Hi [[ session.user.profile.firstName ]]

FireEye Intelligence-Led Security

  • Date
  • Rating
  • Views
  • Security Predictions for 2018
    Security Predictions for 2018 Luke McNamara, Senior Analyst, Strategic Team, FireEye iSIGHT Intelligence Recorded: Dec 12 2017 51 mins
    As the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Not many things are absolute in the security industry, but we know for certain that threat actors will continue to attack and defenders will be tasked with stopping them.

    Join Luke McNamara, Senior Analyst at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail:

    •What types of nation-state activity we will be seeing
    •What new regulations such as GDPR mean for organizations
    •How to ensure a secure environment as more organizations migrate to the cloud

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Cyber Defense Lessons Learned in 2017 for a More Secure 2018
    Cyber Defense Lessons Learned in 2017 for a More Secure 2018 Jeff Groman, Mandiant Senior Manager & Chris Porter, Chief Intelligence Strategist Recorded: Nov 14 2017 58 mins
    Cyber security attackers become more innovative each year with threat activities progressing on a global scale. Coverage of cyber attacks by major media outlets continues to rise year after year, and 2017 seems to have done nothing to buck that trend.

    In the last 12 months, we’ve seen reports of compromises at government entities, cable companies, automobile manufacturers, law firms, insurers, delivery companies, and more. Looking back at these headlines leaves us asking two questions above all: What didn’t work in cyber defense in 2017 and what can be done to be better prepared for future attacks?

    We will address those questions and many others during our webinar, “Cyber Defense Lessons Learned in 2017 for a More Secure 2018,” presented by Jeff Groman, Mandiant Senior Manager and Chris Porter, Chief Intelligence Strategist. Tune in to learn about:

    • The more disruptive opportunistic attacks in 2017
    • More advanced and increasingly frequent attacks being carried out by nation-states

    It wouldn’t be a proper discussion if we didn’t also cover the lessons learned from these successful attacks so that organizations will be better prepared in the future.
  • Emerging Global Cyber Threats
    Emerging Global Cyber Threats John Hultquist, Director, Analysis, GSI, FireEye, Inc. Recorded: Nov 2 2017 59 mins
    To properly establish your cyber defenses, you must know your opponent.

    Cyber attackers are constantly innovating; their threat activities continue to grow on a global scale. Regimes use advanced cyber capabilities to harass their foes, boost their finances and even subvert democracy.

    Cyber crime that affects businesses can be directly connected to geopolitical drivers such as the nuclear deal with Iran and sanctions for North Korean proliferation. Your organization needs to ensure that it adapts to the realities of the evolving threat landscape and business risks.

    Attend this webinar to see John Hultquist, Director of Intelligence Analysis at FireEye, offer:

    • An overview of emerging threats from around the world
    • Insights into the most impactful threats affecting your cyber security operations
    • Expert assessments and implications your organization should consider, provided by the FireEye Threat Intelligence Team


    Part two of a two-part series.

    Don’t miss part one: Cyber Threat Intelligence: Learn How It Drives World-Class Security

    Please visit: https://www2.fireeye.com/Webinar-How-CTI-Drives-World-Class-Security.html
  • Why Mid-Enterprises Must Go Beyond AV Products to Smarter Endpoint Security
    Why Mid-Enterprises Must Go Beyond AV Products to Smarter Endpoint Security Dan Reis, FireEye Director of Product Marketing, Endpoint Security Recorded: Nov 1 2017 41 mins
    High-profile data breaches of corporate giants make the headlines, but 77% of cyber-crime targets small and mid-size enterprises (SMEs). Experts predict this trend will only continue to rise.  Regardless of limited budgets and resources, you need to stay one step ahead of advanced attacks.
    FireEye Endpoint Security offers such a solution for the mid-enterprise. It combines investigation, threat intelligence and antivirus and anti-spam technologies in a single, affordable lightweight agent. 

    Join us on November 1st to learn more about:
    • What legacy AV technologies miss and how you might be at risk today
    • Why real-time, integrated threat intelligence is a critical component of any cyber strategy
    • How to streamline your approach and extend visibility into every endpoint that matters
    • Why you need to detect known and unknown threats targeting your business
  • Bridging the Gap Between the SOC and the Boardroom
    Bridging the Gap Between the SOC and the Boardroom Freud Alexandre, Enterprise Architect Security & Manager – City of New Orleans Recorded: Oct 26 2017 32 mins
    Bridging the Gap Between the SOC and the Boardroom: How to talk in a language your Chief Executive can understand.

    Most C-Suite occupants don’t speak security: Real-world examples will be used to demonstrate how to communicate in a manner that even the most technology averse executive can understand.

    Use of a common vocabulary helps executives fully comprehend the impact of risk, and the correlation between investment and risk mitigation (and to understand the implications of underfunding a security program).

    By paying close attention to the details, there are frequently key warning signs and patterns that can identified prior to a breach occurring – By addressing common disconnects, this presentation offers a guide to help bridge the gap between the SOC and the boardroom.

    Cyber threats continue to escalate in volume and sophistication – being able to eloquently articulate the risks and the necessary mitigation strategy is a critical skill for every security professional.

    The signs are all there but if you can’t deliver the message you might as well leave the front door open!
  • The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products
    The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products Jim Waggoner, Sr. Director, Product Management Recorded: Oct 26 2017 51 mins
    Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses.

    Join Jim Waggoner, Sr. Director, Product Management for FireEye, as he details:

    •Why endpoint security products have not provided complete protection
    •Capabilities required for a comprehensive endpoint protection solution
    oAV with threat intelligence
    oDetection and response
    oBehavior and exploit analysis
    oVisibility and automation
    •How the latest FireEye Endpoint Security solution enables you to go from detection to investigation and remediation quickly, all with a single agent

    Attend this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
  • How Was that Breach Detected?
    How Was that Breach Detected? Jeff Hamm, Technical Director, Mandiant Recorded: Oct 26 2017 57 mins
    Mandiant has done thousands of IR investigations across multiple industry types and networks. In each case, the customer was either altered by a third party about the breach or discovered something “not quite right” in the network. In several cases the alerts the customer discovered led to discovery of a targeted attacker in the environment - and a subsequent incident response investigation.

    In this presentation, we will use international case examples Mandiant investigated to take a closer look at how the breach was discovered and what security lessons can be learned from the alerts - for example how a performance monitor on a domain controller spiked, which led to discovery of credential harvesting. The take away will be actionable in many environments.
  • Intelligence-First: How Intelligence Enriches Security Consulting Services
    Intelligence-First: How Intelligence Enriches Security Consulting Services Jeff Berg, Sr. Manager, Cyber Threat Intelligence & Brad Bell, Mandiant Principal Consultant Recorded: Oct 25 2017 62 mins
    Join Jeff Berg, Sr. Manager of Cyber Threat Intelligence, and Brad Bell, Mandiant Principal Consultant, as they share the role of cyber threat intelligence in strategic security consulting services and why services based on compliance-based best practices and industry standards may not be an effective way to protect your organization against a rapidly evolving threat landscape.

    Key takeaways:

    • The role cyber threat intelligence plays in strategic security consulting services
    • Why services rooted in compliance-based best practices and industry standards aren’t effective
    • Case studies where different types of intelligence added value to service portfolio
  • GDPR – Being Prepared and Response-Ready
    GDPR – Being Prepared and Response-Ready Stuart McKenzie, Vice President, Mandiant Consulting & Dan Wire, Sr. Director, Marketing Communications Recorded: Oct 25 2017 54 mins
    The new European Global Data Protection Regulation (GDPR) requires businesses to report data breaches within 72 hours – how will you manage the process?

    This regulation applies to all organizations with employees and/or customers in the European Union.

    In a crisis, being organized and informed enough to provide an accurate notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with a mandatory incident response processes – identifying the cause, containing and remediating the vulnerability, and determining the extent of the damage, it makes the situation a lot more difficult and time sensitive.

    In this webinar we will tackle the importance of having an effective and actionable incident response plan, and how to develop a crisis communications strategy that minimizes the impact of a data breach.
  • Partner Session: A Gold Standard for Industrial Control System Security
    Partner Session: A Gold Standard for Industrial Control System Security Andrew Ginter, Vice President, Industrial Security, Waterfall Security Solutions & Gary Fisk, Solutions Architect, FireEye Recorded: Oct 25 2017 57 mins
    The first generation of Industrial Control System (ICS) cyber security advice looked to IT security best practices as their "gold standard," even though parts of IT security best practices were acknowledged as poor fits for the needs of ICS networks. The most recent ICS security standards and advice embrace the differences between IT and ICS networks, and document a gold standard for ICS cyber security that differs from IT best practices in important ways. This presentation reviews the evolution of ICS security best practices and explores how the new FireEye and Waterfall Security Solutions partnership is supporting and extending this evolution.

Embed in website or blog