Hi [[ session.user.profile.firstName ]]

FireEye APAC

  • Date
  • Rating
  • Views
  • Defensive Security Techniques You Can Use Now
    Defensive Security Techniques You Can Use Now
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant Recorded: May 22 2019 60 mins
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennett and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • Evolving to an Intel-led Security Organization
    Evolving to an Intel-led Security Organization
    Shantanu Mahajan, Regional Security Architect – India & SAARC Recorded: May 21 2019 61 mins
    Threat intelligence has the power to enhance an organization’s security effectiveness, improve its time-to-response, and reduce business risk. No matter where an organization is on the continuum of security operations maturity, threat intelligence can provide significant value. The question is, what is the best way to maximize that value? What advantages can you gain through simple process or technology changes to ensure that you’re ready to respond quickly to the threats that matter?
  • Leading with threat intelligence – How to select the right security provider
    Leading with threat intelligence – How to select the right security provider
    Shantanu Mahajan, Regional Security Architect at FireEye Recorded: Apr 30 2019 51 mins
    Today’s sophisticated attackers often hide within the noise of abundant alerts generated by a myriad of security products. Limited budgets, a shortage of skilled security staff, and rigid regulatory requirements make it difficult for organizations to effectively identify and understand these threats—negatively affecting risk-based decision making and asset protection.

    Effective cyber security requires an understanding of who is likely to target you, and how they operate.

    As security leaders and executives turn to service providers to evaluate their security maturity, manage business risks and build sustainable security programs, they often ask ‘how do I select the right security partner for my organization?’

    Join Shantanu Mahajan, Regional Security Architect at FireEye, as he shares insights on:

    • Selecting the right service provider for your organization
    • Realizing limitations of providers who apply traditional and compliance-focused approaches
    • Working with providers who intimately monitor attackers across the evolving threat landscape
    • Understanding the role of cyber threat intelligence in effective cyber security services
    • Asking the right questions of your security providers to enable critical business decisions
  • A 360-Degree View of  the Latest APT Groups
    A 360-Degree View of the Latest APT Groups
    Fred Plan, Sr. Threat Intel Analyst, FireEye Recorded: Apr 18 2019 58 mins
    FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.

    The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.

    In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:

    • A high-level overview on how nation-state interests are driving APT activity
    • Insight into the most recent APT groups investigated by FireEye
    • The latest adversary tactics, techniques and procedures (TTPs) these groups use

    Register NOW for the live webinar
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • M-Trends 2019: Trends Behind Today's Cyber Attacks
    M-Trends 2019: Trends Behind Today's Cyber Attacks
    Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant Recorded: Mar 14 2019 58 mins
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    Join us for this webinar, as experts, Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Hidden risks found across M&A business activities
    • Best practices lessons learned from the front lines of incident response


    Register for the webinar NOW!
  • FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
    FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
    Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEye Recorded: Mar 11 2019 20 mins
    FireEye Chat
    Front and Center with Today’s Leading Cyber Security Experts

    FireEye Chat is a new quarterly talk show that brings guest experts front and center to cover today’s most important cybersecurity topics.

    Episode #1: Front and Center with Kevin Mandia and the Evolution of M-Trends

    Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it. They also cover:
    • Key milestones in the evolution of the report
    • How M-Trends has raised awareness about the importance of cyber security
    • The most significant trends in today’s cyber threat landscape.

    Watch now to get unique insights, direct from the frontlines, in what promises to be a series of lively and thought-provoking exchanges.
  • Top 5 Cloud Security Myths Debunked
    Top 5 Cloud Security Myths Debunked
    Martin Holste, CTO, FireEye Recorded: Feb 28 2019 56 mins
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar on Thursday, February 28, helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Recorded: Feb 21 2019 56 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • The Cyber Security Skills Gap
    The Cyber Security Skills Gap
    Shantanu Mahajan, Regional Security Architect - India, FireEye Recorded: Jan 30 2019 58 mins
    Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.

    During this webinar we will be covering how the industry has been affected by a cyber-skills shortage and the challenges of inhouse vs. outsourcing of cyber security operations. And how this gap can be covered with ‘on-demand’ expert resources who have with them, real time insight and expertise of dealing with cyber breaches.

Embed in website or blog