Sessions

Executive Track

SESSION 1 | October 3, 2018 | 1:30 PM - 2:15 PM
What I Wish I’d Known Then: Wisdom from Top CISOs about Pitfalls, Breaches, and Growing Your Career

The role of the CISO has never been more critical or more challenging. Decisions about how best to protect an organization are often made more difficult by new technologies, talent shortages, and an increasingly complex threat landscape to navigate. This panel discussion will look at all of these issues, drawing from the real-life experience of CISOs that walk in these shoes every day. What do they wish they had known earlier? What are they doing now to prepare for the challenges of the future? And what choices can help to build a lasting and fulfilling career in information security?

Panel:
Grady Summers, Executive VP and Chief Technology Officer – FireEye (Moderator)
Kostas Georgakopoulos, CISO – P&G
Todd Lukens, SVP, Chief Information Security Officer – Global Payments
Brad Maiorino, Executive VP – Booz Allen Hamilton
Holly Ridgeway, Executive VP and Chief Security Officer – Citizens Financial Group, Inc.


SESSION 2 | October 3, 2018 | 2:25 PM - 3:10 PM
The 2018 SEC Guidance on Cybersecurity and the Responsibilities of the Board of Directors


WATCH SESSION VIEW SLIDESHOW

On February 21, 2018, the U.S. Securities and Exchange Commission (“SEC”) published long-awaited cybersecurity interpretive guidance (the “Guidance”). The Guidance marks the first time that the five SEC commissioners, as opposed to agency staff, have provided guidance to U.S. public companies relating to their cybersecurity disclosure and compliance obligations. It introduces several key topics for public companies and builds on prior interpretive releases issued by agency staff in the past.

Cybersecurity lawyer, Lisa Sotto, will discuss the legal impact of the SEC guidance to board members of public companies. In addition, she will share examples of how boards of directors have been impacted by landfall cases like Target, Anthem, and Home Depot. She will also provide suggestions into measures that boards should now take, given the new guidance.

Whether or not you sit on your company’s Board of Directors, this presentation will provide insight into what your board members, or the board members of your clients, may be facing.

Presenter:
Lisa Sotto, Managing Partner – Hunton Andrews Kurth


SESSIONS 3-4 | October 3, 2018 | 3:40 PM - 5:20 PM
Cyber Attack Simulation

Successfully responding to a breach requires a coordinated effort among internal and external parties. In our Cyber Attack Simulation, experts from Mandiant, BakerHostetler, Beazley, the FBI, and a Chief Information Security Officer will walk you through a mock data breach and discuss technical and legal challenges experienced when responding to a cyber security incident. Join this interactive panel discussion to learn best practices needed to help prepare for a potential cyber security breach. Topics covered include legal disclosures, cyber insurance, incident response plans, communications, ransom payments, and working with law enforcement.

Panel:
Ron Bushar, VP and Government CTO – FireEye
Craig Hoffman, Partner – BakerHostetler
David Martin, Supervisory Special Agent – FBI
Matthew McWhirt, Manager, Mandiant Team – FireEye
Quiessence Phillips, Deputy CISO – NYC
Lauren Winchester, Esq., CIPP/US, Breach Response Services – Beazley


SESSION 5 | October 3, 2018 | 5:30 PM - 6:15 PM
Red Line Redrawn? Chinese APTs Resurface


WATCH SESSION VIEW SLIDESHOW

In 2016, FireEye documented the decrease in Chinese sponsored intrusions around the 2015 Xi-Obama agreement. Since then, previously dormant Chinese cyber espionage actors have reemerged, and new patterns have been observed. These have taken place against the backdrop of the establishment of and subsequent restructuring of PLA Strategic Special Forces. The presentation will examine these changes and explore their relationship to China’s bureaucratic reorganization of its cyber operations.

Presenters:
Cristiana Brafman Kittner, Principal Analyst – FireEye
Benjamin Read, Senior Manager, Analysis – FireEye




SESSION 6 | October 4, 2018 | 1:15 PM - 2:00 PM
Premediation: The Art of Proactive Remediation


WATCH SESSION VIEW SLIDESHOW

Remediation is a crucial step when recovering from an incident. Many organizations invest considerable time, money, and resources when executing remediation actions. Proactively implementing various security controls and hardening an environment doesn’t need to wait until AFTER an incident has occurred. This presentation will detail common containment and remediation strategies that are used when responding to targeted breaches. It will also highlight key wins that organizations can achieve if they proactively apply a remediation strategy prior to an incident.

Presenters:
Manfred Erjak, Principal Consultant, Mandiant Team – FireEye
Matthew McWhirt, Manager, Mandiant Team – FireEye



SESSION 7 | October 4, 2018 | 2:10 PM - 2:55 PM
Roundtable on Artificial Intelligence Use by Cyber Threat Groups and Network Defenders


WATCH SESSION VIEW SLIDESHOW

Join us for a roundtable discussion, featuring prominent speakers in artificial intelligence as it applies to the cyber threat environment, cutting edge of network defense, and government policy. This discussion will center on the near- and long-term effects that developments in artificial intelligence are likely to have on the balance between attackers and defenders. Planned speakers include Seth Sommersett, Chief Scientist at FireEye; Michelle Cantos, Intelligence Analyst at FireEye covering adversary use of artificial intelligence technologies; and a senior, recently retired DARPA scientist who worked on developing artificial intelligence technology for the U.S. military.

Presenters:
Michelle Cantos, Strategic Intelligence Analyst – FireEye
David Gunning, Program Manager – DARPA
Christopher Porter, Chief Intelligence Strategist – FireEye
Seth Summersett, Chief Scientist, Executive Director, Innovation and Custom Engineering – FireEye


SESSION 8 | October 4, 2018 | 3:05 PM - 3:50 PM
Influence Operations Targeting the 2018 U.S. Midterms: What are we seeing? What are we not?


WATCH SESSION VIEW SLIDESHOW

FireEye actively tracks influence operations targeting the November U.S. midterm elections and U.S. politics more broadly. This presentation will contrast recent activity with that observed during the 2016 election season. It will highlight the similarities and differences between the two periods and discuss how structural differences in the 2018 election environment, the U.S. response to 2016’s influence efforts, and broader public awareness of the threat appear to be shaping the format and focus of contemporary operations. With the midterms only a month away, Lee Foster, Manager of Information Operations Analysis at FireEye, will offer some suggestions as to how the effectiveness of these operations might be mitigated in both the short and long term.

Presenter:
Lee Foster, Manager, Information Operations Analysis – FireEye


SESSION 9 | October 4, 2018 | 4:20 PM - 5:05 PM
Hunting and Threat Intel on Steroids: Achieving Amazing Results from Your Existing People and Technology

You have technology to detect malware, but are you routinely looking for behavior, artifacts, and TTPs (tactics, techniques, and procedures) that indicate a human being is doing evil in your environment? During this session, leaders and practitioners will learn how intel can be used to:

  • Detect non-malware, APT 29–type techniques, including Office 365 and two-factor authentication attacks
  • Link phishing campaigns to malicious actors, and build predictive defenses
  • Prioritize vulnerabilities and threats based on what the threat actor is doing, not what the press is reporting

Attendees will also receive actionable take-aways designed to help improve their overall security conversations and thought processes, from the board of directors to the SOC analysts. Executive and security leadership, as well as security practitioners are encouraged to participate in this interactive session.

Presenter:
Steve Booth, VP & Chief Security Officer – FireEye


SESSION 10 | October 4, 2018 | 5:15 PM - 6:00 PM
Lessons Learned: Legal Issues That Arise During Incident Investigations – What CISOs Should Know In Advance


WATCH SESSION VIEW SLIDESHOW

Using real-life examples of investigations, including those relating to nation-state attackers and extortionists, this interactive discussion will focus on the legal issues and challenges that can arise during a breach. Drawing from experience we will debunk myths, examine attorney-client privilege and what it really means (and doesn’t!), and discuss steps that can be taken now to alleviate some of the legal challenges and burdens of a breach. We’ll also talk about how lawyers work with forensic firms to decide whether or not to notify, what is needed to make those determinations, and discuss how we evaluate important decisions like whether or not to engage with an extortionist, pay ransomware, or take other offensive measures.

Presenter:
Steven B. Roosa, Partner – Norton Rose Fulbright
Bernardo M. Vasquez, CISO & Director Information Security – Hudson Group, a Dufry Company

Technical Track

SESSION 1 | October 3, 2018 | 1:30 PM - 2:15 PM
Hunting for Platinum


WATCH SESSION VIEW SLIDESHOW

During an incident response case in 2017, Mandiant stumbled on a previously unknown threat group known as Platinum. Starting from scratch, the investigators uncovered a complex web of unique new malware and brought to light a breach that had been underway for years. This technical talk will cover some of the malware encountered during this engagement, Platinum’s capabilities and weaknesses, some of the techniques used to hunt for this threat actor, as well as ideas for future detection.

Presenters:
Adrien Bataille, Senior Consultant, Mandiant Team – FireEye
Matias Bevilacqua, Principal Consultant, Mandiant Team – FireEye




SESSION 2 | October 3, 2018 | 2:25 PM - 3:10 PM
Unmasking APT X


WATCH SESSION VIEW SLIDESHOW

This presentation will introduce FireEye’s newest, and yet-to-be-named, threat group. Following the public announcement at CDS, we'll go deep into their operations, relying on FireEye’s unique vantage point to trace the evolution of the group's earliest compromises to their recent path of destructive attacks. Attendees will get a rare view into APT X's tactics, providing insight into the resources and priorities of the group and how this intelligence can proactively inform defenses in the future.

Presenters:
Chris DiGiamo, Technical Director, Mandiant Team – FireEye
Nalani Fraser, Manager, Threat Intelligence – FireEye
Jacqueline O’Leary, Senior Threat Intelligence Analyst – FireEye



SESSION 3 | October 3, 2018 | 3:40 PM - 4:25 PM
You’ve Got Mail!


WATCH SESSION VIEW SLIDESHOW

Each year we see advancements in adversary tools, techniques and procedures, but relative consistency in the targeting of email infrastructure. An organization’s email server is an excellent location for privilege escalation, maintaining presence, or data theft. This talk will use case studies from intrusions by advanced persistent threats to highlight the following areas where email infrastructure was a significant part of the attack lifecycle:

  • Initial compromise via email: how social engineering and trust from the supply chain can be used to increase the likelihood of a successful foothold.
  • Bypassing two-factor authentication (2FA) to access email: case studies involving the use of email to access 2FA tokens, and other advanced methodologies to access email behind 2FA.
  • Planting persistent backdoors that attack and intercept mail in email clients on compromised endpoints: examples of email client-based backdoors used by Turla and other suspected Iranian threat groups.
  • Compromising Microsoft Exchange servers with a variety of tools, ranging from public webshells to custom IIS modules and handlers.
  • Abusing the legitimate features of Microsoft Exchange Control Panel (ECP), including ECP eDiscovery features, and leveraging the rich PowerShell toolset provided to legitimate administrators.

Presenters:
Dan Caban, Principal Consultant, Incident Response and Forensics, Mandiant Team – FireEye
Muks Hirani, Technical Director, Incident Response and Forensics, Mandiant Team – FireEye


SESSION 4 | October 3, 2018 | 4:25 PM - 5:20 PM
Hello, Carbanak!


WATCH SESSION VIEW SLIDESHOW

FireEye has located and analyzed leaked source code and binaries from FIN7's notorious Carbanak backdoor. Michael Bailey and Tom Bennett will share the results of nearly 500 total hours of analysis across 100,000 lines of Carbanak source and dozens of binaries. The findings exposed here can largely only be definitively ascertained through source code analysis, and will range across numerous perspectives, including Russian language translations, anti-reverse engineering, AV detection and evasions, the backdoor build process, active and disabled capabilities, author characterization, and more.

Presenters:
Michael Bailey, Staff Reverse Engineer, FLARE Team – FireEye
Tom Bennett, Staff Reverse Engineer, FLARE Team – FireEye


SESSION 5 | October 3, 2018 | 5:30 PM - 6:15 PM
ATT&CKing FIN7: The Value of Using Frameworks for Threat Intelligence


WATCH SESSION VIEW SLIDESHOW

In August 2018, the Department of Justice announced the arrest of three individuals from one of the most prolific financial threat groups of this decade: FIN7. Presenters from FireEye and MITRE will break down FIN7’s tactics, techniques, and procedures (TTPs) using two frameworks, the Attack Lifecycle and ATT&CK™. Attendees will learn why there is value in structuring threat intelligence about FIN7 or any other group, regardless of which framework you choose. The presenters will also provide detection methods for FIN7 TTPs that attendees can apply to improve their existing defense capabilities from a threat-informed perspective.

Presenters:
Regina Elwell, Senior Threat Analyst, FireEye’s TORE Advanced Practices – FireEye
Katie Nickels, ATT&CK Threat Intelligence Lead – The MITRE Corporation


SESSION 6 | October 4, 2018 | 1:15 PM - 2:00 PM
Protecting Industrial Control Systems – Three Key Lessons from TRITON

The industrial control systems (ICS)/operational technology (OT)/critical infrastructure space is still discussing and investigating the implications of last year’s TRITON malware and attack. As primary responders to the incident, Mandiant consultants had first-hand knowledge of how the attack unfolded, and more importantly, what security controls could have helped prevent the attack. This presentation examines three key controls that would have helped prevent or identify the attack and how they apply to ICS/OT environments. These are also related in context with other ICS assessments that Mandiant has performed over the past four years. Since many facets of critical infrastructure involve ICS/OT, these lessons are important for security practitioners, executives, and government agencies to understand.

Presenter:
Rob Caldwell, Manager, Industrial Control Systems – FireEye


SESSION 7 | October 4, 2018 | 2:10 PM - 2:55 PM
Dead Presidents Redux – N. Korea

Join us for the untold story of how Lazarus Group executes their bank heists and hear how Mandiant was able to help a financial institution recover over $100 million that was stolen via fraudulent SWIFT transfers and bring the organization back online after their systems were destroyed with wiper malware.

Presenters:
Dan Taylor, Incident Response Team Lead, Detection and Response Team – Microsoft
Robert Wallace, Mandiant Director – FireEye


SESSION 8 | October 4, 2018 | 3:05 PM - 3:50 PM
Two Factor Evolution: How Attackers Evade Multi-factor Authentication and What Organizations Can Do About It


WATCH SESSION VIEW SLIDESHOW

Multi-factor authentication is often the first (and too often, the last!) line of defense against motivated attackers attempting to access an organization's most sensitive data. While it is correctly emphasized as a cornerstone of in-depth network defense, adoption rates are outpacing education about how to properly configure a multi-factor deployment and the real-world attack scenarios being levied every day against MFA schemes. In this talk we present a modern threat model of MFA schemes, with a breakdown of both classic and novel tools and techniques to attack MFA, as well as what security teams responsible with enforcing MFA and securing organizations can do to protect themselves.

Presenters:
Austin Baker, Principal Consultant, Mandiant Team – FireEye
Douglas Bienstock, Senior Consultant, Mandiant Team – FireEye


SESSION 9 | October 4, 2018 | 4:20 PM - 5:05 PM
Interpreting Telemetry Data to Evaluate Threat Relevance


WATCH SESSION VIEW SLIDESHOW

This presentation focuses on how organizations can leverage telemetry data to evaluate threat relevance at both the operational and strategic levels. At the operational level, telemetry data can be used to prioritize the most impactful threats, evaluate the threats organizations are observing (or not observing!) within industry or geographic peer groups, and assess levels of targeting. At the strategic level, organizations can use the data to evaluate the likelihood they will be impacted or targeted by a particular threat in the future, and inform decisions on defensive posture, accordingly.

In addition, this presentation will discuss the distortionary factors, such as the types of sensors deployed, data pollution (e.g false positives), and industry vertical and/or regional client-base concentrations, that can impact the quality of telemetry statistics reported by security companies, allowing organizations to better assess their value.

Presenters:
Kimberly Goody, Manager, Financial Crime Analysis Team – FireEye
Nart Villeneuve, Senior Manager, Threat Pursuit Team – FireEye


SESSION 10 | October 4, 2018 | 5:15 PM - 6:00 PM
Convinced By Imposters You Think You Know


WATCH SESSION VIEW SLIDESHOW

Phishing remains the top cyber attack vector, resulting in the most damaging and high-profile cyber security threat facing organizations today. In this session, we will discuss business email compromises or email impersonation attacks. Topics include: Office 365 compromises, latest trends, general email threat and continued sophistication of social engineering. Learn best practices to protect against phishing and impersonation attacks and how cyber insurance can provide help.

Presenters:
Jennifer Coughlin, Esq., Partner – Mullen Coughlin
Elizabeth Flammini, Senior Product Marketing Manager, Email Security – FireEye
Karen Kukoda, Senior Director Cyber Risk Partnerships – FireEye
Maria Noboa, Technical Marketing Manager – FireEye
Dasha Tarassenko, Senior Consultant, Mandiant Team – FireEye
Lauren Winchester, Esq., CIPP/US, Breach Response Services – Beazley

Solutions Track

SESSION 1 | October 3, 2018 | 1:30 PM - 2:15 PM
Block, Find & Fix: Going Beyond Defense With Endpoint Security

In the everchanging endpoint protection landscape threats are plenty, but that doesn't mean they're equal. The right endpoint protection can help you stop known threats, provide advanced detection, and respond rapidly to the threats that matter.

In this session, you will:

  • Learn how the threats to endpoints are changing
  • See how technology must evolve to address these changes
  • Understand how FireEye is using the lessons learned from the frontlines to build endpoint security solutions that address these threats
  • Hear how to integrate FireEye Endpoint Security in your environment to protect vital information stored on your endpoints

Presenters:
Emily Cole, Senior Security Intrusion Analyst, IT Security – Ohio National Financial Services
Seth Summersett, Chief Scientist, Executive Director, Innovation and Custom Engineering – FireEye
Jim Waggoner, Sr. Director, Product Management – FireEye
Jeff Yeutter, Manager, Systems Engineering – FireEye (demo)


SESSION 2 | October 3, 2018 | 2:25 PM - 3:10 PM
Why Hire When You Can Have FireEye on Speed Dial? Introducing Expertise On-Demand


WATCH SESSION VIEW SLIDESHOW

Finding the right talent is tough, and with an estimated 3.5 million unfilled cyber security positions forecasted for 2021, you’ve got considerable competition. Make your analysts more productive with FireEye on speed dial.

In this session, learn how FireEye is helping customers tackle the cyber security talent shortage. Expertise On-Demand is a prepaid, annual subscription that provides flexible, pay-per-use access to FireEye’s industry-recognized cybersecurity expertise and threat intelligence. Whether back stopping your team by assessing the risk of a newly discovered threat or providing access to elite incident responders should a breach occur, Expertise On-Demand provides the experts you need, when you need them most.

Presenters:
Gareth Maclachlan, VP of Strategy and Product Management – FireEye
Trish Tobin, Director, Product Marketing – FireEye


SESSION 3 | October 3, 2018 | 3:40 PM - 4:25 PM
Defending Against Evolving Network Security Threats


WATCH SESSION VIEW SLIDESHOW

The network continues to be a prized target, as hackers refine their tactics, techniques, and procedures. With increasing frequency, hackers are gaining access and moving stealthily within an enterprise network through the use of encrypted payloads, deployment of fileless malware to steal passwords, and the use of volume boot record modification to main persistence.

In this session, you will:

  • Learn how network-based threats are evolving and how FireEye continues to innovate against these developing threats
  • See how FireEye SmartVision detects lateral threats
  • Understand the role of Network Forensics
  • Hear first hand from a FireEye customer how to leverage FireEye Network Security to stay ahead of the changing threat landscape

Presenters:
Brian Barnett, CEO – LUZ Technologies
Chris DiGiamo, Technical Director, Mandiant Team – FireEye
Chris McKie, Product Marketing, Network Security – FireEye
Bill Cantrell, VP, Enterprise Forensics – FireEye (demo)


SESSION 4 | October 3, 2018 | 4:25 PM - 5:20 PM
Putting Your Incident Response Plan to the Test: How Ready Are You, Really?


WATCH SESSION VIEW SLIDESHOW

How confident are you in your current Incidence response plan? And how will you respond when your Board of Directors asks, ‘Are we prepared?’

In this session, you will learn:

  • How Red Team Assessments evaluate your detection and response capability to protect key assets against a real-world targeted attack
  • How IR Tabletop Exercises help assess your organization’s crisis management capabilities through the lens of the executive team
  • How cyber range exercises help improve your security team’s detection and response capabilities for the latest attack scenarios in a consequence-free environment

Presenters:
Jeff Laskowski, Director, Mandiant Team – FireEye
Evan Pena, Global Red Team Lead, Mandiant Team – FireEye


SESSION 5 | October 3, 2018 | 5:30 PM - 6:15 PM
Cyber Security Takes A Village: Achieving Best-in-Class Security Through Innovative Partnerships


WATCH SESSION VIEW SLIDESHOW

Many organizations are wrestling with how to address critical and evolving areas of concern, such as IoT and industrial security, cloud security, intelligent security operations, and security risk management. Join us for this panel discussion with Strategic Partners focused in these areas. Learn how FireEye is working closely with them to address new threats and help customers build a resilient security infrastructure. Understand what makes these combined solutions a solid value proposition for customers as they endeavor to stay ahead of the evolving threat landscape.

Panel:
Rich Stegina, VP, Technology Alliance Partners – FireEye (moderator)
Michael Firstenberg, Manager of Industrial Security – Waterfall Security
Karl Hutter, VP, Global Solution Provider Partnerships, Americas – FireEye
Greg Jensen, Sr. Director of Security – Oracle Cloud Business Group
Ananda Rajagopal, VP, Products and Solutions – Gigamon
Warren Small, VP of Transformation – Dimension Data
Mark Vanston, GM of Cybersecurity – DXC Technology


SESSION 6 | October 4, 2018 | 1:15 PM - 2:00 PM
Phishing, Impersonation, and Malware: Defending Email Against Today’s Advanced Threats


WATCH SESSION VIEW SLIDESHOW

The email threat landscape is changing. With email security solutions focused on detecting malware, cyber criminals are adapting their techniques, exposing organizations to malware-less assaults, such as CEO fraud.

In this session, you will:

  • Learn how impersonation and phishing attacks are evolving
  • Discover the technologies and best practices to defend against these attacks
  • Find out how FireEye continues to innovate against these and other developing threats
  • Hear how a customer leverages FireEye Email Security to stay ahead of the changing threat landscape.

Presenters:
Ken Bagnall, VP, Email Security – FireEye
Steve Cobb, Senior Technology and Security Fellow – One Source Communications
Greg Snyder, VP, Infrastructure Engineering & Product Security – FireEye
Collin Biondo, Sales Engineer – FireEye (demo)


SESSION 7 | October 4, 2018 | 2:10 PM - 2:55 PM
The FireEye Market: Where Community Comes Together for Better Protection


WATCH SESSION VIEW SLIDESHOW

Community is rapidly becoming an essental component of effective cyber security, through knowledge sharing and the co-creation of tools, apps and resources. In this talk, learn about the FireEye Market, a new site to discover the plethora of tools and product extensions created by our employees. See what’s available today and see what we’re doing to enable our partners and customers to create and share their own apps with the greater FireEye community. Help us grow an open, extensible, and integrated platform through our community of experts … you!

Presenters:
Will Green, Technical Director, Customer Success – FireEye
Sean Morton, Sr. Director, Customer Success – FireEye



SESSION 8 | October 4, 2018 | 3:05 PM - 3:50 PM
Beyond Shared Responsibility: Using a Next-Gen SIEM to Secure Your Cloud


WATCH SESSION VIEW SLIDESHOW

Your cloud is vulnerable. What's more, traditional security won’t cut it. Poorly configured authentication, sloppy key management, and unsecured APIs are just a few of the ways threat actors gain access to cloud infrastructures. Through these open doors, bad actors hijack applications and move undetected through the cloud, obtaining credentials and exfiltrating confidential data. What can you do to stop them?

In this session, you will:

  • Learn about FireEye Helix, its capability to protect customers in the cloud, and it's roadmap
  • Find out how to use your SIEM to provide enterprise-wide visibility, and centralize alert and incident management for cloud infrastructure
  • Discover how FireEye Helix can monitor credential use and configuration management to detect vulnerabilities and threats in cloud environments
  • Hear best practice tips from FireEye practitioners

Presenters:
Rich Baker, Forensic Investigative Director – Optum Technology
Steve Booth, VP & Chief Security Officer – FireEye
Martin Holste, CTO, Cloud – FireEye
Andrew Smith, Cybersecurity Engineer – Sallie Mae


SESSION 9 | October 4, 2018 | 4:20 PM - 5:05 PM
Finding the Threats that Matter with Managed Defense


WATCH SESSION VIEW SLIDESHOW

Security threats continue to evolve, yet technology alone does not fully protect against a determined attacker. FireEye Managed Defense is a managed detection and response (MDR) service that combines industry-recognized cyber security expertise, FireEye technology and unparalleled knowledge of attackers to help minimize the impact of a breach.

In this session, you’ll get a glimpse into that experience and dive deeper into the minds of our most advanced security analysts as you learn more about the who, what and why of the advanced persistent threats that FireEye tracks. You’ll hear how this knowledge enables MD analysts to identify threats early in the attacker lifecycle and deliver definitive, action-oriented recommendations containing the context you need to fully understand threats, assess risk and take the necessary action. You’ll also hear from one of our Managed Defense customers to better understand how Managed Defense helps protect their organization.

Presenters:
Nicole Cavaleri, Director, Product Management – FireEye
Sean Murphy, Director, Systems Engineering – FireEye
Monte Ratzlaff, Cyber Risk Program – University of California Office of the President
Steve Stone, Senior Manager, Adversary Pursuit – FireEye


SESSION 10 | October 4, 2018 | 5:15 PM - 6:00 PM
Evolving to an Intel-led Security Organization


WATCH SESSION VIEW SLIDESHOW

Threat intelligence has the power to enhance an organization’s security effectiveness, improve its time-to-response, and reduce business risk. No matter where an organization is on the continuum of security operations maturity, threat intelligence can provide significant value. The question is, what is the best way to maximize that value? What advantages can you gain through simple process or technology changes to ensure that you’re ready to respond quickly to the threats that matter? Come hear from our experts about what threat intelligence can do for you, and talk to a FireEye customer who has made this journey, transforming its security operations to be intelligence-led.

Presenter:
Nigel Gardner, Lead Cyber Threat Intelligence Analyst – MGM Resorts International
Joseph O'Laughlin, Senior Product Marketing Manager – FireEye

Cyber Defense Summit 2019, don't miss out!

Thank you for attending Cyber Defense Summit 2018.

#FireEyeSummit