Webinars

2018 On-Demand Webinars

May

  • AI and the Future of Cyber ConflictAs more companies integrate AI applications into their businesses, they must understand the risks associated with this technology. Join Michelle Cantos, Strategic Intelligence Analyst, as she discusses the changing geopolitical landscape as threat actors develop and implement AI capabilities, as well as the use of AI applications in businesses and associated vulnerabilities.
  • Cryptocurrencies: Trends and ThreatsCyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
  • Rise of the Rest: APT Groups No Longer From Just China and Russia As part of the MISTI APT eSummit, Executive Briefer, Sarah Geary talks about the threat actors associated with the Chinese and Russian government, and how they remain among the most sophisticated. This past year marks the first time that FireEye has designated actors from other countries as APT groups. As more countries conduct inexpensive and efficient cyber operations, the public should be aware of how these threats affect the public and private sectors.

April

  • M-Trends 2018 - Understanding Today's Cyber Attack Trends Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.
  • Artificial Intelligence in the Cyber DomainArtificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Join this webinar to understand how AI will impact cyber security before you rely on it for network defense.

March

  • Artificial Intelligence in Cyber Warfare: A PrimerArtificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.
  • Hitting the Jackpot: Cybercriminals' Persistent Interest in ATM Exploitation OpsJoin this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.
  • Breach Response Readiness: What the C-Suite Needs to KnowGiven today’s cyber landscape, all C-suite leaders have an important role to play in their organization’s cyber security posture and IR plan. Their individual and departmental contributions must help protect vital assets, safeguard privacy and ensure uninterrupted operations.
  • Building a Secure Future for Women in Cyber SecurityAside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof. Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.
  • How to Cope with GDPR Strict Breach Reporting Rules With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.

February

  • APT37: The Overlooked North Korean ThreatAPT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

January

  • Cyber Security Predictions: What is in Store for the EMEA Regions2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.