Hi [[ session.user.profile.firstName ]]

FireEye APAC

  • Date
  • Rating
  • Views
  • 7 Questions To Consider When Looking For An Effective Endpoint Security Solution 7 Questions To Consider When Looking For An Effective Endpoint Security Solution Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc. Recorded: Jan 25 2017 31 mins
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Financial Impact of Data Breaches Financial Impact of Data Breaches Roger J. Francis, Senior Consultant at Mandiant, a FireEye company Recorded: Jan 10 2017 49 mins
    Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.

    In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
  • Predicting Change in 2017 in Cyber Security Predicting Change in 2017 in Cyber Security Bryce Boland, Chief Technology Officer for Asia Pacific; Tim Wellsmore, Director of Consulting and Intelligence, Mandiant Recorded: Dec 14 2016 54 mins
    Major events of 2016 have created great uncertainty about the future, but in cyber security, one thing is certain: Some attacks and crimes will continue and new challenges will emerge.

    What new developments in cyber security should you expect in 2017 in Asia Pacific?

    Join us to hear from some of FireEye’s top experts about our predictions for 2017 which draw from our executive team, Mandiant incident responders, FireEye iSIGHT Intelligence, and FireEye Labs.
    Register to understand what lies ahead, so you can prepare to stay one step ahead of cyber security threats.

    Join Bryce Boland, Chief Technology Officer for Asia Pacific and Tim Wellsmore, Director of Consulting and Intelligence, Mandiant in this presentation about emerging trends in the Asia Pacific region.
  • Why Today’s Changing Threat Landscape Requires Agile Security Why Today’s Changing Threat Landscape Requires Agile Security Rajiv Raghunarayan, Sr. Director, Product Marketing, FireEye. Robert Westervelt, Research Manager, IDC. Recorded: Nov 12 2016 60 mins
    Advanced threats continue to grow in severity, complexity and reach as threat actors expand their attacks to hit soft targets. Adding to this, as business workloads move to the cloud, and as shadow IT continues to proliferate, unforeseen security gaps expose new vectors for exploit and abuse.

    Attacks are not just targeting the core of a network, nor are they limited to just large scale enterprises. More and more, threat actors are aiming at vulnerable endpoints, distributed network environments and porous perimeter defenses. To combat this, security solutions need to be as agile as today’s threat actors.

    In this webinar, we will discuss the changing threat landscape and how today’s threat actors and advanced malware are impacting businesses of all sizes and types. Additionally, we will examine new security solutions and deployment models that provide agility, flexibility and widespread protective reach that scales and grows with IT and security needs.
  • Intel & Threat Analysis – The Defensive Duo Intel & Threat Analysis – The Defensive Duo Jens Monrad, Global Threat Intelligence Liaison, FireEye; Al Maslowski-Yerges Manager, Americas Systems Engineering Recorded: Nov 4 2016 41 mins
    The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

    "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

    Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

    •How to ensure you are responding to the alert that matters

    •Benefits of Alerts with threat Intelligence

    •Using threat intelligence to think like your attacker

    •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

    •How security teams can prioritize and optimize their response efforts.
  • Breach Defense: Prepare & Respond Breach Defense: Prepare & Respond Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Recorded: Oct 25 2016 49 mins
    Are you ready to handle a security breach? In the age of relentless cyber crimes and nation state sponsored cyber attacks, companies need to be breach-ready, and be proactive in their incident preparedness. This could essentially save organisations from devastating cost.
    Incident preparedness is more than having an incident response plan, it’s more than having skilled personnel on staff. Come join us for a discussion on key elements that every company should consider. Major security breaches have become part of everyone’s daily news feed—from the front page of the newspaper to the top of every security blog—you can’t miss the steady flood of new breaches impacting the world today. In today’s ever-changing world of business and technology, breaches are inevitable: you must be prepared and know how to respond before they happen
  • Breach Readiness: Next Generation of Incident Preparedness Breach Readiness: Next Generation of Incident Preparedness Russell Teague, Managing Director, Mandiant, a FireEye Company Recorded: Oct 2 2016 56 mins
    Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, a FireEye Company, will discuss the Next Generation of Incident Preparedness. Mandiant is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches. Russell will discuss what companies need to do to be breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.

    Incident preparedness is more than having an incident response plan, it's more than having skilled personnel on staff. Come join us in an eye-opening discussion on key elements that every company should consider. Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen. Learn how to become prepared from the industry leader in breach management and ultimately control your cost in post breach recovery.
  • Security-as-a-Service: New Threat Landscape Demands a New Paradigm Security-as-a-Service: New Threat Landscape Demands a New Paradigm Rudy Araujo, VP, Product & Solutions Marketing Recorded: Sep 30 2016 47 mins
    The security paradigm for nearly two decades has been to increasingly invest in technology. These solutions have not only failed to solve the problem but have made the challenge more complex. Even if true threats are detected, they are lost in a sea of alerts and lack the context to prioritize and build response. This security posture is only exacerbated by the skills deficit currently facing the industry.

    In this webinar, we look at the emergence of a new security-as-a-service paradigm and the capabilities required to help organizations reduce risk and time to protection. The discussion will cover how the cost, specialization and complexity of cyber defense have positioned security to follow other markets in adopting an “as-a-service” paradigm.

    We will also address the capabilities that define an ideal security-as-a-service partner such as:

    •the availability of security expertise
    •a broad intelligence capability and
    •flexible deployment options

    Not only does this approach improve a security posture and reduce risk but it does so with a lower total cost of ownership (TCO). Register today to learn more about this emerging security-as-a-service model.

    The FireEye Team
  • How prepared are APAC organisations in responding to a data breach? How prepared are APAC organisations in responding to a data breach? Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan Recorded: Sep 20 2016 37 mins
    Our Mandiant consultants have responded to and investigated many of 2015's biggest security incidents. The insights gained from these consultancies provide us with a unique vantage point when it comes to understanding the ever-evolving cyber threat landscape.

    This webinar will discuss key trends, statistics, and case studies to illustrate the evolution of the advanced threat actors over the last year in Asia Pacfic.

    Register for the webinar and join Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan at FireEye as they dicsuss the top findings from this report and explains how to prepare and respond to a breach when it occurs
  • Know Your Enemy: New Financially-Motivated & Spear-Phishing Group Know Your Enemy: New Financially-Motivated & Spear-Phishing Group Steve Elovitz, Manager, Consulting Services (Mandiant), Ian Ahl, Manager, Incident Response (Mandiant) Recorded: Aug 18 2016 50 mins
    Beginning in January 2016, Mandiant identified a financially-motivated threat actor that launched several tailored, spear-phishing campaigns—targeting industries that process large volumes of consumer credit cards such as retail, restaurant, and hospitality. To date, Mandiant has seen this group at over 150 organizations. This group is interesting due to the large number of organizations they quickly targeted, how quickly they shift tools, tactics, and procedures (TTPs), and their unusual persistence in attempting to re-compromise an organization after remediation.

    During this conversation, we will walk through examples from several Mandiant investigations of this groups activity. We will take a technical look at this threat actor's TTPs as well as talk about what to look for to determine if they are active in your environment.

    Register for this webinar as our experts share key insights on this new cyber threat group!

Embed in website or blog