Navigating Today’s Global Cyber Regulations – Regional PerspectivesOn December 3rd, Join Ron Bushar, VP & CTO of Government Solutions at FireEye, Michael Trevett, Director of Professional Services at FireEye Mandiant, and Heather Sussman, Partner at Ropes & Gray, as they share their security and legal expertise about the executive perspectives on the huge impact changing security regulations has on how organizations are thinking about cyber security and many more related considerations.
Cloud Cover: How Providers, Customers & Criminals Leverage the Cloud Join us for this webinar at the MISTI Security Analytics and Operations eSummit on November 3rd, as Parnian Najafi Borazjani, Sr. Analyst & Ben Forster, PMM discuss risk mitigation for cloud service customers; Case studies and best practices on Cloud Security based on FireEye analyst research & observations; Solutions to protect customers in the cloud
Machine Learning: A Crystal Ball for Endpoint ProtectionContinue on with us at the MISTI Endpoint Security eSummit on November 15th to hear Jeff Johns, Director of Data Science at FireEye share how machine learning is driving the evolution of endpoint protection. Also, learn about examples of ML models running in research and production as part of FireEye Endpoint Security
Cyber Resilience Virtual SummitAttend the FireEye Cyber Resilience Virtual Summit to learn how the combination of technology, threat intelligence and expertise can help you develop the cyber resilience you need. Over three days, our experts will share insights and intelligence from our latest investigations and the frontlines of cyber security.
The BIG Cyber Security Skills GapDuring this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
Privacy & Security in the Age of IoTJoin privacy and cyber security experts for an interactive panel roundtable discussion on: The privacy and security vulnerabilities and risks stemming from IoT devices; The basic safety measures you can deploy to protect your home and workplace against cyber threats; Best practices for privacy and security safeguards; What to do in the event of a breach; What the future of privacy looks like
Keys to Unlock Powerful Cyber SecurityIn this webinar, featured analyst, Gorka Sadowski, Research Director, Security Infrastructure Protection with Gartner and Christopher Porter, Chief Intelligence Strategist with FireEye, explore the four key activities of incident lifecycle management: prevent, detect, respond and predict, to help you grasp the intricacies of cyber security success and options to achieve it.
How to Identify and Respond to Laterally Moving ThreatsJoin Fayyaz Rajpari, Senior Solutions Architect at FireEye and Druce MacFarlane, Director of Security Products at Gigamon as they discuss how to: Monitor the perimeter effectively and catch perimeter threats; Identify threats, even when they are encrypted; Monitor the network to identify and stop laterally moving threats; Protect your organization during each stage of a lateral attack lifecycle
Trends in Data Breaches and Comprehensive Response: Does your organization have a data breach response plan? Discover the best practices for breach response and how to strengthen your organization's cyber resilience.
Join this interactive Q&A panel with top security experts as they discuss: The latest trends in data breach protection; Who's most at risk; How to detect breaches faster; What to do and not to do when it comes to breach response; Recommendations for CISOs for improving security
Keeping Up with Advanced Attackers: Understanding Threats and Adapting DefencesAttackers are becoming more sophisticated in exploiting vulnerabilities, acquiring hacking tools on the dark web and leveraging automation, making traditional defense strategies antiquated and obsolete. Join Alister Shepherd, our Mandiant Director for EMEA, for insights into recent APT intrusion activity from different regional threat actors; Current attack techniques that have been successful during these intrusions; Detections and investigations conducted by Mandiant; Lessons learned for defenders
Executive Panel | Financial Services: Cyber Threats on the HorizonJoin Kevin Taylor, EMEA VP, FireEye as he leads a discussion with Sandra Joyce, VP, Global Intel Operations, Stuart McKenzie, VP, EMEA Mandiant and Simon Moor, VP, NEUR, for a lively video panel exchange. The conversation will provide executive insights for critical topics relevant to the financial services industry. The topics include the nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs); the ripple effect consequences of geopolitics, the cost of a breach, importance of risk awareness in the boardroom and the need to keep GDPR a high priority.
The Attacker's Invoice: Real Costs of a Cyber BreachCyber breaches that result in data loss are often accompanied by heavy costs—some costs are obvious, while others are unexpected. Join Jon Horner, Senior Consultant, Mandiant FireEye with featured speaker, Eric Packel, Partner, BakerHostetler, as they break down the costs of a breach, detail each cost, and explain how to estimate the business impact of each line item.
Video Interview | How to Build a Robust Threat Intel FunctionCyber threat intelligence is an essential weapon for detecting and preventing advanced attacks from well-funded attackers with specific agendas and targets.Watch this interview with Sandra Joyce, head of global threat intel, and Igors Konovalovs, Director for iSIGHT Intelligence EMEA, as they answer some of the most practical and pressing questions about cyber threat intelligence.
Impersonation: The Many Masks of Email ThreatsYou can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot. Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks
Video Panel | Cyber Security in Europe: An Executive Perspective Cyber breaches are inevitable because attackers constantly change their tools, techniques and procedures (TTPs). Everyone is affected in different ways, whether from compromised systems or supply chains to the financial implications of non-compliance and breach notification. Join us for a live video panel on trending topics in cyber security.
Breach Response Preparedness - Webinar SeriesWhy do organisations keep failing at IR? What makes an incident response team work? How do I maximise the efficiency of my resources?
To answer these questions and many others, please join us for a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Discover the Hidden Threats With Network ForensicsMany modern cyber attacks routinely bypass firewalls and other perimeter defenses, leaving security professionals to play “whack-a-mole,” beating down threats as quickly and efficiently as they can. Hear Bill Cantrell, VP of Network Product Management to get insight on how you can get increased visibility into network traffic, and quickly find the threats hiding in your network.
Impersonation Attacks: The New Email Based ThreatsThe email threat landscape is changing. Impersonation attacks and malicious URLs are becoming more popular. Join Ken Bagnall, VP Email Security, FireEye and Levi Lloyd, Sr. Manager, Detection Services, who addresses the latest changes in email attack tactics.
AI and the Future of Cyber ConflictAs more companies integrate AI applications into their businesses, they must understand the risks associated with this technology. Join Michelle Cantos, Strategic Intelligence Analyst, as she discusses the changing geopolitical landscape as threat actors develop and implement AI capabilities, as well as the use of AI applications in businesses and associated vulnerabilities.
Cryptocurrencies: Trends and ThreatsCyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
Rise of the Rest: APT Groups No Longer From Just China and Russia As part of the MISTI APT eSummit, Executive Briefer, Sarah Geary talks about the threat actors associated with the Chinese and Russian government, and how they remain among the most sophisticated. This past year marks the first time that FireEye has designated actors from other countries as APT groups. As more countries conduct inexpensive and efficient cyber operations, the public should be aware of how these threats affect the public and private sectors.
Artificial Intelligence in the Cyber DomainArtificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Join this webinar to understand how AI will impact cyber security before you rely on it for network defense.
M-Trends 2018 - Understanding Today's Cyber Attack Trends Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.
Artificial Intelligence in Cyber Warfare: A PrimerArtificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.
Breach Response Readiness: What the C-Suite Needs to KnowGiven today’s cyber landscape, all C-suite leaders have an important role to play in their organization’s cyber security posture and IR plan. Their individual and departmental contributions must help protect vital assets, safeguard privacy and ensure uninterrupted operations.
Building a Secure Future for Women in Cyber SecurityAside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof. Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.
How to Cope with GDPR Strict Breach Reporting Rules
With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.
APT37: The Overlooked North Korean ThreatAPT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.
Cyber Security Predictions: What is in Store for the EMEA Regions2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.