices to building a cloud assurance program.
M-Trends 2019 - Trends Behind Today's Cyber Attacks
Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.
The BIG Cyber Security Skills Gap
During this webinar we will discuss the benefits and challenges of in-house vs. outsourcing of cyber security operations, and how this has been affected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
The Email Security Goal: ONE Single Solution
FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape.
Ask the Expert - M-Trends 2019: Trends Behind Today’s Most Impactful Breaches and Cyber Attacks
Learn more about the latest developments from the newly launched M-Trends 2019 report. Get direct insight from Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye as he highlights some of the report’s most interesting and impactful findings.
MITRE ATT&CK Evaluation Framework Analysis
During this session, our EMEA CTO David Grout will present the MITRE Methodology and how to interpret it. We will discuss the metrics and capabilities highlighted during this process and how FireEye has been ranked the number #1 EDR in this test.
Top 5 Cloud Security Myths Debunked
Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story. Watch this webinar to help debunk several common myths that jeopardize your fast, secure, migration to the cloud.
How to Build Intelligence-Led Security Capabilities
To manage cyber risk effectively, you need cyber threat intelligence (CTI) that enables your organization to identify relevant threats and understand how threat actors operate. This webinar shares current practices.
The Best Way to Assess Incident Response Preparedness
Many breached organizations believed they had effective security programs and incident response plans. Reality proved otherwise. Join this webinar to learn how to achieve effective preparation.
The Cyber Security Skills Gap
During this webinar we will be covering how the industry has been affected by a cyber-skills shortage and the challenges of inhouse vs. outsourcing of cyber security operations.