Hi [[ session.user.profile.firstName ]]

FireEye Intelligence-Led Security

  • Date
  • Rating
  • Views
  • 10 Security Best Practices for Government Organizations
    10 Security Best Practices for Government Organizations Tony Cole, Vice President and Global Government Chief Technology Officer, FireEye Recorded: Apr 20 2017 53 mins
    Government networks, critical infrastructure and data are under a constant state of attack. The nature of these threats evolve on a daily basis. Hacktivists, nation states and cyber criminals push people, processes and technologies that make up Government cyber defenses to their breaking points.

    In this webinar, Tony Cole, Vice President and Global Government Chief Technology Officer at FireEye, will be sharing how to:

    -- Interpret and respond to trends in adversary capabilities and motivations.
    -- Integrate and apply cyber intelligence to reduce risk, cost and operational overhead.
    -- Improve readiness and response to minimize the impact of a breach.

    Learn how you can apply best practices in intelligence-led security into your defenses.
  • Containing the Career Impact of Cybercrime
    Containing the Career Impact of Cybercrime Chris Leach, Chief Technologist, HPE. Josh Goldfarb, VP & CTO - Emerging Technologies, FireEye. Recorded: Feb 23 2017 55 mins
    Cyber truths and CEOs
    Security industry experts say that the nature and complexity of today’s cyberattacks are beyond the scope of even the largest companies. We’ve seen the headline making news. Big brand companies once thought to be impenetrable, have fallen victim to targeted cyberattacks inflicting significant financial damages to their businesses.

    Financial fall out and executive reputation
    Such breaches are hitting corporations where it hurts the most: the bottom line. A prominent bank recently felt the staggering loss of $81 million resulting from a breach.

    Elevate and propagate
    Battling hackers, state actors, and sophisticated cybercrime organizations may seem like a never-ending, daunting task.

    Please join us as FireEye and HPE Chief Technology Officers reveal a five-point tactical plan to mitigate risk and keep your reputation intact.

    What you’ll learn:

    1.Creating a Risk Profile to assess your organization’s risk level.
    2.CEO engagement. Understanding the amount of time, resources and commitment needed to minimize threat exposure.
    3.Roles and investment. Guidelines for technology, personnel, and budget.
    4.Risks and ramifications. Pinpoint the gaps.
    5.Seek the advice of experts. Don’t stake your reputation by going it alone.

    See you online!

    The FireEye HPE team
  • Two-Factor, Too Furious: Subverting (and Protecting) Multi-factor Authentication
    Two-Factor, Too Furious: Subverting (and Protecting) Multi-factor Authentication Austin Baker, Sr. Consultant (Mandiant), Patrick Charbonneau, Consultant (Mandiant) Recorded: Jan 26 2017 42 mins
    Multi-Factor Authentication (MFA) is the standard for protecting sensitive systems and credentials. What once was limited to physical tokens and keycodes has expanded into digital tokens, phone applications, and password vaults, all in the effort to offer additional safeguards for critical access points like VPN connectivity and system administrator accounts.

    While MFA is now an industry-standard security practice, monitoring and protecting these implementations from exploitation is not widely practiced.

    Gathered from the trenches of both our Incident Responders and Red Teamers, here is a quick introduction to the problems faced with common MFA systems, the ways real-world attackers (e.g. APT28 & ATP29) and our Red Team have bypassed or subverted them, and some techniques your team can use to further protect the multi-factor keys to your kingdom.

    Register today to learn from our experts.
  • 2017 Cyber Security Predictions
    2017 Cyber Security Predictions Stuart McKenzie, VP of EMEA, Mandiant. Gerasimos Stellatos, Director, Mandiant. Recorded: Dec 15 2016 57 mins
    Major events of 2016 have created great uncertainty about the future, but in cyber security one thing is certain: Some attacks and crimes will continue and new challenges will emerge.

    What new developments in cyber security should you expect in 2017?
    Join us to hear from some of FireEye top experts about our predictions for 2017 which draw from our executive team, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. These insights include:

    •What investments in security organizations will make in 2017
    •Which industry or type of organization might unexpectedly become a target of threat groups in 2017
    •How threat groups will continue to target industrial control systems (ICS) in the near future
    •What the future hold for less security-mature regions in Asia Pacific and EMEA

    Register today to understand what lies ahead, so you can prepare to stay one step ahead of cyber security threats.
  • 2016 FireEye Government Forum featuring Virginia Governor Terry McAuliffe
    2016 FireEye Government Forum featuring Virginia Governor Terry McAuliffe Terry AcAuliffe, Govenor of Virginia Recorded: Dec 13 2016 21 mins
    Register today to watch this free encore presentation from the 2016 FireEye Government Forum featuring Virginia Governor Terry McAuliffe. Watch from the convenience of your computer as Governor McAuliffe discusses the importance of making cyber security a priority at the state and federal level, particularly as cyber attacks are on the increase.

    Additional topics discussed include:
    • What Virginia is doing to address the cyber skills gap, and fill job openings
    • Cyber challenges facing state and federal agencies
    • Steps Virginia has taken to increase its investment in cyber security
    • How and why he wants to make Virginia the cyber capital of America
  • The Rise of Security Orchestration:  Myths and Truths
    The Rise of Security Orchestration: Myths and Truths Paul Nguyen, VP of Orchestration & Integration, FireEye. Joseph Blankenship, Sr. Analyst, Forrester. Recorded: Dec 6 2016 50 mins
    Most security programs are understaffed and overwhelmed with alerts, often defined by processes that rely on manual intervention and containment. They must keep pace with attackers who have access to intellectual resources, computing power and the backbone of the fastest digital delivery networks.

    Security orchestration levels the battlefield by bringing together disparate technologies and incident handling processes into a single console and facilitates processes with automation. The goal is to improve response time, reduce risk exposure and maintain consistent security processes.

    Join this webinar with Paul Nguyen, VP of Orchestration and Integration at FireEye and guest speaker Joseph Blankenship of Forrester to learn what orchestration really is, how to use it, and how to recognize a quality orchestration solution. You’ll discover:

    •Why we are seeing a rise in security orchestration
    •Where the market is movingHow to get the most out of orchestration
    •Which orchestration capabilities are essential and which are differentiators
    •What drivers and functional capabilities will define the market
    •How to best evaluate and deploy orchestration solutions

    Register today for the latest on orchestration from FireEye and Forrester experts.

    The FireEye Team
  • Operationalizing Threat Intelligence
    Operationalizing Threat Intelligence Jeff Berg, Sr. Manager, Cyber Threat Intelligence Services, Mandiant Recorded: Nov 17 2016 51 mins
    In a rapidly evolving threat landscape with the realities of limited security program resources, it can be difficult for organizations to know what the most critical risks and exposures are, presently and looking forward. While most organizations recognize the importance of cyber threat intelligence (CTI), Mandiant consulting frequently finds organizations have limited capabilities to operationalize CTI throughout all aspects of their security program.

    A recent online poll conducted by FireEye about the operational use of CTI found that 84% of responders use threat intelligence for business decision-making. 67% use it to make decisions about resources and security tools while 17% said they use it for risk assessment on new business initiatives. 17% don’t use it at all.

    In this webinar, Jeff Berg, Senior Manager of Mandiant’s Cyber Threat Intelligence Services, discusses the role of intelligence in cyber security programs and steps organizations can take to transform security operations to be intelligence-led, so they can continuously adapt to the threat landscape, and ultimately infuse intelligence capabilities across the entire organization for informed decision making.
  • The Real World Value of Cyber Threat Intelligence
    The Real World Value of Cyber Threat Intelligence Laura Galante, Dir, Threat Intel Production/Analysis, FireEye. Jayce Nichols, Dir., Threat Intel Research, FireEye. Recorded: Nov 15 2016 57 mins
    Modern cyber attackers are sophisticated, well-funded, well-organized and use highly-targeted techniques that leave technology-only security strategies exposed. To identify and stop attackers, organizations need to understand how they think, how they work, and what they want. Why? Because today, the most serious data breaches and disruptions result from well-planned, complex attacks that target specific companies or industries. Bolster your defenses with a proactive, forward-looking approach to security. Join our live webcast, Tuesday, November 15 at 2:00pm ET to learn:

    -What cyber threat intelligence truly is and the benefits of being intelligence-led.
    -How to tailor threat intelligence to your unique security mission.
    -How FireEye iSIGHT’s 160 security experts around the globe mobilize to transform raw information into finished actionable intelligence.

    Hunt advanced, tiered attacks lying in wait within your systems. Prioritize the most relevant threats amidst 1,000s of daily security alerts. Join us live and discover how savvy organizations operationalize intelligence up and down the organization to preempt attack, inform strategy and more.

    Register today.
  • Why Today’s Changing Threat Landscape Requires Agile Security
    Why Today’s Changing Threat Landscape Requires Agile Security Rajiv Raghunarayan, Sr. Director, Product Marketing, FireEye. Robert Westervelt, Research Manager, IDC. Recorded: Nov 9 2016 60 mins
    Advanced threats continue to grow in severity, complexity and reach as threat actors expand their attacks to hit soft targets. Adding to this, as business workloads move to the cloud, and as shadow IT continues to proliferate, unforeseen security gaps expose new vectors for exploit and abuse.

    Attacks are not just targeting the core of a network, nor are they limited to just large scale enterprises. More and more, threat actors are aiming at vulnerable endpoints, distributed network environments and porous perimeter defenses. To combat this, security solutions need to be as agile as today’s threat actors.

    In this webinar, we will discuss the changing threat landscape and how today’s threat actors and advanced malware are impacting businesses of all sizes and types. Additionally, we will examine new security solutions and deployment models that provide agility, flexibility and widespread protective reach that scales and grows with IT and security needs.
  • 10 Components for Proactive Cyber Security
    10 Components for Proactive Cyber Security Tim Appleby, Sr. Manager, Security Program Assessments, Mandiant Consulting. Recorded: Oct 26 2016 59 mins
    Cybersecurity awareness is growing as more organizations learn they are vulnerable to an attack. While compliance with regulatory and security audit requirements provides a starting point, it alone will not keep the organization safe. An effective security program needs to be multifaceted, integrating people, processes and technologies across all layers of the organization. The specifics vary due to industry, size and geographic presence, as well the level of risk the organization is willing to accept.

    Mandiant Sr. Manager Tim Appleby will discuss the benefits of proactive preparedness and 10 key areas that should be considered in order to form a holistic security program, and discuss how priorities can vary based on industry, size and geography.

    As usual, we'll leave plenty of time for Q&A.

Embed in website or blog