FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape.
Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.
Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it.
During this webinar we will discuss the benefits and challenges of in-house vs. outsourcing of cyber security operations, and how this has been affected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
Join this expert panel as they discuss the latest industry topics including: Top 5 cyber threats businesses face today, Notable cyber attack methods and strategies and how to protect against them, Solutions for network visibility, breach detection and response, Recommendations for improving security and steps to take today.
Learn more about the latest developments from the newly launched M-Trends 2019 report. Get direct insight from Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye as he highlights some of the report’s most interesting and impactful findings.
During this session, our EMEA CTO David Grout will present the MITRE Methodology and how to interpret it. We will discuss the metrics and capabilities highlighted during this process and how FireEye has been ranked the number #1 EDR in this test.
Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story. Watch this webinar to help debunk several common myths that jeopardize your fast, secure, migration to the cloud.
To manage cyber risk effectively, you need cyber threat intelligence (CTI) that enables your organization to identify relevant threats and understand how threat actors operate. This webinar shares current practices.
The targeting of third-party vendors and contractors is a tactic threat actors are increasingly using to spy on hardened targets. Attend this session to learn about threat actors potentially using these tactics.
Join our panel of experts as they share their security and legal expertise about the executive perspectives on the huge impact changing security regulations has on how organizations are thinking about cyber security.
Hear this detailed discussion as we cover APT38, a newly identified cyber-crime organization that has attempted to steal over $1.1 billion by attacking more than 16 financial organizations in 13 different countries.
Hear Nick Flores, Security Consulting Director at FireEye Mandiant, as he shares insights and expertise on what you need to consider when evaluating how to select the right security partner for your organization.
Hear our expert panel share their security and legal expertise on new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements
This presentation will highlight how FireEye, Mandiant, and Threat Intelligence work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
Join Christopher Porter, the chief intelligence strategist at FireEye, as he shares the topics he covered from his expert congressional testimony on the important role cybersecurity plays in national aviation security.
In many ways, public cloud is more secure than a traditional data center. Yet the cloud is still being compromised. We discuss the challenges in Cloud Security and how to design an effective strategy to tackle them.
AI is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Join to better understand how AI will impact cyber security.
“Do you know how your team will respond to and remediate a cyber-attack,” is a question that all C-suite leaders should be able to answer. Join our experts as they share insights to help build a solid master plan.
Top experts discuss how to: monitor the perimeter effectively and catch threats; identify threats, even when encrypted; monitor the network to identify and stop laterally moving threats; protect your organization.
Get insights into recent APT intrusion activity from different regional threat actors, current attack techniques that have been successful, as well as detections and investigations conducted by Mandiant.
In this session, we tour a typical Security Operations Center (SOC) and study the day to day activities, then explore the various challenges, and wrap with an outlook at the future of Security Operations.
Discover best practices for breach response and how to strengthen your organization's cyber resilience through this Q&A panel with top security experts as they discuss the latest trends in data breach protection.
Learn how FireEye addresses the challenges highlighted in IDC’s MarketScape report with access to unique threat intelligence, collated from all the breaches we have been investigating around the world.
Join us as our experts discusses the changing geopolitical landscape as threat actors develop and implement AI capabilities, as well as the use of AI applications in businesses and associated vulnerabilities.
Watch this interview with Sandra Joyce, head of global threat intel, and Igors Konovalovs, Director for Threat Intelligence EMEA, as they answer some of the most pressing questions about cyber threat intelligence.
You can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult to spot. Hear our expert dig into the details behind impersonation attacks.
FireEye revealed an extensive cyber espionage carried out by China-linked TEMP.Periscope which targeted Cambodia’s political system. Join us to learn more about their mission, techniques and procedures.
Cyber breaches that result in data loss are often accompanied by heavy costs—some are obvious, while others are not. Our experts break down the costs of a breach and explain how to estimate the business impact.
Join the conversation as our experts discusses the changing geopolitical landscape as threat actors develop and implement AI capabilities, as well as the use of AI applications in businesses and associated vulnerabilities.
Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how CISOs take the risk message to the board and how to translate technical jargon into business language.
The GDPR implementation and its penalties for non-compliance will impact the costs to organizations. During this session we share insights into the damage attackers typically cause and what steps you can take.
In February 2018, Mandatory Data Breach Notification legislation took effect in Australia. It introduced unique challenges to the already difficult task of managing external communications after a cyber attack.
As trusted cyber advisers, FireEye and Marsh & McLennan Companies – each a leader in its field – have collaborated to share their insights to help organizations build and strengthen their enterprise cyber resilience.
Join Luke McNamara, Senior Analyst at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye Intelligence and FireEye Labs.
Join this webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence.
Join FireEye Mandiant experts, as they cover 6 primary areas of focus for an effective response plan and examples of how deficiencies in any area reduce an organization’s ability to effectively detect and respond.
Join our webcast to discuss 6 key plant floor weaknesses that adversaries exploit to undermine plant operations and explore a step-by-step checklist for mitigating these risks firsthand with our experts.
In diesem Live-Webinar stellt Sven Schriewer, Director, FireEye, die Beobachtungen und Schlussfolgerungen der Experten von Mandiant aus der Untersuchung einiger der schwerwiegendsten Cyberangriffe und Sicherheitsverletzungen des vergangenen Jahres vor.
Partecipa al webinar con Gabriele Zanoni, Systems Engineer di FireEye, per scoprire come si sta evolvendo il panorama delle minacce sulla base dei dati sui cyber attacchi dello scorso anno, rilevati dalle investigazioni.
Rejoignez-nous pour un webinaire avec David Grout, Directeur Technique Europe du Sud, qui explorera les tendances qui définissent le paysage actuel des menaces en se basant sur les investigations en 2016.
With over 13 years of front-line experience dealing with advanced threat actors from around the globe, our Mandiant team know how the bad guys think and can help you win the battle against cyber attackers.
Since at least 2007, APT28 has conducted operations using a sophisticated set of malware that employs a flexible, modular framework allowing it to consistently evolve its toolset for future operations.
Apporter de l’automatisation, de la contextualisation et de l’intelligence dans les process de détection et de réaction est clef pour gagner en vitesse et en précision et permettre ainsi une sécurité efficiente, capable d’anticiper et non plus de subir les cybermenaces.
Get a quick intro to the problems faced with common MFA systems, the ways real-world attackers (e.g. APT28 & ATP29) and our Red Team have bypassed or subverted them, and some techniques your team can use.
Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In this webinar, we will discuss real-world incidents and steps to minimize the financial impact of a data breach.