Hi [[ session.user.profile.firstName ]]

FireEye EMEA

  • Date
  • Rating
  • Views
  • [Panel] Defending Against the Evolving Cyber Threat Landscape in 2018
    [Panel] Defending Against the Evolving Cyber Threat Landscape in 2018 Amar Singh, Cyber Management Alliance | Stuart Davis, Mandiant | Ed Tucker, DPG | Dharminder Debisarun, Palo Alto Networks Recorded: Nov 15 2017 60 mins
    2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.

    This interactive Q&A panel will discuss:
    - The trends shaping the cyber threat landscape in 2018
    - Lessons from the biggest cyber events of the year
    - Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
    - The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams

    Speakers:
    - Amar Singh, Cyber Management Alliance
    - Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
    - Edward Tucker, CIO, DP Governance
    - Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
  • 2017 - An active year for APT groups
    2017 - An active year for APT groups David Grout, Director, Southern Europe Systems Engineering, FireEye Recorded: Nov 14 2017 49 mins
    From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyber attacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organization.
    2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyber attacks.

    Join us for a live webinar as we discuss:
    - The most severe cybercriminal activities of 2017
    - The motivations, approaches and TTPs of the threat groups behind these attacks
    - Insights into APT10, APT32 & APT33
  • 2017- Une année déjà active pour les groupes APT
    2017- Une année déjà active pour les groupes APT David Grout, Director, Southern Europe Systems Engineering, FireEye Recorded: Oct 26 2017 49 mins
    2017 est d’ores et déjà une des années les plus prolifiques en ce qui concerne l’activité des groupes APT. On a en effet depuis le début de l’année plusieurs exemples d’attaques majeures, d’extorsions ou de tentatives d’influences relayées dans la presse.

    Prenons une pause et regardons plus attentivement les TTPs de ces groupes, les techniques Outils et procédures qu’ils utilisent.

    Pendant 45mn nous regarderons dans le détails leurs motivations, leurs approches et nous en définirons les moyens possibles à mettre en place pour limiter voire éviter leur attaques.

    Nous couvrirons plusieurs domaines incluant les groupes sponsorisés par des états avec des volontés de prises d’avantages économiques voir de destructions de l’adversaire comme APT32 ou 33. Nous étudierons aussi les groupe jouant d’influence géopolitique et de fake news comme APT28 ou 29 et nous finirons sur le cyber espionnage (APT10) et les cybers criminels spécialisés dans l’extorsions de fond.
  • Simplify Threat Response Through Integration & Automation
    Simplify Threat Response Through Integration & Automation Anthony Leigh, Systems Engineer, FireEye Recorded: Oct 25 2017 39 mins
    FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.

    In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
  • Endpoint Security: No longer taking a back seat!
    Endpoint Security: No longer taking a back seat! Remon Verkerk, Systems Engineer, FireEye Recorded: Oct 25 2017 57 mins
    Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:

    - Is there command and control activity?
    - Did lateral movement occur?
    - What other systems were accessed?
    - Et cetera…

    This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.

    After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.



    -----------------------------------------------------------------------------------------------------------
    Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud"
    The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" David Grout, Director, Southern Europe Systems Engineering, FireEye Recorded: Oct 24 2017 49 mins
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Best Practices for Enterprise Cyber Intelligence Operations
    Best Practices for Enterprise Cyber Intelligence Operations Igors Konovalovs, Director, FireEye iSIGHT Intelligence Recorded: Oct 24 2017 48 mins
    Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.

    This webinar explains:

    · Why do organisations require Cyber threat intelligence?
    o To aid technical and business decision making
    o To identify and manage risks
    o To efficiently deploy capital against the threats that matter to enterprise

    · The key requirements for establishing a cyber threat intelligence function
    · Basic cyber threat intelligence workflows
    · Resource and training requirements to support a Cyber Threat intelligence function
  • The Cost of Building a Threat Hunting Team in Your SOC
    The Cost of Building a Threat Hunting Team in Your SOC Stuart Davis, Director, Mandiant Recorded: Oct 24 2017 60 mins
    At this point your SOC is effectively covering SIEM, IDP, Vulnerability Management and a number of other areas.
    However, the next phase of maturity is to build the APT Threat Hunting capability.

    Join us for a short webinar to discuss the costs of building a hunting team versus buying it.
  • APT33: Panoramica FireEye sulle attività cyber iraniane
    APT33: Panoramica FireEye sulle attività cyber iraniane Gabriele Zanoni, Systems Engineer, FireEye Recorded: Oct 11 2017 49 mins
    Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
    Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
    Registrati al webinar per saperne di più!
  • APT33: New Insights into Iranian Cyber Espionage Group
    APT33: New Insights into Iranian Cyber Espionage Group Stuart Davis, Director, Mandiant; Nick Carr, Senior Manager, TORE Detection & Analysis Recorded: Sep 21 2017 49 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2013. 
     
    Join us in a live webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
     
    Register today to gain deeper insights into this threat group!

Embed in website or blog