FireEye Next-Generation Threat Protection

Channel profile:

The leading provider of next generation threat protection

FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Subscribers (8,991)
Tools of Engagement – Zero Dark 243 Days Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

In this case study we will cover:

• How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
• How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
• Best practices for investigating and responding to similar attacks.
Read more >
Apr 24 2014 6:00 pm
UTC
60 mins
Attend

Webinars and videos

  • Live and recorded (43)
  • Upcoming (1)
  • Date
  • Rating
  • Views
  • In case you did not know it, your SMB is a prime target for cybercriminals. Unfortunately, networks are routinely infiltrated by cybercriminals through blended attacks that exploit unknown vulnerabilities and steal valuable data. Compounding the problem, traditional security solutions were not designed to stop any of the five stages of an advanced targeted attack.

    Learn how new multi-vector virtual execution technology is able to protect your business against today’s blended attacks in this FireEye and Spiceworks webinar.
  • In 2013, FireEye Labs analyzed nearly 40,000 unique attacks—all of which bypassed traditional defenses. Find out what this tells us about the attacks taking place today and what this means for 2014 and beyond.

    Join a live webinar featuring a key author of the Advanced Threat Report 2013, and get an in-depth analysis of this year's findings.

    Why you should attend:

    •Learn the 10 most targeted countries and verticals. Discover how and where APTs were involved.
    •Understand the TTPs to watch for in 2014. Know which attack tools are on FireEye's watch list.
    •Get answers to your most pressing questions. Hear directly from FireEye Labs in an interactive Q&A.
  • With 70% of malware signatures only seen once, attackers are more sophisticated and evasive than ever before. They're at the top of their game, selecting their targets with precision, and moving with lightning speed to get what they want.

    Join us for this webinar with Richard Bejtlich, Chief Security Strategist at FireEye and learn key steps to developing a resilient security program.

    Why you should attend:

    • Know why your organization is at risk of an attack.
    • Learn 13 key points to consider when justifying security programs.
    • Understand how to start thinking strategically about security and the technology you implement.
  • On January 2, FireEye announced that it had acquired Mandiant, the leading provider of security incident response management solutions, creating a united front against cyber threats.

    In a live webinar with FireEye and Mandiant executives, learn why traditional security technologies are unable to address today's threat landscape and why complete, continuous threat protection requires real-time detection, contextual threat intelligence, and rapid incident response.

    Why you should attend:
    •Learn about the FireEye acquisition of Mandiant.
    •Understand today's threat landscape, including the damage being caused from new advanced techniques.
    •Discover how FireEye and Mandiant together stop advanced attacks at the earliest phases of the attack lifecycle.
  • Cyber attacks have changed dramatically over just a few years. Broad, scattershot attacks designed for mischief have been replaced by attacks that are advanced, targeted, stealthy, and persistent.

    A compelling new survey from the Center for Digital Government reveals the growing concern of the advanced persistent threat (APT) against government organizations.

    Join us with the Center for Digital Government for a live webinar to hear insightful survey findings and useful advice from your state and local government colleagues across the nation. Some of the conclusions will surprise you.

    - Understand government agencies' degree of cyber-preparedness.
    - Learn what steps one municipality took to protect critical assets.
    - Determine key strategies and tactics to strengthen your cyber posture.
  • In 2013, Chinese threat actors launched a cyber espionage campaign, called "Ke3chang," that compromised government ministries across Europe. But, as FireEye Labs uncovered, the attackers were active since at least 2010—using the same types of malware to target a wide range of industries.

    Join a live briefing on Operation Ke3chang, including how FireEye researchers were able to infiltrate a critical command-and-control (CnC) server, giving them a rare window into the attackers' techniques.

    Why you should attend:
    - Get Insight into the APT Campaign - Hear what FireEye discovered after gaining access to the CnC server.
    - Learn How the Campaign Evolved - See how the attacks have changed and unfolded over the years.
    - Understand the Tools and Techniques - Learn how the attackers were highly selective in their targets and careful to cover their tracks.
  • Even with a seemingly robust security posture, organizations are all too often exposed to breaches because traditional security defenses simply cannot detect today’s advanced attacks. Remediation is possible, but comes at a cost.

    Join Securosis Analyst Mike Rothman for a live webcast explaining how to respond to security incidents, model the costs of cyber attacks, and secure the right budget for a vigorous defense.

    Why you should attend:

    - Learn how to create a detailed process map and remediation plan.
    - Discover how costs can be modeled to assess the economic impact of attacks.
    - Get the budget you need by learning the hidden costs of doing nothing - and how to substantiate the ROI of advanced threat protection.
  • Over the last two years, a number of industries were hit by 11 different advanced persistent threat (APT) campaigns. At first pass, these campaigns appeared unrelated—but further investigation by the FireEye Labs research team revealed an eerie pattern: key links in the tools and code that indicated a shared APT development and logistics infrastructure.

    In a live briefing, FireEye Labs delves into these findings and discusses why this model of centralized APT planning and development may suggest a much more sinister and more coordinated threat than most organizations realize.

    Why you should attend:

    - Examine the APT Campaigns - Get a detailed look into the APT campaigns that FireEye investigated.

    - Understand the Organized Threat - Learn how centralized development, logistics, and malware-builder tools are driving APT campaigns today.

    - Know the Targets, Know the Trend - Find out which industries are targets of these interconnected campaigns and what this trend suggests.
  • Cyberspace has become a full-blown war zone as governments across the globe clash for digital supremacy in a new, mostly invisible theater of operations. Once limited to opportunistic criminals, cyber attacks are becoming a key weapon for governments seeking to defend national sovereignty and project national power. From strategic cyber espionage campaigns, such as Moonlight Maze and Titan Rain, to the destructive, such as military cyber strikes on Georgia and Iran, human and international conflicts are entering a new phase in their long histories. In this shadowy battlefield, victories are fought with bits instead of bullets, malware instead of militias, and botnets instead of bombs.

    These covert assaults are largely unseen by the public. Unlike the wars of yesteryear, this cyber war produces no dramatic images of exploding warheads, crumbled buildings, or fleeing civilians. But the list of casualties—which already includes some of the biggest names in technology, financial services, defense, and government —is growing larger by the day.

    This live webinar will describe the unique characteristics of cyber attack campaigns waged by governments worldwide. We hope that, armed with this knowledge, security professionals can better identify their attackers and tailor their defenses accordingly.
  • For federal agencies, cyber attacks are a fact of life. Since 2006, the number of cyber incidents reported by federal agencies has increased by 782 percent, according to the Government Accountability Office. And with the emergence of a new generation of advanced malware, zero-day exploits, and targeted advanced persistent threats (APTs), these attacks are becoming increasingly sophisticated and successful. Traditional security defenses are no longer effective. Organizations need an advanced, game-changing technology to enable timely detection and protection.

    Virtual execution techniques for timely signature-less attack identification, coupled with dynamic threat intelligence sharing across the globe, enables proactive continuous monitoring, ensures detection of unauthorized activity during early stages of an attack, and helps minimize damage. Continuous monitoring using these techniques provides for greater situational awareness while also increasing the overall security posture and efficacy of an organization, proven in more than 60 government agencies worldwide.

    In this webinar you will learn:

    * Why Advanced Persistent Threats (APTs) are successful
    * The anatomy of actual attack scenarios and their multi-stage approach
    * How a new model for advanced threat detection can protect your agency

Embed in website or blog