Texture Top Right Red 04

Thoughtful Tuesdays

A new webinar, every Tuesday at 10:00AM GMT

#ThoughtfulTuesdays
Clarity comes to those who deal in truth

Industry-Leading Cyber Security Insights Every Tuesday

Cyber security worldwide is constantly shifting and growing. Fortunately, FireEye can offer you the latest best practices and guidance from the first-hand experience and expertise of its vast network of cyber security professionals.

A new #ThoughtfulTuesdays webinar is released every Tuesday at 10:00 am GMT

Professionals from organisations of every size can adopt and employ insights from these webinars to stay on the cutting edge of cyber defence.

Be sure to register your interest now!

Upcoming Webinars

Tuesday, 17 November | 10:00AM GMT

The Outcome of Well-Used Intelligence

Cyber Threat Intelligence is a vital component in understanding the current and future threat landscape which faces organisations of all sizes, the world over. But the real question remains, how can organisations make better use of it? What are some of the common pitfalls that many commonly fall into and how can organisations expand usage across the entire organisation?

Register Now

The Outcome of Well-Used Intelligence

Tuesday, 24 November | 10:00AM GMT

Behind the Cyber Battlefield with a Mandiant Threat Intelligence Analyst

Cyber threat intelligence (CTI), IOCs, reports and feeds all contribute to stronger cyber visibility. But CTI holds a unique position and can be consumed operationally to enhance your security posture. Join us as a Mandiant Cyber Threat Analyst discusses her experiences from the cyber frontlines. She introduces real life examples of analyst personalities, their day-to-day activities and the value they add to customer interactions.

Register Now

Behind the Cyber Battlefield with a Mandiant Threat Intelligence Analyst

Tuesday, 1 December | 10:00AM GMT

Operationalise Threat Intelligence with Mandiant Security Validation

This session reveals the actual state of cyber security based on real world data around cyber security controls across enterprise networks, from email, endpoint, network and the cloud. We'll also be taking the time to discuss and demonstrate how effective security validation can validate, consolidate, recoup and maximise the value from the existing security investments made by organisations.

Register Now

Operationalise Threat Intelligence with Mandiant Security Validation

Tuesday, 8 December | 10:00AM GMT

Improve Security Posture with MITRE ATT&CK Framework and Threat Intelligence

This session explores the benefits of tracking adversary TTPs during day-to-day hunt and incident response operations, and shows how to use the MITRE ATT&CK framework to align organizational cyber components over the long term. It also describes how you can use the framework to operationalize tactical intelligence and prioritize threat mitigation, as well as how to use intelligence to drive strategic decisions about security investments.

Register Now

Improve Security Posture with MITRE ATT&CK Framework and Threat Intelligence

On Demand Webinars

ON DEMAND

To Remediate or not to Remediate? That’s THE Question

The single most heated conversation during every incident response engagement has always centred around remediation. When to remediate, what to remediate, how to remediate, should we remediate? Join our upcoming webinar where we’ll analyse the topic from different angles to see why there’s no easy answer to this question.

Watch Now

To Remediate or not to Remediate? That’s THE Question

ON DEMAND

Threat Intelligence Drives Effective Vulnerability Management

Threat Intelligence is an invaluable resource for organisations, as it provides relevant, contextual insight that can be used to inform their cyber-security decisions and investments. Join our upcoming webinar where we’ll be sharing how Mandiant Threat Intelligence can be utilised to drive effective vulnerability management.

Watch Now

Threat Intelligence Drives Effective Vulnerability Management

ON DEMAND

A Red Teaming Case Study

Red Team assessments help organisations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives. Join our upcoming webinar and understand the reality of Red Teaming with a real-world case study.

Watch Now

A Red Teaming Case Study

ON DEMAND

Threat Intel for Computer Network Defence, Focus on Iran

Operationalising Cyber Threat Intelligence (CTI) helps mitigate risk by focusing people, processes, and technology on the threat activity that matters. Join our upcoming webinar where we explore how CTI allows organisations to take a more proactive, structured, and holistic approach to security that reduces dwell time and shortens the time frame from identification to fix.

Watch Now

Threat Intel for Computer Network Defence, Focus on Iran

ON DEMAND

Managing Cyber Security Challenges in our New Remote-Working World

The ongoing COVID-19 pandemic has seen organisations across the globe impacted in a variety of ways, with remote working becoming increasingly common reality for many employees. While this situation is ongoing, it’s important to consider not only the present impact but also what the future might look like and how this might change an organisation’s security strategy.

Watch Now

Managing Cyber Security Challenges

ON DEMAND

Enhance your Security Posture with Managed Defence

A modern challenge for organisations the world over is finding, hiring and training cyber security experts capable of managing their cyber security 24 hours a day, seven days a week. Join our upcoming webinar where you’ll have the opportunity to learn how your organisation can effectively remedy this challenge through FireEye Managed Defense.

Watch Now

Enhance your Security Posture with Managed Defence

ON DEMAND

Ransomware Trends with a Focus on MAZE

Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organisations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and what you can do about it.

Watch Now

Ransomware Trends with a Focus on MAZE

ON DEMAND

Modern Cyber Risk Management for Better Decision Making

Most C-suite leaders believe their investment decisions in security risk management are not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk models, which leaves gaps between attacker and defender behaviours. Register now for our webinar to learn more.

Watch Now

Modern Cyber Risk Management for Better Decision Making

ON DEMAND

Intelligence Driven Security Validation

A recent SANS study showed that while organisations used threat intelligence to hypothesise where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem as organisations struggle to justify the high cost of their defences. Join our webinar and learn how Mandiant Threat Intelligence can provide the information that you need.

Watch Now

Intelligence Driven Security Validation

ON DEMAND

Cloud Threats from the Frontlines

For the last several years, organisations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organisations fail to fully understand the security controls they have at their disposal. Join our webinar where we’ll share some perspectives around these challenges from the frontlines of cyber-security.

Watch Now

iboss Cloud + FireEye -  Cloud Network Security as a Service

ON DEMAND

iboss Cloud and FireEye - Cloud Network Security as a Service

The network perimeter has eroded, making traditional network security appliances ineffective at securing users and devices that are no longer bound by network boundaries. Join us as we explore how iboss provides its users with constant connection to the iboss cloud, regardless of device or location to ensure all internet traffic is secured against common threats.

Watch Now

iboss Cloud + FireEye -  Cloud Network Security as a Service

ON DEMAND

‘They Come in the Night’ Emerging Ransomware Threat Trends

Ransomware is an unfortunately common, yet potentially devastating threat to organisations globally. With this looming threat a constant concern for many business’ security leaders. Join our upcoming webinar to understand what these threats are and how Mandiant can arm you with the protection and intelligence you need.

Watch Now

‘They Come in the Night’ Emerging Ransomware Threat Trends

ON DEMAND

2020 Mandiant Security Effectiveness Report Findings

The ability to understand the effectiveness of your cyber-security solution before an attack is invaluable. Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

Watch Now

2020 Mandiant Security Effectiveness Report Findings

ON DEMAND

Breach Response Series - Part 3: Reduce the impact of security incidents

The ability to respond to cyber attacks remains the greatest strength. This webinar discusses ways you can evaluate your organisation’s ability to respond effectively to advanced attackers and business impacting malware, such as ransomware.

Watch Now

Breach Response Series Part 3

ON DEMAND

Breach Response Series - Part 2: TIBER-EU - Increasing Cyber Resilience

This webinar goes through some of the ways to test your defences and help improve your security posture by conducting TIBER-EU tests that mimic the tactics, techniques and procedures of real-life attackers, reveal your organisation's strengths and weaknesses and enable you to reach a higher level of cyber maturity.

Watch Now

Breach Response Series Part 2

ON DEMAND

Breach Response Series - Part 1: Anatomy of a cyber attack

In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.

Watch Now

Breach Response Series Part 1

ON DEMAND

Virtual Cyber Attack Simulation

Did you know that 90% of successful cyber-attacks rely on human error by any one member of staff? It is common to assume that cyber security is the sole responsibility of your IT or security team. However, the reality is that ALL members of an organisation have a responsibility to maintain good cyber-discipline. Our Virtual Cyber Attack simulation aims to simulate and challenge your response to a cyber incident.

Watch Now

Cyber Attack Symulation Webinar

ON DEMAND

How to maintain cyber hygiene?

In today's ever-changing threat landscape, it is more important than ever to use a cyber hygiene routine to help prevent hackers, intelligent malware, and advanced viruses from accessing and corrupting your company's data. How do you validate that your cyber strategy is as watertight as it could be? This webinar looks to answer these questions, and more.

Watch Now

Cyber Hygiene Webinar

ON DEMAND

Measure, improve and optimize your cybersecurity with Mandiant Security Validation

FireEye has developed a platform that allows you to accurately assess a company's security posture. With Mandiant Validation Solution, FireEye expands its capabilities by helping its clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

Watch Now

Measure, improve and optimize your cybersecurity with Mandiant Security Validation

ON DEMAND

Security Effectiveness Strategies

To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions. Mandiant Security Validation looks to provide comprehensive answers to these essential questions through industry-leading threat intelligence.

Watch Now

Security Effectiveness Strategies Webinar

ON DEMAND

How do you gain cyber assurance?

Most organisations have invested heavily in their cyber-security, in order to defend against any would be attackers. However, how confident can you be in this defence without it being put to the test by a real attack? This webinar will discuss how an organisation can gain assurance that it is prepared to defend against and respond to a cyber incident.

Watch Now

Cyber Assurance Webinar

ON DEMAND

Top 5 Cloud Security Myths Debunked

Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story. Our webinar helps to debunk several common myths that jeopardise the fast, secure, migration to the cloud that your organisation expects.

Watch Now

Top 5 Cloud Security Myths Debunked

ON DEMAND

Defensive Security Techniques You Can Use Now

Many organisations struggle with how to prioritise hardening and protective security actions. Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact. Watch our webinar to learn more.

Watch Now

Defensive Security Techniques You Can Use Now

ON DEMAND

More Cloud, More Problems?

As secure data moves to the cloud, so too do the security threats. Credential abuse, cloud misconfigurations and lack of central visibility leave your infrastructure vulnerable to breaches. Be sure to take the time to watch our webinar and ensure that your organisation’s cloud strategy is less of a problem than you might think.

Watch Now

More Cloud, More Problems?

ON DEMAND

How Managed Defense can help customers by identifying the most impactful threats

With the ever-changing nature of the cyber-security environment, Security Operation Centres (SOCs) are constantly under pressure to ensure they remain aware of and prepared to defend their organisation and its data against impactful threats. But what if your SOC can't keep up? Our webinar discusses how Mandiant Managed Defense can provide a solution to this common problem.

Watch Now

How Managed Defense can help customers by identifying the most impactful threats

ON DEMAND

Protect All Files from Malware with a Content Firewall - FireEye/Accellion Integration

Security-first organisations deploy innovative technologies like LDAP/AD, SSO, ATP, DLP and others to protect customer data and other intellectual property from hackers. Despite these efforts, hackers still get in through vulnerable third parties like partners, suppliers, and customers. As a result, defending sensitive information requires not just a network firewall but a content firewall. Watch our webinar to learn more.

Watch Now

How Managed Defense can help customers by identifying the most impactful threats