Matt Barrett, SE at OpenDNS, and John Tarn, SE at FireEye discuss the technology integration between FireEye's real-time threat detection and the global enforcement of OpenDNS. They include a whiteboard discussion of how to extend protection to off-network users.Read more >
On January 2, FireEye announced that it had acquired Mandiant, the leading provider of security incident response management solutions, creating a united front against cyber threats.
In a live webinar with FireEye and Mandiant executives, learn why traditional security technologies are unable to address today's threat landscape and why complete, continuous threat protection requires real-time detection, contextual threat intelligence, and rapid incident response.
Why you should attend:
•Learn about the FireEye acquisition of Mandiant.
•Understand today's threat landscape, including the damage being caused from new advanced techniques.
•Discover how FireEye and Mandiant together stop advanced attacks at the earliest phases of the attack lifecycle.
Mobile technology is driving a massive shift in the IT department’s ability to support the way people want to work and collaborate. In this era of enterprise mobility management (EMM), modern enterprises must deliver native mobile experiences that are available to users anywhere and anytime while ensuring that IT can secure corporate information everywhere.
In this webinar, MobileIron and FireEye experts will speak to:
- What trends we're seeing in the updated mobile security landscape
- How joint customers are leveraging their integrated solution in their corporate environments
- An overview of MobileIron and FireEye's combined solution
This session will also include a preview of what’s coming with FireEye Security Orchestrator and MobileIron’s integration with FireEye’s newest product.
La mise en place de la loi de programmation militaire et l’application de son article 22: Art. R.1332-41-6 obligent les organismes d’importance vitale à rechercher des marqueurs sur leurs infrastructures. Ces marqueurs également appelés aussi Indicateurs de compromissions permettent de repérer la présence de groupe, ou d’éléments techniques utilisés par des groupes sur vos machines et votre réseau, soit à travers les logs soit au travers d’actions de chasse aux marqueurs. Nous verrons lors de ce webinar comment les technologies FireEye HX et PX de FireEye peuvent vous aider à automatiser et simplifier cette recherche sur vos infrastructures.Read more >
Keynote: The Hill Perspective
Senator Mark Warner, Virginia
Keynote: A Federal to Private Sector Perspective
Rear Admiral Sam Perez, U.S. Navy (RET) Managing Director, SBD Advisors
Keynote: DOD Perspective
Rear Admiral Gene F. Price, Deputy Commander, U.S. Navy
Along with compliance requirements, agency Chief Information Security Officers oversee the security of the government’s networks and critical infrastructure from domestic and foreign attacks. The monitoring and fortification of these systems is critical to protecting the public’s health, safety and economic prosperity. Potential oversights can put the nation at risk to insider threats and those seeking to gain access to sensitive data, intelligence or possibly launch malicious programs into our systems and networks. This session will take a deep-dive into the immediate and long-term hurdles facing CISOs across all levels of government missions from providing security for information systems that support operations and assets to the expansion of responsibility for whole agency cyber accountability.Read more >
In order to protect themselves, federal, state and local governments and their partners need a clearer picture of the rapidly-evolving threat landscape that has drastically changed with new rules of engagement. Nation-state actors, cyber criminals and hackers have become less predictable. The attack surface continues to grow with the rise in connectivity, data loads and access to industrial control systems. To identify, assess, respond and mitigate threats such as ransomware, extortion, espionage and zero-day attacks, as well as predict and prevent the “unknown threat,” agencies need to build intelligence-led security operations. CIOs and CISOs are drowning in their own security stack while analysts are exhausted by “alert fatigue.” Operationalizing security enables security professionals to rapidly collect, analyze and disseminate threat intelligence across the enterprise, assess risk based on an adversary’s motivation and capability and align resources to the most impactful threats.Read more >
Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.
There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.
Join us in a live webinar and listen to Grady Summers, FireEye’s CTO, as he describes how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
Register today to watch this free encore presentation from the 2016 FireEye Government Forum featuring Virginia Governor Terry McAuliffe. Watch from the convenience of your computer as Governor McAuliffe discusses the importance of making cyber security a priority at the state and federal level, particularly as cyber attacks are on the increase.
Additional topics discussed include:
• What Virginia is doing to address the cyber skills gap, and fill job openings
• Cyber challenges facing state and federal agencies
• Steps Virginia has taken to increase its investment in cyber security
• How and why he wants to make Virginia the cyber capital of America
Russia has a long history of utilising cyber actions to accomplish their information operations and national security goals. Organisations in Europe – in the private and public sector – are a top target of Russia-based cyber activity for espionage and crime. This talk will cover how some of Russia’s recent cyber actions were conducted, and it will highlight how well Russia has embraced the opportunities cyber provides when it comes to national security and foreign policy objectives. Dan McWhorter, Chief Intelligence Strategist at FireEye, will also discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.Read more >
The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?
"The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."
Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:
•How to ensure you are responding to the alert that matters
•Benefits of Alerts with threat Intelligence
•Using threat intelligence to think like your attacker
•How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage
•How security teams can prioritize and optimize their response efforts.
There is an assumption that the more you spend on security technology, the more secure you will be. However, it is evident from the media that even though organisations are spending many on security products they are still being breached. Majority of organisations are falling back on 'historical, layered defence strategies’ with the tendency to think that by merely upgrading software and building up walls, their organisation is safe, but what if the attacker dug underneath the wall?. Does this demonstrate they are spending effectively and keeping their organisation secure?
In this webinar, we will discuss why organisations don't need to spend more on security to be better protected but need to spend wisely with the budget they already have. Organisations continually need to think about how they readjust and refocus on strategies that enable them to be resilient and recover from a cyber-attack. The webinar will cover:
Spend vs Resiliency – is it proportionate?
Strategy for protecting what really matters
Focusing on the 5% of alerts that really matter
Join Richard Turner, FireEye President of EMEA, as he continues his discussion around taking the ‘Risk message of Cyber Secuirty to the board’
Today’s cybercriminals and threat actors continue to innovate and utilize sophisticated malware exploits to bypass traditional security defenses, infiltrate networks, and steal sensitive data. In fact, over 95 percent of companies are already compromised due to advanced targeted attacks, and most don’t even know it. FireEye delivers a complete security platform that provides integrated, multi-vector protection utilizing stateful attack analysis to stop all stages of an advanced attack. The FireEye Malware Protection System features the Virtual Execution (VX) engine that provides state-of-the-art, signature-less analysis using patented, proprietary virtual machines, and provides a 360-degree, stage-by-stage analysis of an advanced attack, from exploitation to data exfiltration. In this session we will demonstrate FireEye’s game-changing technology and threat intelligence to help you prevent advanced attacks from penetrating your defenses, as well as spreading into file shares and establishing long-term footholds in your network.Read more >
You may think your existing security investments provide defense in depth. They do not, and they are failing at an alarming rate. FireEye’s approach replaces legacy signature-based models and provides a protection platform focused on driving down your time to detect and fix breaches. Tune in and learn how the integrated components of the platform can significantly increase your security posture.Read more >
Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.Read more >
Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics.
Register today for this exclusive insight!
Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks.
Register today and get insights into:
•New phishing trends breaching today’s companies
•Changes in modern attack telemetry and methodology
•Intelligence-led insights into emerging global threats
•Modern defensive strategies to better protect your organisation
•How GDPR is changing business in EMEA