Security Predictions for 2018: An APAC ViewpointAs the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Join Bryce Boland, Asia Pacific CTO at FireEye, to learn what the future holds for the Asia Pacific and EMEA regions.
Security Predictions for 2018Join Luke McNamara, Senior Analyst at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail, including what types of nation-state activity we will be seeing, what new regulations such as GDPR mean for organizations and how to ensure a secure environment as more organizations migrate to the cloud.
The Convergence of EPP and EDR: Tomorrow’s Solution TodayAttend this webinar to understand the unique differences between EPP and EDR, gain insight into the benefits of convergence of these two approaches to advanced cyber threat protection and learn how FireEye can help your organization. implement a revolutionary, holistic approach to endpoint security.
Emerging Global Cyber Threats Cyber crime that affects businesses can be directly connected to geopolitical drivers such as the nuclear deal with Iran and sanctions for North Korean proliferation. Your organization needs to ensure that it adapts to the realities of the evolving threat landscape and business risks. Watch John Hultquist, Director of Intelligence Analysis at FireEye, provide an overview of emerging threats from around the world and insights into the most impactful threats affecting your cyber security operations.
Cyber Defense Lessons Learned in 2017 for a More Secure 2018Looking back at news headlines leaves us asking two questions: What didn’t work in cyber defense in 2017? What can be done to be better prepared for future attacks?
This webinar will address those questions and many others. Tune in to learn about the more disruptive opportunistic attacks in 2017, and the advanced and increasingly frequent attacks being carried out by nation-states.
2017 - An Active Year for APT Groups2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyber attacks.
Join us for this webinar as we discuss the most severe cybercriminal activities of 2017, the motivations, approaches and TTPs of the threat groups behind these attacks and, insights into APT10, APT32 & APT33.
Why Mid-Enterprises Must Go Beyond AV Products to Smarter Endpoint Security In this webinar, learn more about what legacy AV technologies miss and how you might be at risk today, why real-time, integrated threat intelligence is a critical component of any cyber strategy, how to streamline your approach and extend visibility into every endpoint that matters and why you need to detect known and unknown threats targeting your business.
Breach Resilience - Technology. Intelligence. ExpertiseWe understand the challenges and complexities that you face as you try to protect your organization against ever-evolving threats. FireEye offers a three-pronged approach, that combines innovative security technologies, world-renowned expertise, and deep threat intelligence capabilities, to combat the shortage of security experts, inefficient processes, complex technologies and multiple siloed point products.
Asia Pacific Threat Landscape: A FireEye ViewIn this webinar, we will highlight some of the most public investigations, look to key government leaders to understand their perspective on the impact of cyber, and lastly review the top strategic mistakes that organizations make when trying to address cyber risk.
The Cost of Building a Threat Hunting Team in Your SOCAt this point your SOC is effectively covering SIEM, IDP, Vulnerability Management and a number of other areas. However, the next phase of maturity is to build the APT Threat Hunting capability. Join us for a short webinar to discuss the costs of building a hunting team versus buying it.
Delivering Advanced Security Capabilities to Any Organization: FireEye HelixLearn about how a centralized security operations platform improves visibility across your entire cyber security infrastructure, surfaces and provides context for the most critical alerts and empowers decision making to decrease the time from detection to response. You'll also see a demo of how Helix identifies and responds to an alert.
Simplify Threat Response Through Integration and AutomationIn this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
Endpoint Security: No Longer Taking a Back Seat!This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.
An Elegant and Practical Model for Security Practitioners"Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks. Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
How Was That Breach Detected?In this presentation, we will use international case examples Mandiant investigated to take a closer look at how the breach was discovered and what security lessons can be learned from the alerts - for example how a performance monitor on a domain controller spiked, which led to discovery of credential harvesting. The take away will be actionable in many environments.
Answers to 5 Cyber Security Challenges for the Midsize Enterprise FireEye SME customers are more prepared to defend their company’s digital assets. Join us for a problem-solving webinar based on real-world examples from your peers and learn what best practices will increase cyber awareness, how to conduct a security assessment to identify gaps and a strategy, and how to align security needs and reduce vulnerabilities.
Cyber Threat Intelligence: Learn How It Can Drive World-Class SecurityThe adoption of Cyber Threat Intelligence (CTI) is increasing across organizations like yours—adding value to all segments of security operations and the business. When it is better utilized, CTI significantly enhances an organization’s ability to anticipate, identify, respond to, and remediate threats. Join this webinar to learn how to apply these CTI practices in your organization.
The Next Level of Smarter Endpoint Protection: Going Beyond Antivirus ProductsAntivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses. Watch this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
APT33: New Insights into Iranian Cyber Espionage Group Join us in a webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyAs fast as we learn to detect new threats, the threats change - like a game of Whack-o-Mole happening at an ever-increasing pace. Attend this webinar to learn what threat actors are currently up to and how they're getting around existing defenses. Armed with this knowledge, IT professionals can anticipate attacks and get ahead of the attackers.
Are You Ready to Respond?Learn six primary areas of focus for an effective response plan, best practices in each of those areas, and examples of how deficiencies in any area reduces an organization’s ability to detect & respond to cyber attacks.
GDPR: Being prepared and response-readyIn this webinar we will tackle the importance of a having an effective and actionable incident response plan, and how to develop a crisis communications strategy that minimizes the impact of a data breach.
The Resurgence of APT10Watch this webinar to learn about APT10 and how your organisation can improve its ability to detect, prevent and remediate the group’s attacks.
Intelligence First: How Intelligence Enriches Security Consulting ServicesJoin Jeff Berg, Sr. Manager of Cyber Threat Intelligence, and Brad Bell, Mandiant Principal Consultant, as they share the role of cyber threat intelligence in strategic security consulting services and why services based on compliance-based best practices and industry standards may not be an effective way to protect your organization against a rapidly evolving threat landscape.
APT32: New Cyber Espionage GroupLearn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.
Tips & Tricks: Make the Most of FireEye Network SecurityAlthough FireEye Network Security is ready to use out-of-the-box, simplicity does not imply a lack of sophistication. There may be a variety of capabilities that practitioners can take advantage of when maximizing the value of their Network Security solution.
Smarter Endpoint SecurityToday’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Comprehensive endpoint protection requires prevention, AV, endpoint detection and response (EDR) and other capabilities. Even when organizations adopt multiple point products, there are still gaps in their endpoint protection.
2017 Cyber Security PredictionsJoin us to hear from some of FireEye's top experts about our predictions for 2017 which draw from our executive team, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs.
The Rise of Security Orchestration: Myths and TruthsJoin this webinar with Paul Nguyen, VP of Orchestration and Integration at FireEye and guest speaker Joseph Blankenship of Forrester to learn:
- Why we are seeing a rise in security orchestration
- Where the market is moving
- How to get the most out of orchestration
Make 2017 a Year of Countering the Evolving Threat LandscapeTis the season of predictions looking ahead to 2017 and paying lip service to the threat landscape. Not a fan of either of those? You’re not alone. Join FireEye in this BrightTalk webinar where we’ll discuss more than just the threats that may or may not be awaiting us in 2017. We’ll discuss real attacker tactics and techniques, along with how you can actually counter the risk they present.
The Real World Value of Cyber Threat IntelligenceLaura Galante (Dir, Threat Intel Analysis), Jayce Nichols (Dir, Threat Intel Research) and Richard Bejtlich (Chief Security Strategist) define cyber threat intelligence and speaks to having an intel-led security program.
10 Components for Proactive CybersecurityIn this webinar, Mandiant Sr. Manager Nick Slaughter will discuss the benefits of proactive preparedness and 10 key areas that should be considered in order to form a holistic security program.
Crisis Communication After an AttackVitor De Souza (FireEye, VP of Global Communications) joins Chris Leach (Chief Technologist, HPE) to discuss the building blocks of a solid crisis-communication plan.
Exploring Russia’s Cyber OperationsDan McWhorter, Chief Intelligence Strategist at FireEye, discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.
Industrial Cyber Security: Real World Scenarios You Should KnowIn this presentation, ICS experts David Meltzer, Chief Research Officer for Belden/Tripwire and Ryan Brichant, Vice President and Chief Technology Officer at FireEye, will discuss specific real-world ICS compromises. They will explain what threat indicators to watch for and offer practical techniques for protecting the uptime, reliability, and safety of PLC, RTU, IED, and DCS equipment.
An Analytical Approach to APTJoin this webinar with Josh Goldfarb, CTO – Emerging Technologies at FireEye to learn:
- How are attackers changing the tools, techniques, and procedures that they use?
- What can organisations do to guard against the threats of today and prepare for the threats of tomorrow?
- How can taking an analytical approach to APT benefit your organisation and improve its security posture?
Privileged Accounts and the Cyber Attack Life CycleAdam Bosnian (EVP, Global Bus. Dev, CyberArk) and Milan Gavran (TAP Sales Mgr., FireEye) walk through a few data breach cases and show how combining intel from both systems is used to assist detection and response acceleration.
The Eye of the Security CyberstormKevin Jackson (TAP Security Specialist, FireEye) and Chris Olive (Sr. Sales Engineer, Vormetric) outline how to easily monitor privileged user activity to identify APT activity.
The Importance of Attribution Against Today's Cyber AdversariesWith the sophistication of today's cyber attacks it is almost impossible to expect a security manager to be able to stop all of them, so in the event of a breach it is important to have the intelligence to allow the security manager to establish the depth of an attack.
Are European Enterprises Ready to Respond to a Cyber Breach?Stuart Davis (Mandiant Director of META) joins Dominic Trott (Sr. Analyst, Pierre Audoin Consultants) to share results of a study of 200 decision-makers in large companies in the UK, France and Germany, to understand their motivations and drivers with regards to Incident Response.