Hi [[ session.user.profile.firstName ]]

FireEye EMEA

  • Date
  • Rating
  • Views
  • The BIG Cyber Security Skills Gap
    The BIG Cyber Security Skills Gap Alistair E. Macrae, Systems Engineer, FireEye Recorded: Oct 11 2018 48 mins
    Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.

    During this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
  • Privacy & Security in the Age of IoT
    Privacy & Security in the Age of IoT Elena Elkina (Aleada Consulting ) | Parnian Najafi Borazjani (FireEye) | Ondrej Krehel (LIFARS) | John Bambenek (ThreatSTOP) Recorded: Oct 2 2018 61 mins
    This webinar is part of BrightTALK's Privacy Insights Series and National Cyber Security Awareness Month (NCSAM).

    With the proliferation of the Internet of Things into every sphere of our lives, it's now more important than ever to understand the security and privacy risks associated with connected devices. With smart home devices, office tools, children's toys, even medical devices being vulnerable to cyber attacks, becoming cyber aware should be a key priority for everyone.

    Join privacy and cyber security experts for an interactive panel roundtable discussion on:
    - The privacy and security vulnerabilities and risks stemming from IoT devices
    - The basic safety measures you can deploy to protect your home and workplace against cyber threats
    - Best practices for privacy and security safeguards
    - What to do in the event of a breach
    - What the future of privacy looks like

    Speakers:
    - Elena Elkina, Partner at Aleada Consulting
    - Parnian Najafi Borazjani, Senior Analyst, FireEye
    - Ondrej Krehel, Digital Forensics Lead, CEO & Founder, LIFARS
    - John Bambenek, VP Security Research & Intelligence, ThreatSTOP

    Audience members are encouraged to send questions to the speakers to be answered during the live session.
  • Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten
    Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten Florian Siebert, Senior Systems Engineer, Global Services & Intelligence Recorded: Sep 25 2018 35 mins
    FireEye Managed Defense greift auf langjährige Erfahrung aus unseren Mandiant Incident Response Einsätzen zurück: wir nutzen die Daten und Erkenntnisse aus der Abwehr realer Angriffe, um Bedrohungen schneller zu erkennen und abzuwehren. Dadurch können wir Ihnen einen unternehmensweiten Überblick von Bedrohungen in Ihrem Netzwerk in Echtzeit geben und die Fähigkeit Ihres bestehendes CERT, Security Operation Center oder Sicherheitsteams ergänzen oder erweitern.
  • Trends in Data Breaches and Comprehensive Response
    Trends in Data Breaches and Comprehensive Response Michelle Drolet (Towerwall) | Dave Klein (GuardiCore) | Matthias Maier (Splunk) | Mike Trevett (FireEye) Recorded: Sep 19 2018 63 mins
    Does your organization have a data breach response plan? Discover the best practices for breach response and how to strengthen your organization's cyber resilience.

    Join this interactive Q&A panel with top security experts as they discuss:
    - The latest trends in data breach protection
    - Who's most at risk
    - How to detect breaches faster
    - What to do and not to do when it comes to breach response
    - Recommendations for CISOs for improving security

    Speakers:
    - Michelle Drolet, CEO, Towerwall
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Matthias Maier, Technical Evangelist, Splunk
    - Mike Trevett, Director, UK&I, FireEye
  • Keeping Up with Advanced Attackers: Understanding Threats and Adapting Defences
    Keeping Up with Advanced Attackers: Understanding Threats and Adapting Defences Alister Shepherd, Mandiant Director, EMEA Recorded: Sep 18 2018 42 mins
    An organization suffering a breach is no longer a question of "if," but "when" and "how big." Attackers are becoming more sophisticated in exploiting vulnerabilities, acquiring hacking tools on the dark web and leveraging automation, making traditional defense strategies antiquated and obsolete.

    Join Alister Shepherd, our Mandiant Director for EMEA, for insights into:
    - Recent APT intrusion activity from different regional threat actors,
    - Current attack techniques that have been successful during these intrusions,
    - Detections and investigations conducted by Mandiant,
    - Lessons learned for defenders.
  • Executive Panel | Financial Services: Cyber Threats on the Horizon
    Executive Panel | Financial Services: Cyber Threats on the Horizon Kevin Taylor, EMEA VP; Sandra Joyce, VP, Global Intel Operations; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP Recorded: Aug 14 2018 25 mins
    Cyber threats plague the financial services industry:
    • Advanced persistent threat (APT) actors seek to support economic reforms and reach state goals
    • Financial threat actors seek financial gain through the direct theft of funds or the sale of stolen information
    • Disruptive threat actors and hacktivists seek to gain publicity, divert banks' attentions, or demonstrate a political motive

    Any one of these threats would increase activity in an industry, but the presence of all three likely accounts for the large number of intrusions in financial services organizations.

    Join us for a live video panel and get executive insights for critical topics relevant to the financial services industry, including the:
    • Nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs)
    • Ripple effect consequences of geopolitics
    • Cost of a breach and importance of risk awareness in the boardroom
    • Need to keep GDPR a high priority
  • Video Interview | How to Build a Robust Threat Intel Function
    Video Interview | How to Build a Robust Threat Intel Function Sandra Joyce, VP, Global Intelligence; Igors Konovalovs, Director, iSIGHT Intelligence, EMEA Recorded: Jul 25 2018 18 mins
    Cyber threat intelligence is an essential weapon for detecting and preventing advanced attacks from well-funded attackers with specific agendas and targets.
    The adoption of Cyber Threat Intelligence (CTI) is increasing across organizations like yours—adding value to all segments of security operations and the business.

    CISOs often face serious challenges communicating information security issues to business managers, top executives and boards of directors. CTI provides information that can put a face on adversaries and translate cyber threats into business risks, using terms that are meaningful to non-technical executives.

    Watch this interview with Sandra Joyce, head of global threat intel, and Igors Konovalovs, Director for iSIGHT Intelligence EMEA, as they answer some of the most practical and pressing questions about cyber threat intelligence.
  • [VIDEO PANEL] Cyber Security in Europe: An Executive Perspective
    [VIDEO PANEL] Cyber Security in Europe: An Executive Perspective Kevin Taylor, EMEA VP; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP; Richard Weaver, Data Privacy Officer Recorded: Jul 18 2018 38 mins
    Cyber breaches are inevitable because attackers constantly change their tools, techniques and procedures (TTPs). Everyone is affected in different ways, whether from compromised systems or supply chains to the financial implications of non-compliance and breach notification.

    Join us for a live video panel on trending topics in cyber security:
    -Breach notification sources, dwell time and industries mostly likely to be compromised and retargeted by attackers
    -Importance of understanding cyber attackers and their motives
    -Red teaming to improve security effectiveness
    -Cyber security skills gap
    -Direct and indirect costs of a breach
    -Requirements, processes and policies to handle the GDPR
  • Incident Remediation: Could this have been prevented?
    Incident Remediation: Could this have been prevented? Manfred Erjak, Consultant, Professional Services Recorded: Jul 17 2018 31 mins
    Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.

    During this webinar, we will discuss:
    - How to best remediate from such an event;
    - The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
    - Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers

    Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
  • You're compromised: How do you respond?
    You're compromised: How do you respond? Jeroen Herlaar, Regional Director, Mandiant Recorded: Jul 10 2018 34 mins
    Second part of our 'Breach Response Preparedness Series’, a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Statistics (from M-Trends 2018) show that the median dwell time (time between initial intrusion, and detection) for EMEA organisations in 2017 was 175 days. A 175 days roaming free inside the victim’s infrastructure; a large portion of which likely would have been with administrator privileges, thereby having the keys to the kingdom. To be able to respond to such breaches effectively and efficiently, Mandiant applies a structured approach, relying on its scalable technology platform, and threat intelligence collected over the last 14 years.

    Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to discuss the Mandiant incident response approach, and why it matters to your organisation if you are confronted with a serious compromise.

Embed in website or blog