Hi [[ session.user.profile.firstName ]]

FireEye APAC

  • Date
  • Rating
  • Views
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • M-Trends 2019: Trends Behind Today's Cyber Attacks
    M-Trends 2019: Trends Behind Today's Cyber Attacks
    Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant Recorded: Mar 14 2019 58 mins
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    Join us for this webinar, as experts, Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Hidden risks found across M&A business activities
    • Best practices lessons learned from the front lines of incident response


    Register for the webinar NOW!
  • FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
    FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
    Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEye Recorded: Mar 11 2019 20 mins
    FireEye Chat
    Front and Center with Today’s Leading Cyber Security Experts

    FireEye Chat is a new quarterly talk show that brings guest experts front and center to cover today’s most important cybersecurity topics.

    Episode #1: Front and Center with Kevin Mandia and the Evolution of M-Trends

    Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it. They also cover:
    • Key milestones in the evolution of the report
    • How M-Trends has raised awareness about the importance of cyber security
    • The most significant trends in today’s cyber threat landscape.

    Watch now to get unique insights, direct from the frontlines, in what promises to be a series of lively and thought-provoking exchanges.
  • Top 5 Cloud Security Myths Debunked
    Top 5 Cloud Security Myths Debunked
    Martin Holste, CTO, FireEye Recorded: Feb 28 2019 56 mins
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar on Thursday, February 28, helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Recorded: Feb 21 2019 56 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • The Cyber Security Skills Gap
    The Cyber Security Skills Gap
    Shantanu Mahajan, Regional Security Architect - India, FireEye Recorded: Jan 30 2019 58 mins
    Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.

    During this webinar we will be covering how the industry has been affected by a cyber-skills shortage and the challenges of inhouse vs. outsourcing of cyber security operations. And how this gap can be covered with ‘on-demand’ expert resources who have with them, real time insight and expertise of dealing with cyber breaches.
  • Big-Guy Security for the Little Guy
    Big-Guy Security for the Little Guy
    Claudio Scarabello Director Product, APAC FireEye Inc Recorded: Dec 13 2018 51 mins
    Threats Actors Target Vendors to Large Organisations

    We observe that state-sponsored espionage groups steal intellectual property for economic advantage. While the main players appear to understand this threat, many smaller supply-chain vendors and contractors may not. The targeting of third-party vendors and contractors is a tactic these threat actors are increasingly using to spy on hardened targets. A recent discovery of a treasure trove of openly available sensitive data is a reminder and call-to-action for many smaller enterprises to improve their cyber resilience. Attend this session to hear more about this case and threat actors potentially using these tactics.
    Join if you’re from a large organization that needs to understand third-party risk or if you’re from a small organization that needs to demonstrate due diligence to your largest customers.
  • Facing Forward: Cyber Security in 2019 and Beyond
    Facing Forward: Cyber Security in 2019 and Beyond
    Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Dec 11 2018 57 mins
    As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

    Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye Threat Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

    •Threats to the aviation industry, including cyber espionage and cybercrime
    •What to expect from established and emerging nation states
    •How threat actors are changing their tactics to stay ahead of defenders

    Register today to learn what lies ahead and stay one step ahead of cyber security threats.
  • 通過網絡取證揭示隱藏的網絡威脅
    通過網絡取證揭示隱藏的網絡威脅
    洪文輝 Manfred Hung, FireEye 技術顧問 Recorded: Nov 22 2018 40 mins
    許多現代網絡攻擊通常繞過防火牆和其他外圍防禦,讓資安人員發揮“打擊鼴鼠”的作用,盡可能快速有效地擊敗威脅。 網絡取證策略可以讓資安團隊了解網絡流量,並讓他們快速找到隱藏在其網絡中的威脅。
    Manfred Hung技術顧問將詳細介紹:
    •了解網絡取證策略的好處
    •利用網絡取證來提高安全性並提高流量可見性
    •深入了解網絡取證如何改善事件回應時間並將損失風險降至最低
    •了解網絡取證如何實現追溯並狩捕威脅
  • 人工智能和未來的網絡衝突
    人工智能和未來的網絡衝突
    蕭松瀛, Nicholas Hsiao, FireEye 技術顧問 Recorded: Nov 15 2018 42 mins
    在網絡世界中攻擊者使用人工智能(AI)將導致攻擊更具針對性,影響更多人,並造成更大傷害。 資安專業人員必須了解這沖突對未來攻擊有什麼含意。
    此外,隨著越來越多公司將AI應用程序集成到他們的業務中,他們必須了解與此技術相關的風險。
    Nicholas Hsiao 北亞技術顧問在人工智能系列的最終回講解以下議題:
    •隨著攻擊者開發和執行AI的能力,地緣政治格局也隨之轉變
    •在業務中使用AI應用程序,相關漏洞和風險緩解方法

Embed in website or blog