Hi [[ session.user.profile.firstName ]]

APT30: Behind the Decade-Long Cyber Espionage Operation

Learn more about the tools, tactics, and procedures of APT30 - the cyber threat group that had successfully compromised entities for at least ten years, and how to detect, prevent and respond to this threat.

FireEye recently released a report that details how a cyber threat group APT 30, had successfully exploited largely in Southeast Asia countries and India – in both government and commercial entities — who hold key political, economic, and military information about the region for at least a decade.

Join us on this webinar with Bryce Boland, CTO of FireEye Asia Pacific, who will share more on this threat intelligence.

In this webinar, you can understand more about the operations behind APT30 as we outline the profile of the attacker so that you can better understand their threats.

• Learn about their tools, tactics and procedures (TTP)
• Find out how you can detect, prevent, analyze and respond to this threat

This session is for business and security professionals, especially in South East Asia and India, who would like to know more about this APT group which is one of the longest running advanced threat groups we have observed.
Recorded Apr 29 2015 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bryce Boland, CTO, Asia Pacific, FireEye

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Mandatory Breach Disclosure and your Corporate Communications Strategy Recorded: Mar 20 2018 50 mins
    Patrick Neighorn, Head of Global Media Relations, FireEye and Jackson McKinley, Director of Incident Response, Mandiant
    In February 2018, Mandatory Data Breach Notification legislation took effect in Australia. It introduced unique challenges to the already difficult task of managing external communications after a cyber attack.

    On Tuesday, March 20, Patrick Neighorn, Head of Global Media Relations for FireEye, and Jackson McKinley, Director of Incident Response for Mandiant, a FireEye company, will share what happens behind the scenes when dealing with communications challenges during a breach.

    At this webinar, these two professionals will call on their extensive frontline experience with breached corporations worldwide to discuss: What common misperceptions exist regarding cyber forensic investigations, how long it takes executive teams to be notified and communications teams to be briefed, what information is typically shared and what organisations can do to effectively manage the message in the wake of a breach.

    Take this opportunity to better prepare for the upcoming Mandatory Breach Notification legislation.
  • Exclusive Q&A session : APT37 Recorded: Mar 16 2018 19 mins
    Benjamin Read, Senior Manager, Cyber Espionage at FireEye
    An exclusive 30-minute Q&A session with the presenter, Benjamin Read, Senior Manager, Cyber Espionage at FireEye

    Learn more about:
    •APT37’s historic support of North Korean interests.
    •Details on the malware suite employed by the actor.
    •Why APT37 is an emerging threat beyond the Korean peninsula.
  • APT37: The Overlooked North Korean Threat Recorded: Mar 8 2018 59 mins
    Ben Read, Senior Manager Cyber Espionage, FireEye
    Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.

    APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

    FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. Join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:

    • A history of APT37 support for North Korean interests
    • Details on the malware suite employed by APT37
    • How APT37 has been influencing the world beyond the Korean peninsula
  • Building a secure future for women in Cyber Security Recorded: Mar 6 2018 62 mins
    Zeina Zakhour, Denise Bedell, Vasu Jakkal, Roxy Dee, Emma Hunwick
    Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.

    Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.

    Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:

    -How did they make their first break?
    -Why does the industry have such a hard time retaining talent?
    -What are some of their favourite parts about their job?
    -Their advice to women in the industry
    -Their advice to cyber security execs looking to create more diverse teams

    Moderator: Denise Bedell (Content Innovo)
    Zeina Zakhour (Atos), Vasu Jakkal (FireEye), Roxy Dee (Hurricane Labs), Emma Hunwick (PwC)
  • Cyber Evolution: En Route to Strengthening Resilience in Asia-Pacific Recorded: Feb 8 2018 52 mins
    Rob van der Ende, VP APJ, Mandiant, Douglas Ure, MD, Client Advisory Services, Marsh Asia, Richard Green, MD Marsh
    The cyber threat landscape is morphing constantly and dramatically. Around the world, cyber dependency grows as increasing digital interconnection among people, things, and organisations expand. Asia-Pacific (APAC) is no different.

    From currency volatility to political instability and evolving regulations, conducting business across borders today involves more risks – and companies must add cyber to their list of risk concerns. Financial services, energy and utilities, and telecommunications are among the most investigated industries in APAC, highlighting the urgent need for higher awareness levels, stronger mitigation measures, and improved cybersecurity postures.

    While there is no easy fix for these problems, we are seeing steps being taken in the right direction. The regulatory climate in the APAC region is beginning to change, even if slowly.

    As trusted cyber advisers, FireEye and Marsh & McLennan Companies – each a leader in its own field – have collaborated to share their insights to help organisations across APAC build and strengthen their enterprise cyber resilience.
  • Security Predictions for 2018: An APAC Viewpoint Recorded: Dec 13 2017 37 mins
    Bryce Boland, Asia Pacific CTO
    As the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Not many things are absolute in the security industry, but we know for certain that threat actors will continue to attack and defenders will be tasked with stopping them.

    Join Bryce Boland, Asia Pacific CTO at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail:

    •What types of nation-state activity we will be seeing
    •What new regulations such as GDPR mean for organizations
    •How to ensure a secure environment as more organizations migrate to the cloud

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Are APAC organisations response-ready to a data breach? Recorded: Nov 16 2017 45 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services | FireEye
    Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen.

    Mandiant, a FireEye Company, is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches.

    Join us for a discussion on the importance of being breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.
  • Incident Response: An Investigation Case Study Recorded: Oct 26 2017 39 mins
    Vivek Chudgar, Senior Director – Mandiant Consulting (APAC)
  • An Elegant and Practical Model for Security Practitioners Recorded: Oct 25 2017 37 mins
    Christian Frain, Manager of Systems Engineering
    "Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.   Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
  • Delivering Advanced Security Capabilities to Any Organization: APAC Perspective Recorded: Oct 25 2017 58 mins
    Claudio Scarabello, Director, Product Marketing, APJ
    Today’s security operations are frequently disjointed and plagued by limited visibility and false alerts. As a result, organizations are unable to quickly and cost-effectively prioritize and respond to threats. FireEye can help deliver advanced security operations to any organization while disrupting the economics of security. Capabilities typically seen only in Fortune 50 companies will become available any FireEye solution. In this live webinar:

    - Learn about how a centralized security operations platform:
    o Improves visibility across your entire cyber security infrastructure
    o Surfaces and provides context for the most critical alerts
    o Empowers decision making to decrease the time from detection to response
    -See a demo of how Helix identifies and responds to an alert
    -Have the opportunity to ask questions in a live Q&A session
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" Recorded: Oct 24 2017 49 mins
    David Grout, Director, Southern Europe Systems Engineering, FireEye
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Asia Pacific Cyber Threat Landscape Recorded: Oct 24 2017 40 mins
    Bryce Boland, Asia Pacific CTO
    From the first time that criminal charges were files against a known state actor for hacking in 2014 to the recent US Senate Intelligence Committee hearing on Russian influence on the 2016 US Election, FireEye has been integral to investigations where cyber attacks resulted in the most significant impact on governments around the world. We will highlight some of the most public investigations, look to key government leaders to understand their perspective on the impact of cyber, and lastly review the top strategic mistakes that organizations make when trying to address cyber risk.
  • An Elegant and Practical Model for Security Practitioners Recorded: Sep 12 2017 48 mins
    Steve Ledzian, FireEye APAC
    "Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.

    Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
  • Smarter Endpoint Security: How to go Beyond Prevention Recorded: Jun 20 2017 54 mins
    Caludio Scarabello, Director,Product Marketing, APJ FireEye
    Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Comprehensive endpoint protection requires prevention, AV, endpoint detection and response (EDR) and other capabilities. Even when organizations adopt multiple point products, there are still gaps in their endpoint protection.

    Some companies tout “next-generation endpoint security,” but what does that mean? Jim Waggoner, Sr. Director of Endpoint Product Management at FireEye will tell you how to make sure your next-generation endpoint security solution is delivering a comprehensive. In this webinar, you will:

    Learn about the current endpoint security landscape and the challenges it poses.
    - Find out what makes EDR capabilities valuable.
    - Understand why threat intelligence is important and how it affects endpoint threat detection and prevention.
    - Discover why a single endpoint agent should include:
    - Multiple detection and prevention engines.
    - Integrated workflows from detection to investigation to remediation.
    - Scalable, multiple form factors and breadth of OS support.
  • Securing Industrial Control System (ICS) - What you need to know Recorded: May 31 2017 45 mins
    Rob Caldwell, Manager, Mandiant Consulting
    Our Mandiant Industrial Control Systems (ICS) practice will discuss findings which have been captured over recent ICS security engagements which highlight critical security areas for customers. The discussion will focus on the Mandiant methodology that is used in ICS related engagements and examples of findings which are relevant to ICS customers; with specific focus on the relevant security challenges facing these ICS customers.
  • Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations Recorded: May 18 2017 59 mins
    Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company
    Attend this webinar to be one of the first to learn details about APT32, a significant espionage operation targeting global companies operating in Southeast Asia. Over the past several months, FireEye has focused major efforts on defending our clients against APT32, also known as OceanLotus Group.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How FireEye continues to improve your ability to detect, prevent and remediate APT32 attacks

    Take your first step to minimize the impact of the new APT group.
  • M-Trends 2017: Trends Behind Today's Breaches & Cyber Attacks | APAC Spotlight Recorded: Apr 19 2017 43 mins
    Tim Wellsmore, Director, Threat Intelligence,Mandiant Consulting; Rob van der Ende, Vice President, Mandiant Consulting, APAC
    Join this important webinar as the Mandiant team explores trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks. Register today for an intelligence-led look into:
    · New phishing trends breaching today’s companies.
    · Changes in modern attack telemetry and methodology.
    · Intelligence-led insights into emerging global threats.
    · Modern defensive strategies to better protect your organization.
    Special features spotlight trends in the APAC regions. Take a guided look at the M-Trends Report, pinpointing current and emerging global threats as discovered from the front lines of today’s leading forensic investigations.
  • FireEye in 2017 Recorded: Apr 7 2017 31 mins
    Bryce Boland, Asia Pacific CTO, FireEye
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Bryce Boland, FireEye's Asia Pacific CTO, as he describes how FireEye in APAC can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • 7 Questions To Consider When Looking For An Effective Endpoint Security Solution Recorded: Jan 25 2017 31 mins
    Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc.
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Financial Impact of Data Breaches Recorded: Jan 10 2017 49 mins
    Roger J. Francis, Senior Consultant at Mandiant, a FireEye company
    Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.

    In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: APT30: Behind the Decade-Long Cyber Espionage Operation
  • Live at: Apr 29 2015 6:00 am
  • Presented by: Bryce Boland, CTO, Asia Pacific, FireEye
  • From:
Your email has been sent.
or close