Hi [[ session.user.profile.firstName ]]

FireEye APAC - Security Reimagined

  • Date
  • Rating
  • Views
  • How prepared are APAC organisations in responding to a data breach? How prepared are APAC organisations in responding to a data breach? Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan Recorded: Sep 20 2016 37 mins
    Our Mandiant consultants have responded to and investigated many of 2015's biggest security incidents. The insights gained from these consultancies provide us with a unique vantage point when it comes to understanding the ever-evolving cyber threat landscape.

    This webinar will discuss key trends, statistics, and case studies to illustrate the evolution of the advanced threat actors over the last year in Asia Pacfic.

    Register for the webinar and join Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan at FireEye as they dicsuss the top findings from this report and explains how to prepare and respond to a breach when it occurs
  • Recognise your Threats, Regulate your Risks Recognise your Threats, Regulate your Risks Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Recorded: Jul 26 2016 53 mins
    Cyberattacks against Banking and Financial Institutions have evolved from annoying pop-ups and machine crashes to denial-of-business events. CxO resignations and losses/damages running into crores of Rupees have heightened the awareness around cyber security, and shifted it from an IT problem to a business priority risk.
    Recently, Asia has been a hotspot for such cyberattacks, with many high-profile attacks being the subject of headlines across the region, including the most recent Bangladesh Bank breach.
    In its latest annexure to banks titled “Cyber Security Framework in Banks”, RBI has outlined a number of proactive measures that Banks in India need to take to ensure a robust cyber security/resilience framework, and to ensure adequate cyber security preparedness on a continuous basis.

    Here are just a few requirements:
    -Board approved cyber security policy
    -Continuous surveillance
    -Cyber crisis management plan
    -Cyber resilience framework
    -Cyber security awareness among stakeholders / top management / board
    FireEye invites all banks and financial institutions to join this exclusive webinar where the speakers will review the RBI guidelines and suggest ideas to bolster your response strategy and limit the consequences of a breach.

    Date: 26th July, Tuesday
    Time: 11:00 am
    Duration: 40 mins. With Q&A
    Speakers:
    Vipul Kumra, Consulting Engineer, FireEye India
    Shantanu Mahajan, Consulting Engineer, FireEye India
  • Cyber Risk Conversation: Security Trends & Best Practices Cyber Risk Conversation: Security Trends & Best Practices Ron Bushar, Managing Director, Mandiant (a FireEye company) Recorded: Jul 26 2016 54 mins
    Over the last decade, cyber security has evolved from a niche concern confined to IT professionals to a major priority for CEOs and boards of directors. Company leaders are now charged with managing cyber risk with the same urgency that they have managed traditional business risk.
    The emergence of cyber risk as a centerpiece of risk management is being fueled by new and increasingly complex threats. Organizations must deal with a quickly evolving set of threats to their information systems and data. Many of these threats were unimaginable just a few years ago.

    In this discussion, we explain the different forms of cyber risk and show how the threat level has risen in recent years. We also provide a basic framework for managing cyber risk, and finally, we pose five key questions business leaders should ask themselves to ensure their security posture is sufficiently robust and resilient to meet evolving threats.

    Register for this webinar today. As usual, we’ll leave time for Q&A.
  • Good Enough Security: Is It Hurting Your Business Good Enough Security: Is It Hurting Your Business Shantanu Mahajan, Consulting Engineer, FireEye Technologies Pvt Ltd Recorded: Jun 22 2016 59 mins
    “Good Enough Security: Is It Hurting Your Business “
    Imagine a continuous state of alarm - that alarm sounding every second …24 hours a day …7 days a week …all year long …
    That’s the situation IT security teams around the world face with their cybersecurity tools. With so many alerts, it is not your security that is working hard, it’s your security team. And with so many alerts to review a security team can end up with alert fatigue, causing them to ignore a high percentage of the messages. When that happens, cyber attacks can slip by.
    Organizations with traditional defenses often face an uncomfortable and expensive tradeoff: add security staff and tools at considerable cost or risk fatigue and missing a critical alert.
    Truth is, you can avoid this tradeoff.
    Join the FireEye webinar “Good Enough Security: Is It Hurting Your Business” where we will throw some light on:

    1.The true costs of ineffective security
    2.Detection Efficacy: Invest in security tools that highlight alerts that matter
    3.Key considerations when evaluating a cyber security solution - The need for a platform that includes response
    Register Today
    The FireEye Team
    Time to check your security posture!


    Date: Wednesday, 22nd June 2016
    Time: 11:00 a.m
    Duration: 40 mins. and Q&A
    Speaker: Shantanu Mahajan, Consulting Engineer, FireEye Technologies Pvt Ltd.
  • Ransomware : A Disruption or Distraction? Ransomware : A Disruption or Distraction? Vipul Kumra,Consulting Engineer, FireEye India Recorded: Jun 1 2016 54 mins
    It is 8:00 am, and you are on the way to work. You get a frenetic call from your office – “hackers are holding your computers hostage in exchange for a ransom”. Your order processing application is one of the casualties. Your last successful backup was over a month ago. Do you pay the ransom and regain control? Your money or your data?
    This scene may seem to be straight out of a Hollywood movie, but for several organisations, it has become an unfortunate reality today. Ransomware is a growing menace to enterprises and consumers alike, and given the recent trends observed by FireEye, it is here to stay. Some ransomware variants encrypt your critical files, others lock you out of the systems. Some demand bitcoins, others demand payment vouchers. Some are a disruption to your business, others are just a distraction.
    Join the FireEye webinar “Ransomware: A Disruption or Distraction", and get an in-depth view into the mechanics of ransomware. You will learn about:
    1.Ransomware: Impact & Trends
    2.The Economics of Ransomware
    3.A Distraction or Disruption
    4.Lessons Learned: Tackling Ransomware
  • Threat Update: SYNful Knock - A Cisco Implant Threat Update: SYNful Knock - A Cisco Implant Bill Hau, VP, Mandiant Consulting, a FireEye company & Tony Lee, Technical Director, Mandiant Consulting, a FireEye company Recorded: Oct 13 2015 16 mins
    SYNful Knock, once a theoretical cyber attack, is now a reality. This Cisco router implant was recently discovered in multiple organizations and several countries.

    Based on research from Mandiant, a FireEye company, we believe this is just the first of many possible router implant techniques and expect similar attack methods to become more popular and sophisticated in the future.

    In this webinar, you’ll learn about the malware and its capabilities, as well as tools to detect the threat in your organization.

    Join us to discover:
    - How SYNful Knock works
    - Why SYNful Knock is so difficult to detect, even when you suspect an implanted router
    - How you can better detect and foil SYNful Knock
    - What future variants of this attack might look like

    Register today to learn all about SYNful Knock
  • Securing Enterprise Networks against Advanced Attacks Securing Enterprise Networks against Advanced Attacks Rajiv Raghunarayan, Director, Product Marketing Recorded: May 29 2015 58 mins
    How can your company ensure all threat vectors are protected? In this webinar you will:

    - Find out what it takes to secure your organization from today’s evasive advanced cyber threats
    - Discover how to detect blended attacks that point products miss
    - Learn how to safeguard your intellectual property, critical infrastructure, and customer records from multi-vector, targeted attacks
    - Understand how to respond to incidents faster by reducing the number of false positives your security team has to sift through
    - Get introduced to the FireEye products that can help achieve enterprise network security
  • APT30: Behind the Decade-Long Cyber Espionage Operation APT30: Behind the Decade-Long Cyber Espionage Operation Bryce Boland, CTO, Asia Pacific, FireEye Recorded: Apr 29 2015 39 mins
    Learn more about the tools, tactics, and procedures of APT30 - the cyber threat group that had successfully compromised entities for at least ten years, and how to detect, prevent and respond to this threat.

    FireEye recently released a report that details how a cyber threat group APT 30, had successfully exploited largely in Southeast Asia countries and India – in both government and commercial entities — who hold key political, economic, and military information about the region for at least a decade.

    Join us on this webinar with Bryce Boland, CTO of FireEye Asia Pacific, who will share more on this threat intelligence.

    In this webinar, you can understand more about the operations behind APT30 as we outline the profile of the attacker so that you can better understand their threats.

    • Learn about their tools, tactics and procedures (TTP)
    • Find out how you can detect, prevent, analyze and respond to this threat

    This session is for business and security professionals, especially in South East Asia and India, who would like to know more about this APT group which is one of the longest running advanced threat groups we have observed.
  • Outgunned in Cyberspace. Can your company defend itself? Outgunned in Cyberspace. Can your company defend itself? Steve Ledzian, Director of Systems Engineering, Asia Recorded: Mar 5 2015 46 mins
    A report from FireEye detailed a study of over 1200 real world production networks and found that 96 percent of those networks experienced a breach during the study.

    Even some of the largest of companies had their defenses defeated by attackers despite millions of dollars invested in cybersecurity. Cyber-criminal organizations and nation state threat actors alike are also constantly evolving in sophistication. With more at stake than ever and against these increasingly advanced threats, many organization who are looking at their own in-house security teams are feeling outgunned in cyberspace.

    For organisations that are concerned about the ever increasing rate of cyber-attacks, but do not have the ability or desire to build their own team of dedicated cyber defenders, what are their options available against these attackers? Are there strategies that can help organizations instantly level the playing field? How can FireEye-as-a-Service (FaaS) help?

    Attend this webinar and find out how FireEye-as-a-Service (FaaS) can be an arsenal for these organisations.

    In this webinar, Steve Ledzian, Director of Systems Engineering, Asia will explore these topics, and discuss how FaaS leverages a unique combination of Technology, Intelligence, and Expertise, to defend against evolving cyber-attacks, and resolve any incident in minutes and not months.
  • In-depth Analysis Behind the Syrian Conflict's Digital Front Lines In-depth Analysis Behind the Syrian Conflict's Digital Front Lines Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab) Recorded: Feb 25 2015 60 mins
    FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

    Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

    We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

    Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

    • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
    • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

    Find out more and learn from this Syrian report how you can defend yourself against these cyber attackers

Embed in website or blog