Hi [[ session.user.profile.firstName ]]

FireEye Intelligence-Led Security

  • Date
  • Rating
  • Views
  • How to Develop and Implement an Effective Cloud Assurance Program for Government
    How to Develop and Implement an Effective Cloud Assurance Program for Government
    Ron Bushar, Vice President & CTO - Government Solutions Recorded: Mar 19 2019 59 mins
    As departments and agencies move business operations to the cloud, protecting assets and data remains top priority. Identifying the steps and actions needed to structure, develop, and implement effective security controls in this new environment is the critical first step.

    Where should you start? How do you prioritize activities? How can you leverage existing IT programs, processes, and policies that are already in place?

    Join FireEye’s Ron Bushar, Vice President & CTO - Government Solutions, as he shares steps and best practices to building a cloud assurance program, including:

    - Identifying roles and responsibilities of government, service provider, and third-party stakeholders
    - Adapting existing data classification scheme for cloud services and establishing a cloud-adapted risk assessment process
    - Implementing requirements baselines, risk assessments, and approaches to addressing unique risk scenarios
    - Selecting a cloud service delivery and deployment model
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • M-Trends 2019: Trends Behind Today's Cyber Attacks
    M-Trends 2019: Trends Behind Today's Cyber Attacks
    Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant Recorded: Mar 14 2019 58 mins
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    Join us for this webinar, as experts, Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Hidden risks found across M&A business activities
    • Best practices lessons learned from the front lines of incident response


    Register for the webinar NOW!
  • FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
    FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends
    Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEye Recorded: Mar 11 2019 20 mins
    FireEye Chat
    Front and Center with Today’s Leading Cyber Security Experts

    FireEye Chat is a new quarterly talk show that brings guest experts front and center to cover today’s most important cybersecurity topics.

    Episode #1: Front and Center with Kevin Mandia and the Evolution of M-Trends

    Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it. They also cover:
    • Key milestones in the evolution of the report
    • How M-Trends has raised awareness about the importance of cyber security
    • The most significant trends in today’s cyber threat landscape.

    Watch now to get unique insights, direct from the frontlines, in what promises to be a series of lively and thought-provoking exchanges.
  • The BIG Cyber Security Skills Gap
    The BIG Cyber Security Skills Gap
    Alistair E. Macrae, Systems Engineer, FireEye Recorded: Mar 8 2019 48 mins
    Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organizations face in recruiting and retaining skilled cyber professionals.

    During this webinar we will discuss the benefits and challenges of in-house vs. outsourcing of cyber security operations, and how this has been affected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
  • Defending Against Cyber Threats
    Defending Against Cyber Threats
    Sushila Nair (NTT Data Services), Liz Goldberg (SAS), Ken Bagnall (FireEye), Joseph Carson (Thycotic) Recorded: Mar 7 2019 46 mins
    "As cyber threats continue to grow, cyber vigilance is more critical than ever. How are CISOs and their security teams addressing the threat of cyber attacks like phishing, IoT-powered DDoS attacks, crippling ransomware or other attacks? How prepared are today's businesses to detect an attacker or launch the appropriate response?

    Join top security leader and experts as they discuss:
    - Top 5 cyber threats businesses face today
    - Notable cyber attack methods and strategies and how to protect against them
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today"
  • M-Trends 2019: Trends Behind Today’s Most Impactful Breaches and Cyber Attacks
    M-Trends 2019: Trends Behind Today’s Most Impactful Breaches and Cyber Attacks
    Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye & Rena Stern, Director, Product Marketing, Mandiant Recorded: Mar 6 2019 22 mins
    The cyber security landscape is constantly evolving, with attackers becoming more and more aggressive. Companies need to know what they’re up against to ensure they are fully prepared for when a breach occurs. Over the last decade, consultants from FireEye Mandiant have shared the latest cyber security investigations and trends from the front lines with the release of the annual M-Trends Report.

    Learn more about the latest developments from the newly launched M-Trends 2019 report. Get direct insight from Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye as he highlights some of the report’s most interesting and impactful findings.

    Discussion topics will include:
    - Which trends in the cybersecurity landscape should we be more mindful of than in previous years
    - New/emerging security technologies and solutions becoming more important
    - Innovative ways the industry is addressing the skills gap
    - Examples of attackers taking advantage of cloud-related weaknesses
  • MITRE ATT&CK Evaluation Framework Analysis
    MITRE ATT&CK Evaluation Framework Analysis
    David Grout, EMEA CTO, FireEye Recorded: Mar 6 2019 45 mins
    When EDR gives you Answers and not Alerts

    On February 13, MITRE released the results of its evaluation of FireEye Endpoint Security in a simulation of real-world attacks by APT3 (a Chinese government-backed adversary). Based on this evaluation and an independent scoring methodology, FireEye delivered the highest efficacy scores and the highest number of behavior-based detections and provided the most relevant contextual information about an attack.

    During this session, our EMEA CTO David Grout will present the MITRE Methodology and how to interpret it. We will discuss about metrics and capabilities highlighted during this process and how FireEye has been ranked the number #1 EDR in this test.
  • Top 5 Cloud Security Myths Debunked
    Top 5 Cloud Security Myths Debunked
    Martin Holste, CTO, FireEye Recorded: Feb 28 2019 56 mins
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar on Thursday, February 28, helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • The Best Way to Assess Incident Response Preparedness
    The Best Way to Assess Incident Response Preparedness
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant Recorded: Feb 21 2019 56 mins
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.

Embed in website or blog