Hi [[ session.user.profile.firstName ]]

FireEye EMEA

  • Date
  • Rating
  • Views
  • Ein Ausweg aus dem Daten-Dschungel
    Ein Ausweg aus dem Daten-Dschungel Marco Rossi, Consulting Systems Engineer Recorded: Jun 20 2018 33 mins
    Mit FireEye Threat Analytics in kürzester Zeit das eigene SIEM realisieren.

    Die Erfahrungen mit klassischen SIEM-Lösungen haben immer wieder gezeigt, dass durch deren Implementierung recht schnell große Datenmengen und gleichzeitig viele Alarme erzeugt werden. Damit werden noch lange nicht alle für die Cyber-Sicherheit relevanten Probleme gelöst
    Wir zeigen Ihnen, wie Sie schnell zu einer SIEM-Lösung kommen, die einen entscheidenden Mehrwert aus dem Daten-Dschungel bietet um:
    •Kostspielige und aufwändige Installation zu vermeiden
    •Die hohe Anzahl an Alarmen und der damit verbundene Aufwand zu priorisieren
    •Angriffe und Aktivitäten in Ihrem Netzwerk sofort zu erkennen

    Ergänzen Sie Ihre bestehende SIEM-Lösung und steigern Sie damit deutlich das Cyber-Security-Niveau Ihrer Organisation.
  • M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs
    M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs David Grout, Directeur Technique, South EMEA Recorded: May 24 2018 60 mins
    Chaque année, les experts FireEye à travers les équipes Mandiant répondent à une grande variété d'incidents informatiques à travers le monde, ces attaques sont dans la plupart des cas orchestrées par des groupes d’attaquants avancés. Ce retour d’expérience, fruit d’heures d’analyses et d’investigations, est résumé dans le rapport annuel M-Trends qui d’années en années nous donne une visibilité sur le changement et l’évolution de la menace et des techniques utilisées lors des attaques mais aussi sur les progrès et les capacités que les entreprises mettent en place pour y répondre.

    Au cours de ce webinaire, notre Directeur Technique, David Grout, discutera de plusieurs sujets incluant :

    • Les tendances dans le paysage actuel des menaces et ces évolutions
    • Les principaux groupes APT ayant fait parler d’eux en 2017
    • Les risques de récurrence d’attaques
    • Mais aussi de sujets plus ouverts comme la recherche de talents et la complexité de recruter, les architectures ciblées et leurs faiblesses ou encore la préparation possible à travers des exercices de type Red Teaming.
  • Cryptocurrencies: Trends and Threats
    Cryptocurrencies: Trends and Threats David Grout, Technical Director for Southern Europe, FireEye Recorded: May 23 2018 41 mins
    Cyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. In recent years, criminals have gone beyond using cryptocurrencies as a payment method for illicit tools and services. Seeing their value and growing popularity, many actors are targeting cryptocurrency operations and exchanges with attacks such as malicious cryptocurrency mining, collection of cryptocurrency wallet credentials and extortion.

    Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
  • M-Trends 2018 Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen
    M-Trends 2018 Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen Ruediger Weyrauch, Director, Central Europe System Engineering Recorded: May 16 2018 59 mins
    Sicherheitsexperten in aller Welt stehen auch 2018 vor zahlreichen Herausforderungen. Viele Unwägbarkeiten, aber auch Chancen begleiten uns. Ein großes Thema dabei ist, dass es keine international verbindlichen Regeln für Operationen im Cyberspace gibt.
    In diesem Live-Webinar stellt Rüdiger Weyrauch, Director Central & Eastern European System Engineering, die neuesten Trends vor, die unsere aktuelle Bedrohungslandschaft definieren. Die Erkenntnisse und Schlussfolgerungen basieren auf Untersuchungen von Mandiant zu den einflussreichsten Cyber-Angriffen im vergangenen Jahr.

    Unsere Themen im Einzelnen:
    -Neue Advanced Persistent Threat (APT) Gruppen, die 2017 aufgetaucht sind
    -Der Anstieg von Cyber-Angriffen durch Bedrohungsakteure aus dem Iran
    -Ein detaillierter Einblick auf die Risiken durch das Remote Desktop Protokoll (RDP)
    -Incident Response Untersuchungen resultierend aus Sarbanes-Oxley (SOC) Audits
    -Die wachsende Lücke zwischen Cyber-Sicherheitsanforderungen und Fachkräften

    Melden Sie sich jetzt an. Wir freuen uns auf Sie!
  • M-Trends 2018: un report per capire l’evoluzione degli attacchi cyber
    M-Trends 2018: un report per capire l’evoluzione degli attacchi cyber Marco Rottigni, Sr Product Marketing Manager, EMEA Recorded: May 15 2018 48 mins
    Ogni anno i consulenti di Mandiant, una società FireEye, rispondono ad un gran numero di
    attacchi informatici sferrati da gruppi di hacker provenienti da tutto il mondo.
    Questi episodi sono sintetizzati nel rapporto annuale M-Trends, che analizza i cambiamenti nel panorama delle minacce informatiche.

    Durante il webinar, Marco Rottigni, Sr Product Marketing Manager, EMEA interverrà sui seguenti temi:

    -L'evoluzione del panorama attuale delle minacce
    -L'insorgenza di gruppi APT sempre più sofisticati e pericolosi
    -Quali organizzazioni hanno più probabilità di essere colpite dai pirati informatici
    -La carenza di personale qualificato e quanto questa influisca sulla sicurezza delle aziende
    -La correlazione tra sistemi di sicurezza deboli ed una maggiore esposizione al rischio
    -Le migliori prassi del Red Team per una protezione più efficace
  • [ARABIC] Understanding today's cyber attack trends in the MEA region
    [ARABIC] Understanding today's cyber attack trends in the MEA region Yazan A. Hammoudah, Manager, Systems Engineering, Middle East & Africa Recorded: May 9 2018 47 mins
    WEBINAR DELIVERED IN ARABIC

    FireEye announced the release of its annual M-Trends report which found that in 2017 attackers were present in EMEA organisations' networks a median of 175 days before being detected. This is an increase of almost 40 percent from the same measurement the year before which stood at 106 days.
    The report is based on information gathered during investigations conducted by FireEye's security analysts in 2017 and uncovers emerging trends and tactics that threat actors used to compromise organisations.
    For more information, join us in the upcoming webinar.
  • M-Trends 2018 - Understanding Today's Cyber Attack Trends
    M-Trends 2018 - Understanding Today's Cyber Attack Trends Stuart McKenzie, VP, Mandiant Consulting Recorded: May 2 2018 45 mins
    Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarised in the annual M-Trends report, which explores changes in the cyber threat landscape.

    During this webinar, our Vice President Stuart McKenzie will discuss:

    - Longer-term trends in today's threat landscape
    - Sophisticated and harmful APT groups to look out for
    - Which organisations are most likely to be retargeted by attackers
    - The difficulty of finding skilled personnel and how it affects the security function
    - How weaknesses in security fundamentals contributed to successful compromises
    - Best practice red teaming tactics for improved security defense
  • [Panel] Building Effective Cyber Defense
    [Panel] Building Effective Cyber Defense Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall) Recorded: Apr 25 2018 58 mins
    With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Why breach prevention matters
    - True costs of breaches
    - Technological solutions to consider for a more cyber resilient enterprise
    - How AI/machine learning and human talent can work together
    - Top threats to look out for in 2018

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Simon Moor, VP for Northern Europe, FireEye
    - Bob Honour, EMEA Marketing Director, SonicWall
  • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
    [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority FireEye EMEA Recorded: Apr 24 2018 63 mins
    Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

    Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

    Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

    ----------------------------
    "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."

    - KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE

    "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
    - PWC Global State of Info Security Survey, 2015
  • [Arabic] How FireEye Helix can deliver advanced capabilities to your org
    [Arabic] How FireEye Helix can deliver advanced capabilities to your org Yazan Hammoudah, SE Manager, MEA, FireEye Recorded: Apr 3 2018 58 mins
    DELIVERED IN ARABIC

    Most organizations have invested lots of money and resources into various security tools. The end result is an array of point products from different vendors that often don't work well together. FireEye Helix can help unify these existing investments while providing customers the ability to analyze and respond to alerts through a single centralized platform.
    With Helix, you get FireEye's top of the line MVX detection capabilities paired with industry leading iSight intelligence. The result is high fidelity, contextual alerts, and the ability to shift from detection to remediation immediately-both on the network and on the endpoint. You will be able to resolve attacks quickly and effectively and minimize any impact. At the end, you will see a demo of how Helix identifies and responds to an alert.

Embed in website or blog