Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant
Many organizations struggle with how to prioritize hardening and protective security actions.
Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.
Join our webinar, where Mandiant incident response experts Nick Bennet and Matt McWhirt will discuss the following topics:
• Five technical categories to consider when implementing preventative security
• Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
• Common pitfalls in evidence destruction, investigation techniques and remediation timing
• Recommendations for enabling effective remediation and the power of operational playbooks
Register today to learn how to better handle your organization’s next security incident.
Matt Shelton - Director of Technology Risk and Threat IntelligenceRecorded: May 2 201956 mins
There is no doubt that insider threats pose a significant risk to organizations and government agencies, as they can compromise sensitive and confidential data. Any accidental or malicious act by an employee can potentially lead to catastrophic incidents that threaten an organization’s security and reputation. The ability to identify, combat and protect against insider threats is critical to your organization’s security posture.
Join FireEye’s Matt Shelton, Director of Technology Risk and Threat Intelligence as he discusses how organizations must stay vigilant against external threats while keeping a keen eye on the risk that insider threats pose.
Matt will also address:
•What an insider threat looks like to your organization
•What assets and systems are targeted by inside threat actors
•Steps to secure your organization against these threats
Alexa King, EVP & General Counsel, FireEye; Karen Kukoda, Sr. Strategic Alliance Director, FireEyeRecorded: May 1 201918 mins
Long gone are the days when a single individual or team – whether IT not – would oversee cyber security at an enterprise. Savvy business leaders know that security is the responsibility of everyone, from the entry-level staffer on up to the board, and that a knowledgeable and prepared executive team can mean the difference between a minor incident and a major breach.
One of the most important decision-makers when it comes to cyber security is the General Counsel (GC). No one knows this better than Alexa King, EVP and General Counsel at FireEye. In this video, Alexa sits down with Karen Kukoda, FireEye Senior Director of Strategic Alliances, to discuss not only the role the GC plays in cyber security, but also the duties of the board of directors in overseeing cyber security.
Watch the video to learn about all of this and more:
-How cyber risk has evolved and how we need to start thinking about it
-Preventative measures GC should take and how they can educate their teams
-Incident response planning and preparedness
-How to include cyber risk partners to complement your team’s security strategy
Fred Plan, Sr. Threat Intel Analyst, FireEyeRecorded: Apr 18 201958 mins
FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.
The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.
In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:
• A high-level overview on how nation-state interests are driving APT activity
• Insight into the most recent APT groups investigated by FireEye
• The latest adversary tactics, techniques and procedures (TTPs) these groups use
Christopher Porter, Chief Intelligence Strategist, FireEye & Darrell Keeling, VP IT, PVHRecorded: Apr 16 201953 mins
Code Triage: Why Healthcare is Facing More Cyber Attacks and How to Protect Your Organization
Healthcare organizations face a number of unique security concerns, including the increasingly interconnected systems between doctors’ offices, hospitals, insurance companies, suppliers, etc. As such, healthcare is being targeted by multiple types of attackers: nuisance attackers (such as the creators of commodity malware), advanced persistent threat (APT) attackers, and cyber criminals. To battle such attackers, healthcare security teams need to understand:
-Why healthcare is at risk / what threat actors are seeking / how they are doing it
-Why email is the #1 threat vector in Healthcare and how to defend against it
-Best practices and action items for a more robust security program
Ron Bushar, Vice President & CTO - Government SolutionsRecorded: Mar 19 201959 mins
As departments and agencies move business operations to the cloud, protecting assets and data remains top priority. Identifying the steps and actions needed to structure, develop, and implement effective security controls in this new environment is the critical first step.
Where should you start? How do you prioritize activities? How can you leverage existing IT programs, processes, and policies that are already in place?
Join FireEye’s Ron Bushar, Vice President & CTO - Government Solutions, as he shares steps and best practices to building a cloud assurance program, including:
- Identifying roles and responsibilities of government, service provider, and third-party stakeholders
- Adapting existing data classification scheme for cloud services and establishing a cloud-adapted risk assessment process
- Implementing requirements baselines, risk assessments, and approaches to addressing unique risk scenarios
- Selecting a cloud service delivery and deployment model
Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEyeRecorded: Mar 19 201950 mins
FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:
-Get a brief overview on the latest email threat trends
-Learn about the must haves for email security solutions and the benefits of having one provider
-Find out about additional email security capabilities that can help you have an adaptable solution
-Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye MandiantRecorded: Mar 14 201958 mins
Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.
Join us for this webinar, as experts, Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant discuss highlights and case studies from this year’s edition, including:
• Evolving attack trends in today’s threat landscape
• New advanced persistent threat (APT) groups that emerged in 2018
• Hidden risks found across M&A business activities
• Best practices lessons learned from the front lines of incident response
Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEyeRecorded: Mar 11 201920 mins
Front and Center with Today’s Leading Cyber Security Experts
FireEye Chat is a new quarterly talk show that brings guest experts front and center to cover today’s most important cybersecurity topics.
Episode #1: Front and Center with Kevin Mandia and the Evolution of M-Trends
Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it. They also cover:
• Key milestones in the evolution of the report
• How M-Trends has raised awareness about the importance of cyber security
• The most significant trends in today’s cyber threat landscape.
Watch now to get unique insights, direct from the frontlines, in what promises to be a series of lively and thought-provoking exchanges.
Alistair E. Macrae, Systems Engineer, FireEyeRecorded: Mar 8 201948 mins
Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organizations face in recruiting and retaining skilled cyber professionals.
During this webinar we will discuss the benefits and challenges of in-house vs. outsourcing of cyber security operations, and how this has been affected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
Sushila Nair (NTT Data Services), Liz Goldberg (SAS), Ken Bagnall (FireEye), Joseph Carson (Thycotic)Recorded: Mar 7 201946 mins
"As cyber threats continue to grow, cyber vigilance is more critical than ever. How are CISOs and their security teams addressing the threat of cyber attacks like phishing, IoT-powered DDoS attacks, crippling ransomware or other attacks? How prepared are today's businesses to detect an attacker or launch the appropriate response?
Join top security leader and experts as they discuss:
- Top 5 cyber threats businesses face today
- Notable cyber attack methods and strategies and how to protect against them
- Solutions for network visibility, breach detection and response
- Recommendations for improving security and steps to take today"