Hi [[ session.user.profile.firstName ]]

FireEye APAC

  • Date
  • Rating
  • Views
  • 網絡戰中的人工智能:入門
    網絡戰中的人工智能:入門 蕭松瀛, Nicholas Hsiao, FireEye 技術顧問 Recorded: Sep 20 2018 44 mins
    人工智能(AI)是一種變革性的雙用途技術,可以為組織提供更好的網絡防禦工具,並幫助對手改進攻擊方法。 更有效地了解人工智能的當前和未來潛力﹔將有助於用戶了解相關新興技術如何影響他們的業務。
    Nicholas Hsiao技術顧問將會分三個單元討論人工智能,在第一單元會講解以下議題:
    •了解AI的基本原理,用於處理數據的各種技術之間的差異以及每種方法的缺點。
    •討論如何將AI工具用於網絡領域的攻擊和防禦性目的。
    •深測未來的威脅形勢,並提供有關各國如何使用人工智能工具的地緣政治背景,考慮到他們目前的技術發展水平和人工智能在民用應用中的整合
  • You're Hacked and You Know It: Incident Response is my Better Half
    You're Hacked and You Know It: Incident Response is my Better Half Claudio Scarabello, Director Product, APAC, FireEye Recorded: Sep 11 2018 46 mins
    Your security operations centre just discovered a major breach. It’s not clear what the attackers stole but so far it looks bad. What happens next? Do you have a well-prepared response plan, and has it been tested before today?

    Robust incident response capabilities are often overlooked in cyber security programs since emphasis is predominantly on preventing a breach and any budget allocated to breach response would seem like an admission of failure. This presentation uncovers what are the real challenges faced by organizations and uses a real-world case study, Cybersecurity Malaysia, as a backdrop to outline the solutions. Take 30 minutes to gain actionable tips so you can validate the preparedness of your organization.
  • Cyber Silver Bullets and Snake Oil: Knowing the Problem is Half the Battle
    Cyber Silver Bullets and Snake Oil: Knowing the Problem is Half the Battle Claudio Scarabello, Director Product, APAC, FireEye Recorded: Sep 6 2018 46 mins
    Organizations of all types, but especially financial services providers, need to build resilience into their cybersecurity programs. You need to frequently question if an attacker evaded security controls and is silently establishing a foothold while looking for something of value to steal.

    Strong synergy is required between technology capability and human expertise. This presentation uncovers what are the real challenges faced by organizations and uses a real-world case study, Rizal Commercial Banking Corporation (RCBC), as a backdrop to outline the solutions. Take 30 minutes to gain actionable tips so you can validate the resilience of your organization.
  • 模仿電郵威脅 – 層出不窮的面具
    模仿電郵威脅 – 層出不窮的面具 洪文輝, Manfred Hung, FireEye 技術顧問 Recorded: Aug 23 2018 31 mins
    您始終無法相信電子郵件的發件人真正發送了它。 模仿威脅正變得越來越流行,用戶也難以發現。

    在此網路研討會中,Manfred Hung FireEye 技術顧問將會討論“模仿電郵威脅 – 層出不窮的面具”,深入探討模仿攻擊背後的細節:
    • 涉及什麼心理認證
    • 攻擊者如何捕捉接受者的想像力和情感
    • 模仿攻擊是如何演變的
    • 模仿的未來是什麼
    • 威脅情報和電郵安全的速度如何影響網絡風險
  • IDC names FireEye as a Leader - MarketScape: APAC Threat Lifecycle Services 2018
    IDC names FireEye as a Leader - MarketScape: APAC Threat Lifecycle Services 2018 Rob van der Ende, Vice President Asia Pacific & Japan, Mandiant, a FireEye company Recorded: Aug 14 2018 39 mins
    The cyber threat landscape is continuously evolving. Attackers develop new tools and techniques to breach technology environments, faster than most defenders can keep up with.

    IDC, a leading industry analyst firm, recently published a report called ‘MarketScape: Asia Pacific Threat Lifecycle Services 2018’, which highlights how organizations are struggling to rapidly identify the threats that really matter, due to a lack of visibility into both insider and external threats.

    In this webinar we will share with you how FireEye addresses this challenge through access to unique threat intelligence, collated from all the breaches we have been investigating around the world for more than 14 years, learning and observing the human aspects of the attackers.

    We believe that more visibility into attacker behaviour across the organization leads to efficient and effective threat detection and supports thorough remediation.

    Find out how services that span the full threat lifecycle can counter the threats organisations face from adversaries and help them become more resilient to breaches.
  • AI and the Future of Cyber Conflict
    AI and the Future of Cyber Conflict Claudio Scarabello, Director Product, APAC, FireEye Recorded: Jul 31 2018 61 mins
    Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.

    Additionally, as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.

    Join Claudio Scarabello, Director Product, APAC, FireEye, for the final episode of our three-part series on AI as we discuss the:

    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Use of AI applications in businesses and associated vulnerabilities
  • Impersonation: The Many Masks of Email Threats
    Impersonation: The Many Masks of Email Threats Ken Bagnall, Vice President, Email Security Recorded: Jul 27 2018 50 mins
    You can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot.

    Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks:

    • What psychological authentication involves
    • How attackers prey on recipients’ imagination and emotions
    • How impersonation attacks are evolving
    • What is in the future for impersonation
    • How threat intelligence and the speed of email security impact cyber risk
  • TEMP.Periscope Surfaces in Cambodia: A Chinese espionage operation
    TEMP.Periscope Surfaces in Cambodia: A Chinese espionage operation Tim Wellsmore, Director, Government Security Programs, APAC and Ben Wilson, Threat Intelligence Analyst Recorded: Jul 24 2018 30 mins
    Earlier this month, FireEye revealed an extensive cyber espionage carried out by China-linked TEMP.Periscope which targeted Cambodia’s political system. The effort—which was covered by Bloomberg, Time, Associated Press and others—compromised multiple ministries, diplomats and opposition members. It was carried out by China’s second most active cyber espionage groups, which has previously targeted US-, Europe- and Asia-based organizations.

    Join Tim Wellsmore, Director, Government Security Programs, APAC and Ben Wilson, Threat Intelligence Analyst for the webinar to learn more about TEMP.Periscope’s mission, and its attacker tactics, techniques and procedures.
  • How To Manage Your Risk with Threat Intelligence
    How To Manage Your Risk with Threat Intelligence Rob Van Der Ende, Vice President Asia Pacific & Japan, FireEye Inc. Recorded: Jul 18 2018 24 mins
    Organizations continue to fight an asymmetric battle on the cyber front. Attackers are sophisticated, well-funded, well-organized and use highly targeted techniques. Security teams routinely struggle to understand which cyber threats pose the greatest risk to them and how to prioritize those they discover.

    Most organizations stake their security efficacy on legacy, signature-based tactical intelligence feeds that can’t anticipate attacks or provide context to guide response. Instead, these feeds increase alert volumes with false positives that make it nearly impossible to detect attacks and provide a false sense of security.

    The right threat intelligence can help organizations drive business efficiencies, by proactively assessing and managing risks that are relevant, improved detection and prevention of attacks, and building attack context for the alerts that they face.

    Find out how threat intelligence helps you stay on top of an evolving threat landscape.
  • The Impact of Artificial Intelligence in the Cyber Domain
    The Impact of Artificial Intelligence in the Cyber Domain Claudio Scarabello, Director Product, APAC, FireEye Recorded: Jun 28 2018 61 mins
    Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense.

    Catch the second installation of our three-part webinar series on AI that covers:

    • How AI technology can enhance a businesses’ defensive capabilities
    • How cyber threats can use AI to improve the sophistication and scope of their attacks
    • How FireEye uses machine learning to bolster its internal defenses and tools

    Don’t miss part one of the three-part series “Artificial Intelligence in Cyber Warfare: A Primer” -
    https://www.brighttalk.com/webcast/10469/318781

Embed in website or blog