Join us for a webinar series on FireEye XDR, where we will cover how XDR security came about, why FireEye’s take on XDR is focused on security outcomes, and how we have been delivering on this for years.
Explore the latest FireEye Endpoint version with the objective of getting the most added value from it. We will deep dive on specific new features and new modules which gives you to ability to strengthen your detection, protection or investigation capabilities.
Get insight from our experts as we highlight how Detection on Demand works, how best to integrate Detection on Demand to improve the efficiency of your SOC and share other ways to leverage Detection on Demand.
Join us for this robust conversation with Cyberhedge as we cover how to fully validate your organization’s cyber health and measure its impact on the company’s financial posture and market performance.
Cyber security practitioners are already at a disadvantage in the asymmetric battle for the fate of their company’s and customers’ networks and have much to teach the rest of us about how organizations can overcome the shortfall. Watch expert Danny Slack, as he talks about stories and strategies from the cyber defender’s perspective.
Watch this recording of industry experts at BlackHat 2019, share what CISOs need to be successful at their job, discover the challenges CISOs are facing and the ways they are solving them, plus many more interesting insights.
The rise of technology, combined with more complex cyber security products and cyber threats, have gradually increased the demand for experienced, trained experts to fill a growing number of critical security roles in industry and government worldwide.
See a recorded video presentation from the Cloud Security Breakfast Briefing, hosted by FireEye and AWS, as Martin Holste, Cloud Services CTO at FireEye helps debunk several common myths that jeopardize your fast, secure, migration to the cloud.
In this briefing, hear experts from AWS and FireEye address how organizations can achieve the security needed to protect user credentials, proactively identify vulnerabilities and centralize security monitoring.
FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.
Watch this webinar as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.
The numbers make stark reading. 281 billion emails sent daily to over two billion business users. 91% of all cyber-attacks start with an email and it only takes ONE with malicious intent to impact your organization. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned. Learn more about how you can better protect your organization.
In this video, Alexa King, EVP and General Counsel sits down with Karen Kukoda, FireEye Senior Director of Strategic Alliances, to discuss not only the role the General Counsel plays in cyber security, but also the duties of the board of directors in overseeing cyber security.
Examine the current risk environment – based on data from the latest FireEye M-Trends report – and unpack what it means for higher education professionals. We’ll offer fresh insights for understanding and preventing advanced attacks and give practical advice for reducing your cyber risk.
Join this expert panel as they discuss the latest industry topics including: Top 5 cyber threats businesses face today, Notable cyber attack methods and strategies and how to protect against them, Solutions for network visibility, breach detection and response, Recommendations for improving security and steps to take today.
During this webinar we will discuss the benefits and challenges of in-house vs. outsourcing of cyber security operations, and how this has been affected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape.
During this session, our EMEA CTO David Grout will present the MITRE Methodology and how to interpret it. We will discuss the metrics and capabilities highlighted during this process and how FireEye has been ranked the number #1 EDR in this test.
Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story. Watch this webinar to help debunk several common myths that jeopardize your fast, secure, migration to the cloud.
To manage cyber risk effectively, you need cyber threat intelligence (CTI) that enables your organization to identify relevant threats and understand how threat actors operate. This webinar shares current practices.