Hi [[ session.user.profile.firstName ]]
Sort by:
    • Exploring Russia’s Cyber Operations Exploring Russia’s Cyber Operations Nick Rossmann, Senior Manager for Production, FireEye iSIGHT Intelligence Recorded: Sep 7 2016 1:00 pm UTC 47 mins
    • Russia has a long history of utilising cyber actions to accomplish their information operations and national security goals. Organisations in Europe – in the private and public sector – are a top target of Russia-based cyber activity for espionage and crime. This talk will cover how some of Russia’s recent cyber actions were conducted, and it will highlight how well Russia has embraced the opportunities cyber provides when it comes to national security and foreign policy objectives. Dan McWhorter, Chief Intelligence Strategist at FireEye, will also discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.

      Read more >
    • Intel & Threat Analysis – The Defensive Duo Intel & Threat Analysis – The Defensive Duo Jens Monrad, Global Threat Intelligence Liaison, FireEye; Al Maslowski-Yerges Manager, Americas Systems Engineering Recorded: Aug 10 2016 1:00 pm UTC 41 mins
    • The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

      "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

      Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

      •How to ensure you are responding to the alert that matters

      •Benefits of Alerts with threat Intelligence

      •Using threat intelligence to think like your attacker

      •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

      •How security teams can prioritize and optimize their response efforts.

      Read more >
    • Is Security Spend Proportionate to Cyber Resiliency? Is Security Spend Proportionate to Cyber Resiliency? Richard Turner, President EMEA, FireEye Recorded: May 10 2016 1:00 pm UTC 46 mins
    • There is an assumption that the more you spend on security technology, the more secure you will be. However, it is evident from the media that even though organisations are spending many on security products they are still being breached. Majority of organisations are falling back on 'historical, layered defence strategies’ with the tendency to think that by merely upgrading software and building up walls, their organisation is safe, but what if the attacker dug underneath the wall?. Does this demonstrate they are spending effectively and keeping their organisation secure?
      In this webinar, we will discuss why organisations don't need to spend more on security to be better protected but need to spend wisely with the budget they already have. Organisations continually need to think about how they readjust and refocus on strategies that enable them to be resilient and recover from a cyber-attack. The webinar will cover:
      Spend vs Resiliency – is it proportionate?
      Strategy for protecting what really matters
      Focusing on the 5% of alerts that really matter

      Join Richard Turner, FireEye President of EMEA, as he continues his discussion around taking the ‘Risk message of Cyber Secuirty to the board’

      Read more >
    • Product Demo: FireEye Malware Protection System Product Demo: FireEye Malware Protection System Aaron Sheridan, Sr. Systems Security Engineer, FireEye Recorded: Dec 13 2012 5:00 pm UTC 45 mins
    • Today’s cybercriminals and threat actors continue to innovate and utilize sophisticated malware exploits to bypass traditional security defenses, infiltrate networks, and steal sensitive data. In fact, over 95 percent of companies are already compromised due to advanced targeted attacks, and most don’t even know it. FireEye delivers a complete security platform that provides integrated, multi-vector protection utilizing stateful attack analysis to stop all stages of an advanced attack. The FireEye Malware Protection System features the Virtual Execution (VX) engine that provides state-of-the-art, signature-less analysis using patented, proprietary virtual machines, and provides a 360-degree, stage-by-stage analysis of an advanced attack, from exploitation to data exfiltration. In this session we will demonstrate FireEye’s game-changing technology and threat intelligence to help you prevent advanced attacks from penetrating your defenses, as well as spreading into file shares and establishing long-term footholds in your network.

      Read more >
    • Adaptive Defence in the War against APTs Adaptive Defence in the War against APTs Simon Mullis, Global Technical Lead – FireEye Recorded: Oct 13 2015 12:00 pm UTC 48 mins
    • Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.

      Read more >
    • Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Ben Withnell, Incident Analyst, FireEye as a Service Recorded: Sep 22 2015 3:00 pm UTC 43 mins
    • Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
      In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics.

      Register today for this exclusive insight!

      Read more >
    • Cybersecurity Collaboration: Leveraging a Trusted Partner Cybersecurity Collaboration: Leveraging a Trusted Partner Josh Goldfarb, VP, CTO - Americas, FireEye Recorded: Mar 24 2015 9:30 pm UTC 47 mins
    • Your adversaries are people: creative, nimble and persistent. They can bypass conventional security deployments almost at will, breaching systems in a wide swatch of industries and geographies.

      Technology alone will not defeat a determined attacker. You need a strategic defense partner that combines the most advanced technology platform with the leading cyber security expertise and the latest global threat intelligence from around the world. FireEye as a Service (FaaS) does exactly this, and allows you to detect, prevent, analyze, and respond to security incidents in minutes rather than months.

      Join FireEye, VP, CTO - Americas Josh Goldfarb, as he explores:

      - The current state of cybersecurity and the new threat landscape
      - The failure of traditional defense models in the face of a new adversary
      - The value of an Adaptive Defense strategy and working with a trusted partner
      - Real-world case studies

      As always, we will save plenty of time for Q&A. Be sure to register now to take part in this critical webinar.

      Read more >