Hi [[ session.user.profile.firstName ]]
Sort by:
    • Is Security Spend Proportionate to Cyber Resiliency? Is Security Spend Proportionate to Cyber Resiliency? Richard Turner, President EMEA, FireEye Recorded: May 10 2016 1:00 pm UTC 46 mins
    • There is an assumption that the more you spend on security technology, the more secure you will be. However, it is evident from the media that even though organisations are spending many on security products they are still being breached. Majority of organisations are falling back on 'historical, layered defence strategies’ with the tendency to think that by merely upgrading software and building up walls, their organisation is safe, but what if the attacker dug underneath the wall?. Does this demonstrate they are spending effectively and keeping their organisation secure?
      In this webinar, we will discuss why organisations don't need to spend more on security to be better protected but need to spend wisely with the budget they already have. Organisations continually need to think about how they readjust and refocus on strategies that enable them to be resilient and recover from a cyber-attack. The webinar will cover:
      Spend vs Resiliency – is it proportionate?
      Strategy for protecting what really matters
      Focusing on the 5% of alerts that really matter

      Join Richard Turner, FireEye President of EMEA, as he continues his discussion around taking the ‘Risk message of Cyber Secuirty to the board’

      Read more >
    • Product Demo: FireEye Malware Protection System Product Demo: FireEye Malware Protection System Aaron Sheridan, Sr. Systems Security Engineer, FireEye Recorded: Dec 13 2012 5:00 pm UTC 45 mins
    • Today’s cybercriminals and threat actors continue to innovate and utilize sophisticated malware exploits to bypass traditional security defenses, infiltrate networks, and steal sensitive data. In fact, over 95 percent of companies are already compromised due to advanced targeted attacks, and most don’t even know it. FireEye delivers a complete security platform that provides integrated, multi-vector protection utilizing stateful attack analysis to stop all stages of an advanced attack. The FireEye Malware Protection System features the Virtual Execution (VX) engine that provides state-of-the-art, signature-less analysis using patented, proprietary virtual machines, and provides a 360-degree, stage-by-stage analysis of an advanced attack, from exploitation to data exfiltration. In this session we will demonstrate FireEye’s game-changing technology and threat intelligence to help you prevent advanced attacks from penetrating your defenses, as well as spreading into file shares and establishing long-term footholds in your network.

      Read more >
    • Adaptive Defence in the War against APTs Adaptive Defence in the War against APTs Simon Mullis, Global Technical Lead – FireEye Recorded: Oct 13 2015 12:00 pm UTC 48 mins
    • Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.

      Read more >
    • Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Ben Withnell, Incident Analyst, FireEye as a Service Recorded: Sep 22 2015 3:00 pm UTC 43 mins
    • Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
      In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics.

      Register today for this exclusive insight!

      Read more >
    • Cybersecurity Collaboration: Leveraging a Trusted Partner Cybersecurity Collaboration: Leveraging a Trusted Partner Josh Goldfarb, VP, CTO - Americas, FireEye Recorded: Mar 24 2015 9:30 pm UTC 47 mins
    • Your adversaries are people: creative, nimble and persistent. They can bypass conventional security deployments almost at will, breaching systems in a wide swatch of industries and geographies.

      Technology alone will not defeat a determined attacker. You need a strategic defense partner that combines the most advanced technology platform with the leading cyber security expertise and the latest global threat intelligence from around the world. FireEye as a Service (FaaS) does exactly this, and allows you to detect, prevent, analyze, and respond to security incidents in minutes rather than months.

      Join FireEye, VP, CTO - Americas Josh Goldfarb, as he explores:

      - The current state of cybersecurity and the new threat landscape
      - The failure of traditional defense models in the face of a new adversary
      - The value of an Adaptive Defense strategy and working with a trusted partner
      - Real-world case studies

      As always, we will save plenty of time for Q&A. Be sure to register now to take part in this critical webinar.

      Read more >