Hi [[ session.user.profile.firstName ]]

FireEye APAC

  • Date
  • Rating
  • Views
  • Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations
    Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company Recorded: May 18 2017 59 mins
    Attend this webinar to be one of the first to learn details about APT32, a significant espionage operation targeting global companies operating in Southeast Asia. Over the past several months, FireEye has focused major efforts on defending our clients against APT32, also known as OceanLotus Group.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How FireEye continues to improve your ability to detect, prevent and remediate APT32 attacks

    Take your first step to minimize the impact of the new APT group.
  • M-Trends 2017: Trends Behind Today's Breaches & Cyber Attacks | APAC Spotlight
    M-Trends 2017: Trends Behind Today's Breaches & Cyber Attacks | APAC Spotlight Tim Wellsmore, Director, Threat Intelligence,Mandiant Consulting; Rob van der Ende, Vice President, Mandiant Consulting, APAC Recorded: Apr 19 2017 43 mins
    Join this important webinar as the Mandiant team explores trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks. Register today for an intelligence-led look into:
    · New phishing trends breaching today’s companies.
    · Changes in modern attack telemetry and methodology.
    · Intelligence-led insights into emerging global threats.
    · Modern defensive strategies to better protect your organization.
    Special features spotlight trends in the APAC regions. Take a guided look at the M-Trends Report, pinpointing current and emerging global threats as discovered from the front lines of today’s leading forensic investigations.
  • FireEye in 2017
    FireEye in 2017 Bryce Boland, Asia Pacific CTO, FireEye Recorded: Apr 7 2017 31 mins
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Bryce Boland, FireEye's Asia Pacific CTO, as he describes how FireEye in APAC can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • 7 Questions To Consider When Looking For An Effective Endpoint Security Solution
    7 Questions To Consider When Looking For An Effective Endpoint Security Solution Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc. Recorded: Jan 25 2017 31 mins
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Financial Impact of Data Breaches
    Financial Impact of Data Breaches Roger J. Francis, Senior Consultant at Mandiant, a FireEye company Recorded: Jan 10 2017 49 mins
    Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.

    In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
  • Predicting Change in 2017 in Cyber Security
    Predicting Change in 2017 in Cyber Security Bryce Boland, Chief Technology Officer for Asia Pacific; Tim Wellsmore, Director of Consulting and Intelligence, Mandiant Recorded: Dec 14 2016 54 mins
    Major events of 2016 have created great uncertainty about the future, but in cyber security, one thing is certain: Some attacks and crimes will continue and new challenges will emerge.

    What new developments in cyber security should you expect in 2017 in Asia Pacific?

    Join us to hear from some of FireEye’s top experts about our predictions for 2017 which draw from our executive team, Mandiant incident responders, FireEye iSIGHT Intelligence, and FireEye Labs.
    Register to understand what lies ahead, so you can prepare to stay one step ahead of cyber security threats.

    Join Bryce Boland, Chief Technology Officer for Asia Pacific and Tim Wellsmore, Director of Consulting and Intelligence, Mandiant in this presentation about emerging trends in the Asia Pacific region.
  • Why Today’s Changing Threat Landscape Requires Agile Security
    Why Today’s Changing Threat Landscape Requires Agile Security Rajiv Raghunarayan, Sr. Director, Product Marketing, FireEye. Robert Westervelt, Research Manager, IDC. Recorded: Nov 12 2016 60 mins
    Advanced threats continue to grow in severity, complexity and reach as threat actors expand their attacks to hit soft targets. Adding to this, as business workloads move to the cloud, and as shadow IT continues to proliferate, unforeseen security gaps expose new vectors for exploit and abuse.

    Attacks are not just targeting the core of a network, nor are they limited to just large scale enterprises. More and more, threat actors are aiming at vulnerable endpoints, distributed network environments and porous perimeter defenses. To combat this, security solutions need to be as agile as today’s threat actors.

    In this webinar, we will discuss the changing threat landscape and how today’s threat actors and advanced malware are impacting businesses of all sizes and types. Additionally, we will examine new security solutions and deployment models that provide agility, flexibility and widespread protective reach that scales and grows with IT and security needs.
  • Intel & Threat Analysis – The Defensive Duo
    Intel & Threat Analysis – The Defensive Duo Jens Monrad, Global Threat Intelligence Liaison, FireEye; Al Maslowski-Yerges Manager, Americas Systems Engineering Recorded: Nov 4 2016 41 mins
    The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

    "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

    Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

    •How to ensure you are responding to the alert that matters

    •Benefits of Alerts with threat Intelligence

    •Using threat intelligence to think like your attacker

    •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

    •How security teams can prioritize and optimize their response efforts.
  • Breach Defense: Prepare & Respond
    Breach Defense: Prepare & Respond Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Recorded: Oct 25 2016 49 mins
    Are you ready to handle a security breach? In the age of relentless cyber crimes and nation state sponsored cyber attacks, companies need to be breach-ready, and be proactive in their incident preparedness. This could essentially save organisations from devastating cost.
    Incident preparedness is more than having an incident response plan, it’s more than having skilled personnel on staff. Come join us for a discussion on key elements that every company should consider. Major security breaches have become part of everyone’s daily news feed—from the front page of the newspaper to the top of every security blog—you can’t miss the steady flood of new breaches impacting the world today. In today’s ever-changing world of business and technology, breaches are inevitable: you must be prepared and know how to respond before they happen
  • Breach Readiness: Next Generation of Incident Preparedness
    Breach Readiness: Next Generation of Incident Preparedness Russell Teague, Managing Director, Mandiant, a FireEye Company Recorded: Oct 2 2016 56 mins
    Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, a FireEye Company, will discuss the Next Generation of Incident Preparedness. Mandiant is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches. Russell will discuss what companies need to do to be breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.

    Incident preparedness is more than having an incident response plan, it's more than having skilled personnel on staff. Come join us in an eye-opening discussion on key elements that every company should consider. Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen. Learn how to become prepared from the industry leader in breach management and ultimately control your cost in post breach recovery.

Embed in website or blog