APT 28: Cyber Espionage and the Russian Government?
FireEye just released a report called APT28: A Window Into Russia's Cyber Espionage Operations? The report focuses on a targeted threat group that we call APT28 (Advanced Persistent Threat group 28) and details ongoing, focused operations that we believe indicate a government sponsor - most likely the Russian government.
Join us for a roundtable discussion with Russian security expert, Edward Lucas of The Economist, and Jen Weedon, Manager of Threat Intelligence at FireEye.
Discussion topics will include:
•Russia's intentions and motivations in cyberspace
•Whether APT28's activity supports Russia's geopolitical strategy
•How Russian and Chinese network operations compare
•Which organizations and agencies are most at risk
RecordedNov 4 201449 mins
Your place is confirmed, we'll send you email reminders
Yihao Lim, Principal Intelligence Advisor, FireEye Mandiant
Malaysia Cyber Security & Strategy Forum: Dark web Track by Yihao Lim, Principal Intelligence Advisor – Mandiant, amongst the other panelists
Dark Web Observations and Trends in 2021
In 2021, our observation of the current dark web ecosystem amongst cyber criminals hosts a wide variety of goods and services. Historically we observed actors to be concentrated in forums, these days dark web communications and transactions are observed to be occurring in different mediums such as instant messenger platforms and various closed communities. These factors are promoting the rise of professional criminal gangs, amongst a host of illicit things happening in the dark web. Join us in this session to learn what it means for enterprise security and how can you protect your environment against these threats.
Malaysia Cyber Security & Strategy Forum: Ransomware Track by Steve Ledzian, APAC VP and CTO, amongst the other panelists
Topic: Ransomware & Multifaceted Extortion - A Call To Action
Ransomware has evolved into Multifaceted Extortion and with it all the rules of the game have changed. Extortion demands as well as the alternative business consequences are more impactful than they've ever been. It doesn't have to be this way. There are low cost, highly effective premediation tasks that organizations can take to drastically increases their chances of surviving a multifaceted extortion incident. This is likely the #1 cyber security problem facing organizations across all verticals and geographies.
Ron Bushar, SVP Government Solutions, FireEye Mandiant
ASEAN Cyber Security Forum Industry Keynote & Panel Discussion by Ron Bushar, SVP – Government Solutions, amongst the other panelists
Conflicts between nations are no longer confined to the ground, sea and air. Cyberspace has now become a new battleground. The misuse of ICTs to exploit the cyberspace to achieve certain agenda by the nations are continuing to grow. This session will highlight the role of tech companies in addressing the risks including the nation states attacks.
Vincent Wong, Heads of Channels - APAC | Shrikant Shitole, Head of Sales - APAC | Anthony Ng, VP of SE
To combat the ever-increasing number and sophistication of attacks, FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.
Let us share with you our latest XDR platform and priorities and how we make existing security solutions better with greater visibility and detection from FireEye XDR – a unified platform to improve your security posture against the most sophisticated threats. Also, join us in recognizing our 2021 APAC Partners who have contributed significantly to the growth of FireEye's APAC business.
Mandiant Consulting Team: Vivek Chudgar – VP, APAC | Steven D’sa – MD, SEA | Scott Deacon - MD, ANZ
Part 1 [On demand]: https://www.brighttalk.com/webcast/10469/505817
Part 2 [On demand]: https://www.brighttalk.com/webcast/10469/505818
How to prove the return on security investments.
Companies today need a strong security posture and must be able to demonstrate its impact on the organization’s financial stability. CFOs and business leaders are looking to CIOs and CISOs to provide customers and key stakeholders with the confidence they need in the organization’s ability to reduce risk, improve its overall security posture and protect its assets.
Join our live session where we will be discussing business outcomes that customers are seeing from this strategy.
[FireEye XDR in Action - Demo Session] To combat the ever-increasing number and sophistication of attacks, FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform. FireEye XDR applies frontline intelligence and analytics to help you find and resolve the threats that matter most.
Join our experts to have a sneak preview on how FireEye XDR platform can improve your security posture with different use cases.
Part 1 [On-demand]: https://www.brighttalk.com/webcast/10469/505817
Part 2 on 28 Sep: https://www.brighttalk.com/webcast/10469/505819
Real-Life Use Cases from Non-Technical to Technical.
By operationalizing Mandiant’s award-winning threat Intelligence and security validation platform, organizations gain the evidence they need to prove whether their existing investments are protecting their environments. In this session, Mandiant’s APAC subject matter expert Jim Meyer will reveal how intelligence-led security validation is delivering positive business outcomes and how our customers are using this strategy to secure and develop their security programs.
Anthony Ng, VP of SE | Vincent Wong, Senior Director, Channels | Shrikant Shitole, VP & Country Head, India & SAARC
For many decades now, emerging threats have put organizations at risk, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).
FireEye XDR protects organizations though unmatched detection, protection and response technologies delivered through an extensible cloud-based platform. By simplifying and correlating incident data across the entire security stack, FireEye XDR applies frontline intelligence and analytics to help you find and resolve the threats that matter most.
Register for our FireEye XDR Launch on Sept 10 and our experts walk you through:
- how XDR security came about
- why FireEye’s take on XDR is focused on security outcomes,
- how FireEye XDR addresses evolving cyber threats
Follow-up Sesion: FireEye XDR in Action - Live Demo Session | Sept 23
Part 2 on 21 Sep: https://www.brighttalk.com/webcast/10469/505818
Part 3 on 28 Sep: https://www.brighttalk.com/webcast/10469/505819
Why security validation is critical in maintaining or improving your brand reputation and market position.
The need to validate security is clear: many organizations are not as secure as they think they are, attacks are increasing in sophistication, budgets are under scrutiny and adversaries are rapidly morphing their tactics. To outmaneuver highly motivated cyber criminals, organizations need to safely test their security programs with real attacks that they are likely to be facing daily to expose and remediate gaps in their defenses.
Join this panel to learn more about how Intelligence-driven Security Validation programs can effectively test and adapt to an ever-changing threat landscape.
Steve Ledzian - VP, CTO, APAC | Yihao Lim - Principal Intelligence Advisor, Mandiant Threat Intelligence, APAC
Last week we covered the LOCKBIT 2.0 Ransomware threat. Cyber security moves fast and this week it’s LOCKFILE ransomware that’s making the headlines.
LOCKFILE is being combined with ProxyShell and PetitPotam which have both made headlines of their own in recent weeks. We’ll look at how organizations can validate their security control effectiveness against this triple threat.
Steve Ledzian, Vice President & CTO, FireEye APAC | Steven D’sa – Managing Director, Mandiant Consulting, APAC
Join us for the last session of our four-part series on Learnings from the Frontlines: Ransomware Series.
Missed the previous sessions? Watch the on-demand recordings here:
Part 1: https://www.brighttalk.com/webcast/10469/492130
Part 2: https://www.brighttalk.com/webcast/10469/492132
Part 3: https://www.brighttalk.com/webcast/10469/492144
Combining our experience in the field with our in-depth knowledge of attackers and their techniques, we have built a unique, immersive and interactive session which challenges you to make the necessary key decisions during a cyber attack.
During our Cyber Attack Simulation, attendees will be guided through the stages of a ransomware attack, whilst also receiving guidance around the decisions you may need to make. Will you pay, delay or ignore? Are you ready to take the risks and look at the possible outcomes? If yes, you cannot miss this session!
Steven D’sa – Managing Director | Rishi Narang – Manager | James Anderson – Senior Consultant | Mandiant Consulting, APAC
Join us for Part 3 of our four-part series on Learnings from the Frontlines: Ransomware Series.
Register for the rest of the sessions here:
Part 1: https://www.brighttalk.com/webcast/10469/492130 (On-demand)
Part 2: https://www.brighttalk.com/webcast/10469/492132 (On-demand)
Part 4: https://www.brighttalk.com/webcast/10469/492145 (8 Jul)
One of the hardest questions to answer for any organization is “Could we actually detect a ransomware attack before it’s too late?” With attacker sophistication increasing all the time, there is no guarantee that the policies and plans of yesteryear will still work, nor that the products and automated detections will get there in time.
The only way to know for sure is to learn from the worst and carry out a sophisticated cyber-attack wearing the mask of a ransomware group attacker. Using the unmatched Threat Intel, the FireEye Mandiant Red Team have been able to conduct such engagements using the tools and techniques of the world’s leading ransomware threat actors and find those spaces between the defensive dream and risk-filled reality that could cost you dearly.
In this session, our experts reveal some of the results from these engagements which can be adopted into your ongoing security program.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, and nation-state grade threat intelligence.
APT 28: Cyber Espionage and the Russian Government?Edward Lucas, Senior Editor, The Economist and Jen Weedon, Manager of Threat Intelligence, FireEye[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]49 mins