Hi [[ session.user.profile.firstName ]]
Sort by:
    • FireEye Government Forum: Enabling the Government CISO to Command and Protect
      FireEye Government Forum: Enabling the Government CISO to Command and Protect FireEye Recorded: Mar 23 2017 6:45 pm UTC 48 mins
    • Along with compliance requirements, agency Chief Information Security Officers oversee the security of the government’s networks and critical infrastructure from domestic and foreign attacks. The monitoring and fortification of these systems is critical to protecting the public’s health, safety and economic prosperity. Potential oversights can put the nation at risk to insider threats and those seeking to gain access to sensitive data, intelligence or possibly launch malicious programs into our systems and networks. This session will take a deep-dive into the immediate and long-term hurdles facing CISOs across all levels of government missions from providing security for information systems that support operations and assets to the expansion of responsibility for whole agency cyber accountability.

      Read more >
    • FireEye Government Forum: Opening Keynote
      FireEye Government Forum: Opening Keynote FireEye Recorded: Mar 23 2017 6:10 pm UTC 49 mins
    • In order to protect themselves, federal, state and local governments and their partners need a clearer picture of the rapidly-evolving threat landscape that has drastically changed with new rules of engagement. Nation-state actors, cyber criminals and hackers have become less predictable. The attack surface continues to grow with the rise in connectivity, data loads and access to industrial control systems. To identify, assess, respond and mitigate threats such as ransomware, extortion, espionage and zero-day attacks, as well as predict and prevent the “unknown threat,” agencies need to build intelligence-led security operations. CIOs and CISOs are drowning in their own security stack while analysts are exhausted by “alert fatigue.” Operationalizing security enables security professionals to rapidly collect, analyze and disseminate threat intelligence across the enterprise, assess risk based on an adversary’s motivation and capability and align resources to the most impactful threats.

      Read more >
    • FireEye in 2017
      FireEye in 2017 Grady Summers, EVP & CTO Recorded: Mar 30 2017 3:00 pm UTC 42 mins
    • Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

      There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

      Join us in a live webinar and listen to Grady Summers, FireEye’s CTO, as he describes how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.

      Read more >
    • Exploring Russia’s Cyber Operations
      Exploring Russia’s Cyber Operations Nick Rossmann, Senior Manager for Production, FireEye iSIGHT Intelligence Recorded: Sep 7 2016 1:00 pm UTC 47 mins
    • Russia has a long history of utilising cyber actions to accomplish their information operations and national security goals. Organisations in Europe – in the private and public sector – are a top target of Russia-based cyber activity for espionage and crime. This talk will cover how some of Russia’s recent cyber actions were conducted, and it will highlight how well Russia has embraced the opportunities cyber provides when it comes to national security and foreign policy objectives. Dan McWhorter, Chief Intelligence Strategist at FireEye, will also discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.

      Read more >
    • Intel & Threat Analysis – The Defensive Duo
      Intel & Threat Analysis – The Defensive Duo Jens Monrad, Global Threat Intelligence Liaison, FireEye; Al Maslowski-Yerges Manager, Americas Systems Engineering Recorded: Aug 10 2016 1:00 pm UTC 41 mins
    • The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

      "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

      Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

      •How to ensure you are responding to the alert that matters

      •Benefits of Alerts with threat Intelligence

      •Using threat intelligence to think like your attacker

      •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

      •How security teams can prioritize and optimize their response efforts.

      Read more >
    • Is Security Spend Proportionate to Cyber Resiliency?
      Is Security Spend Proportionate to Cyber Resiliency? Richard Turner, President EMEA, FireEye Recorded: May 10 2016 1:00 pm UTC 46 mins
    • There is an assumption that the more you spend on security technology, the more secure you will be. However, it is evident from the media that even though organisations are spending many on security products they are still being breached. Majority of organisations are falling back on 'historical, layered defence strategies’ with the tendency to think that by merely upgrading software and building up walls, their organisation is safe, but what if the attacker dug underneath the wall?. Does this demonstrate they are spending effectively and keeping their organisation secure?
      In this webinar, we will discuss why organisations don't need to spend more on security to be better protected but need to spend wisely with the budget they already have. Organisations continually need to think about how they readjust and refocus on strategies that enable them to be resilient and recover from a cyber-attack. The webinar will cover:
      Spend vs Resiliency – is it proportionate?
      Strategy for protecting what really matters
      Focusing on the 5% of alerts that really matter

      Join Richard Turner, FireEye President of EMEA, as he continues his discussion around taking the ‘Risk message of Cyber Secuirty to the board’

      Read more >
    • Product Demo: FireEye Malware Protection System
      Product Demo: FireEye Malware Protection System Aaron Sheridan, Sr. Systems Security Engineer, FireEye Recorded: Dec 13 2012 5:00 pm UTC 45 mins
    • Today’s cybercriminals and threat actors continue to innovate and utilize sophisticated malware exploits to bypass traditional security defenses, infiltrate networks, and steal sensitive data. In fact, over 95 percent of companies are already compromised due to advanced targeted attacks, and most don’t even know it. FireEye delivers a complete security platform that provides integrated, multi-vector protection utilizing stateful attack analysis to stop all stages of an advanced attack. The FireEye Malware Protection System features the Virtual Execution (VX) engine that provides state-of-the-art, signature-less analysis using patented, proprietary virtual machines, and provides a 360-degree, stage-by-stage analysis of an advanced attack, from exploitation to data exfiltration. In this session we will demonstrate FireEye’s game-changing technology and threat intelligence to help you prevent advanced attacks from penetrating your defenses, as well as spreading into file shares and establishing long-term footholds in your network.

      Read more >
    • Adaptive Defence in the War against APTs
      Adaptive Defence in the War against APTs Simon Mullis, Global Technical Lead – FireEye Recorded: Oct 13 2015 12:00 pm UTC 48 mins
    • Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.

      Read more >
    • Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day
      Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Ben Withnell, Incident Analyst, FireEye as a Service Recorded: Sep 22 2015 3:00 pm UTC 43 mins
    • Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
      In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics.

      Register today for this exclusive insight!

      Read more >