Elena Elkina (Aleada Consulting ) | Parnian Najafi Borazjani (FireEye) | Ondrej Krehel (LIFARS) | John Bambenek (ThreatSTOP)
This webinar is part of BrightTALK's Privacy Insights Series and National Cyber Security Awareness Month (NCSAM).
With the proliferation of the Internet of Things into every sphere of our lives, it's now more important than ever to understand the security and privacy risks associated with connected devices. With smart home devices, office tools, children's toys, even medical devices being vulnerable to cyber attacks, becoming cyber aware should be a key priority for everyone.
Join privacy and cyber security experts for an interactive panel roundtable discussion on:
- The privacy and security vulnerabilities and risks stemming from IoT devices
- The basic safety measures you can deploy to protect your home and workplace against cyber threats
- Best practices for privacy and security safeguards
- What to do in the event of a breach
- What the future of privacy looks like
- Elena Elkina, Partner at Aleada Consulting
- Parnian Najafi Borazjani, Senior Analyst, FireEye
- Ondrej Krehel, Digital Forensics Lead, CEO & Founder, LIFARS
- John Bambenek, VP Security Research & Intelligence, ThreatSTOP
Audience members are encouraged to send questions to the speakers to be answered during the live session.
Cyber breaches that result in data loss are often accompanied by heavy costs—some costs are obvious, while others are unexpected. Attacks not only places a financial strain on organizations, but can also hinder their ability to conduct normal business operations, which affects sales transactions and market reputations.
Join Jon Horner, Senior Consultant, Mandiant FireEye with featured speaker, Eric Packel, Partner, BakerHostetler, as they break down the costs of a breach, detail each cost, and explain how to estimate the business impact of each line item. After this session, you’ll be able to educate your leaders on:
• Common costs of a breach, which involve number of records affected, remediation efforts, revenue loss and reputational backlash
• Processes to estimate each type of cost
• Risk mitigation activities to help reduce future costs
You can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot.
Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks:
• What psychological authentication involves
• How attackers prey on recipients’ imagination and emotions
• How impersonation attacks are evolving
• What is in the future for impersonation
• How threat intelligence and the speed of email security impact cyber risk
Many modern cyber attacks routinely bypass firewalls and other perimeter defenses, leaving security professionals to play “whack-a-mole,” beating down threats as quickly and efficiently as they can. A network forensics strategy can give security professionals visibility into network traffic, and allow them to quickly find the threats hiding in their network.
Join Bill Cantrell, Vice President of Network Product Management at FireEye, to get insight that will help you:
• Understand the benefits of a network forensics strategy
• Leverage network forensics to improve security and increase traffic visibility
• Gain insights into how network forensics improves incident response times and reduces risk of loss
• See how network forensics enables retrospective threat hunting
Date and Time: Thursday, June 28, 2018 at 8:00 a.m. PT/ 11:00 a.m. ET
The email threat landscape is changing. Impersonation attacks and malicious URLs are becoming more popular.
This FireEye webinar features Ken Bagnall, VP Email Security, FireEye and Levi Lloyd, Senior Manager, Detection Services, FireEye who will address changes in email attack tactics:
• How phishing and impersonation attacks are evolving.
• How online/email scams develop.
• What the future of impersonation is.
• What has the best chance of winning against these attacks.
• What techniques are used to detect and stop phishing and impersonation attacks.
Attendees will receive the new FireEye report Changes in Email Attack
Tactics: Based on Data from July to December of 2017.
How Government Agencies are Facing Cyber Security Challenges, Presented by FireEye
Cyber threats continue to have an outsized impact on government agency operations, which can erode public trust and reduces the ability to deliver critical mission functions. But things are about to change.
Join Andrew Del Rosario, Principal Consultant and featured speaker, Ron Bushar, VP and Government CTO, as they share what common cyber security challenges government agencies face, and how they are moving forward to secure sensitive information and protect vital infrastructure with:
• Proactive cyber threat hunting and analytics
• Increased use and sharing of cyber intelligence data
• Automation and orchestration of security operations
Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.
Additionally as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.
Join Michelle Cantos, Strategic Intelligence Analyst, for the final episode of our three-part series on AI as we discuss the:
• Changing geopolitical landscape as threat actors develop and implement AI capabilities
• Use of AI applications in businesses and associated vulnerabilities
Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.
During this webinar, Managing Director Chris Nutt and Vice President Russell Teague will discuss:
- Longer-term trends in today's threat landscape
- Sophisticated and harmful APT groups to look out for
- Which organizations are most likely to be retargeted by attackers
- The difficulty of finding skilled personnel and how it affects the security function
- How weaknesses in security fundamentals contributed to successful compromises
- Best practice red teaming tactics for improved security defense
Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense.
On April 19, join Michelle Cantos, Strategic Intelligence Analyst and Awalin N. Sopan, Engineer, Analysis Platform, for the second installation of our three-part webinar series on AI that covers:
• How AI technology can enhance a businesses’ defensive capabilities
• How cyber threats can use AI to improve the sophistication and scope of their attacks
• How FireEye uses machine learning to bolster its internal defenses and tools
Don’t miss part one of the three-part series “Artificial Intelligence in Cyber Warfare: A Primer” - https://www.brighttalk.com/webcast/7451/305191 and part three, "AI and the Future of Cyber Conflict" - https://www.brighttalk.com/webcast/7451/313149
Artificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.
Join Michelle Cantos, Strategic Intelligence Analyst, for the first installation of our three-part webinar series to:
• Understand the fundamentals of AI, the differences between various techniques used to process data and the drawbacks to each approach.
• Discuss how AI tools can be used for offensive and defensive purposes in the cyber domain.
• Survey the future threat landscape and provide geopolitical context regarding how nations (U.S., Canada, Russia, China) will use AI tools given their current levels of technological development and AI integration in civilian applications.
Be sure to register for part two of the three-part series “The Role of Artificial Intelligence in the Cyber Domain” - https://www.brighttalk.com/webcast/7451/307729
"It’s no longer a case of ‘if you will be breached’, but instead how you’ll respond to and remediate the situation ‘once you are breached." – Kevin Mandia, CEO, FireEye
The FireEye 2017 M-Trends report indicates the average global dwell time of an attacker within a targeted environment is 99 days. This gives adversaries over three months to roam your network and steal sensitive data—before a breach is even detected.
Cyber security and incident response (IR) readiness is an evolving responsibility that has become a strategic priority for enterprises worldwide.
Given today’s cyber landscape, all C-suite leaders have an important role to play in their organization’s cyber security posture and IR plan. Their individual and departmental contributions must help protect vital assets, safeguard privacy and ensure uninterrupted operations.
Join the conversation as Troy Scavella, Principal Consultant of Mandiant, a FireEye company, talk to executives about:
• The current state of C-suite IR involvement, and how and why their status is evolving
• A best practice phased approach of executive contributions to be made before, during and after a breach
• Actionable tips for executives to apply and enforce across each phase of the IR process
• Protection of critical assets with IR preparation and improvement