2018 On Demand Webinars


  • Facing Forward: Cyber Security in 2019 and BeyondHear Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. He will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye Threat Intelligence, Mandiant incident responders, and FireEye Labs.
  • Navigating Today’s Global Cyber Regulations – Regional PerspectivesJoin experts, Ron Bushar, VP & CTO of Government Solutions at FireEye, Michael Trevett, Director of Professional Services at FireEye Mandiant, and Heather Sussman, Partner at Ropes & Gray, as they share their security and legal expertise about the executive perspectives on the huge impact changing security regulations has on how organizations are thinking about cyber security and many more related considerations.


  • Leading with Threat Intelligence – How to Select the Right Security ProviderHear Nick Flores, Security Consulting Director at FireEye Mandiant, as he shares insights and expertise on what you need to consider when evaluating how to select the right security partner for your organization.
  • APT38: Un-usual SuspectsAPT38 is a newly identified cyber-crime organization that has attempted to steal over $1.1 billion by attacking more than 16 financial organizations in 13 different countries. Join us for a detailed discussion on the tactics, techniques and procedures used by APT38 and what you can do to defend your organization.
  • Machine Learning: A Crystal Ball for Endpoint ProtectionAs part of the MISTI Endpoint eSummit, hear Jeff Johns, Director of Data Science at FireEye share how machine learning is driving the evolution of endpoint protection. Also, learn about examples of ML models running in research and production as part of FireEye Endpoint Security
  • Securing Office 365 from AttackersDid you know that attackers are using Office’s eDiscovery features to search for sensitive data? FireEye has rules that look specifically for eDiscovery use and exports from eDiscovery, which are generally rare in an uncompromised organization. Please join Martin Holste, FireEye’s CTO for a security discussion on Office365.
  • Cloud Cover: How Providers, Customers & Criminals Leverage the Cloud Join us for this webinar, hosted at the MISTI Security Analytics and Operations eSummit, as our experts discuss risk mitigation for cloud service customers; Case studies and best practices on Cloud Security based on FireEye analyst research & observations; Solutions to protect customers in the cloud.


  • Cyber Resilience Virtual SummitAttend the FireEye Cyber Resilience Virtual Summit to learn how the combination of technology, threat intelligence and expertise can help you develop the cyber resilience you need. Over three days, our experts will share insights and intelligence from our latest investigations and the frontlines of cyber security.
  • Evolving to an Intel-led Security OrganizationCome hear from our experts about what threat intelligence can do for you, and hear from a FireEye customer who has made this journey, transforming its security operations to be intelligence-led.
  • Cyber Security Risk Management –New Methods to Gain ControlHear our expert panel share their security and legal expertise on new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.
  • Expert Panel: Responding to Evolving Threats With People, Intelligence & TechnologyIn this expert panel discussion, learn how threats are evolving, how companies are becoming more proactive in the response to the threats and how technology is changing to provide greater protection, detection and response to the emerging threats.
  • Connecting the Dots: the Importance of an Integrated Security SolutionWith most security solutions equipping to solve only narrow problems, it has become the norm for organizations to deploy an unbearable amount of technologies. Join Misha Sokolnikov, Director of Product Marketing, FireEye as he shares how you can better connect the dots of your integrated cybersecurity solution.
  • FireEye Global Threat Response – How we Protect the WorldThis presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • What Executives Should Know about Cyber AIArtificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Join this webinar to better understand how AI will impact cyber security before you rely on it for your defenses.
  • Your Breach Readiness Master Plan: Take the Sting out of a Cyber Attack“Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, providing an answer that ensures their organisation’s cyber-security posture and incident response (IR) plan is built for success. Join our expert panel as they share insights to help you build a solid master plan.
  • Cyber Security in Today's IoT WorldJoin us for this webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
  • Are you Ready to Handle a Cyber Crisis?How prepared are you and your organization to respond to a data breach? Execs and their teams in PR/Communications, Cybersecurity, IT, (external) Legal Counsel, and others, should all be intimately aware of the Breach Response Plan and practice their tasks regularly through a Cyber Breach Simulation, or Tabletop Exercise. Join us for this webinar to learn more.
  • How to Elevate Security as a Boardroom PriorityThis webinar explores the gap between security and business risk, and examines the opportunities for alignment in Digital Trust, as a prerequisite for digital transformation.
  • The Double-Edged Sword of Cloud Securityn many ways, public cloud is more secure than a traditional data center. And yet, assets on the public cloud are still being compromised just as those stored in traditional data centers. In this session, we will discuss the challenges in Cloud Security and how to design an effective strategy to tackle them.
  • Autopsy of a real ICS case – TRITONJoin David Grout, our Technical Director for South EMEA, for a live session and get insights into the technical framework details and the potential outcomes of TRITON.
  • Fly True: Aim for Cyber Readiness with Aviation-Specific Threat InsightsJoin Christopher Porter, the chief intelligence strategist at FireEye, as he shares the topics he covered from his expert congressional testimony on the important role cybersecurity plays in national aviation security.
  • The BIG Cyber Security Skills GapDuring this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
  • Privacy & Security in the Age of IoTJoin privacy and cyber security experts for an interactive panel roundtable discussion on: The privacy and security vulnerabilities and risks stemming from IoT devices; The basic safety measures you can deploy to protect your home and workplace against cyber threats; Best practices for privacy and security safeguards; What to do in the event of a breach; What the future of privacy looks like


  • Keys to Unlock Powerful Cyber SecurityIn this webinar, featured analyst, Gorka Sadowski, Research Director, Security Infrastructure Protection with Gartner and Christopher Porter, Chief Intelligence Strategist with FireEye, explore the four key activities of incident lifecycle management: prevent, detect, respond and predict, to help you grasp the intricacies of cyber security success and options to achieve it.
  • How to Identify and Respond to Laterally Moving ThreatsJoin Fayyaz Rajpari, Senior Solutions Architect at FireEye and Druce MacFarlane, Director of Security Products at Gigamon as they discuss how to: Monitor the perimeter effectively and catch perimeter threats; Identify threats, even when they are encrypted; Monitor the network to identify and stop laterally moving threats; Protect your organization during each stage of a lateral attack lifecycle
  • Trends in Data Breaches and Comprehensive Response: Does your organization have a data breach response plan? Discover the best practices for breach response and how to strengthen your organization's cyber resilience. Join this interactive Q&A panel with top security experts as they discuss: The latest trends in data breach protection; Who's most at risk; How to detect breaches faster; What to do and not to do when it comes to breach response; Recommendations for CISOs for improving security
  • Keeping Up with Advanced Attackers: Understanding Threats and Adapting DefencesAttackers are becoming more sophisticated in exploiting vulnerabilities, acquiring hacking tools on the dark web and leveraging automation, making traditional defense strategies antiquated and obsolete. Join Alister Shepherd, our Mandiant Director for EMEA, for insights into recent APT intrusion activity from different regional threat actors; Current attack techniques that have been successful during these intrusions; Detections and investigations conducted by Mandiant; Lessons learned for defenders


  • Executive Panel | Financial Services: Cyber Threats on the HorizonJoin Kevin Taylor, EMEA VP, FireEye as he leads a discussion with Sandra Joyce, VP, Global Intel Operations, Stuart McKenzie, VP, EMEA Mandiant and Simon Moor, VP, NEUR, for a lively video panel exchange. The conversation will provide executive insights for critical topics relevant to the financial services industry. The topics include the nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs); the ripple effect consequences of geopolitics, the cost of a breach, importance of risk awareness in the boardroom and the need to keep GDPR a high priority.


  • The Attacker's Invoice: Real Costs of a Cyber BreachCyber breaches that result in data loss are often accompanied by heavy costs—some costs are obvious, while others are unexpected. Join Jon Horner, Senior Consultant, Mandiant FireEye with featured speaker, Eric Packel, Partner, BakerHostetler, as they break down the costs of a breach, detail each cost, and explain how to estimate the business impact of each line item.
  • Video Interview | How to Build a Robust Threat Intel FunctionCyber threat intelligence is an essential weapon for detecting and preventing advanced attacks from well-funded attackers with specific agendas and targets.Watch this interview with Sandra Joyce, head of global threat intel, and Igors Konovalovs, Director for iSIGHT Intelligence EMEA, as they answer some of the most practical and pressing questions about cyber threat intelligence.
  • Impersonation: The Many Masks of Email ThreatsYou can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot. Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks
  • Video Panel | Cyber Security in Europe: An Executive Perspective Cyber breaches are inevitable because attackers constantly change their tools, techniques and procedures (TTPs). Everyone is affected in different ways, whether from compromised systems or supply chains to the financial implications of non-compliance and breach notification. Join us for a live video panel on trending topics in cyber security.
  • Breach Response Preparedness - Webinar SeriesWhy do organisations keep failing at IR? What makes an incident response team work? How do I maximise the efficiency of my resources? To answer these questions and many others, please join us for a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.


  • Discover the Hidden Threats With Network ForensicsMany modern cyber attacks routinely bypass firewalls and other perimeter defenses, leaving security professionals to play “whack-a-mole,” beating down threats as quickly and efficiently as they can. Hear Bill Cantrell, VP of Network Product Management to get insight on how you can get increased visibility into network traffic, and quickly find the threats hiding in your network.
  • Impersonation Attacks: The New Email Based ThreatsThe email threat landscape is changing. Impersonation attacks and malicious URLs are becoming more popular. Join Ken Bagnall, VP Email Security, FireEye and Levi Lloyd, Sr. Manager, Detection Services, who addresses the latest changes in email attack tactics.


  • AI and the Future of Cyber ConflictAs more companies integrate AI applications into their businesses, they must understand the risks associated with this technology. Join Michelle Cantos, Strategic Intelligence Analyst, as she discusses the changing geopolitical landscape as threat actors develop and implement AI capabilities, as well as the use of AI applications in businesses and associated vulnerabilities.
  • Cryptocurrencies: Trends and ThreatsCyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
  • Rise of the Rest: APT Groups No Longer From Just China and Russia As part of the MISTI APT eSummit, Executive Briefer, Sarah Geary talks about the threat actors associated with the Chinese and Russian government, and how they remain among the most sophisticated. This past year marks the first time that FireEye has designated actors from other countries as APT groups. As more countries conduct inexpensive and efficient cyber operations, the public should be aware of how these threats affect the public and private sectors.


  • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's PriorityJoin us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.
  • Artificial Intelligence in the Cyber DomainArtificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Join this webinar to understand how AI will impact cyber security before you rely on it for network defense.
  • M-Trends 2018 - Understanding Today's Cyber Attack Trends Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.


  • Artificial Intelligence in Cyber Warfare: A PrimerArtificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.
  • Hitting the Jackpot: Cybercriminals' Persistent Interest in ATM Exploitation OpsJoin this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.
  • Breach Response Readiness: What the C-Suite Needs to KnowGiven today’s cyber landscape, all C-suite leaders have an important role to play in their organization’s cyber security posture and IR plan. Their individual and departmental contributions must help protect vital assets, safeguard privacy and ensure uninterrupted operations.
  • Building a Secure Future for Women in Cyber SecurityAside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof. Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.
  • How to Cope with GDPR Strict Breach Reporting Rules With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.


  • APT37: The Overlooked North Korean ThreatAPT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.


  • Cyber Security Predictions: What is in Store for the EMEA Regions2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.