Hi [[ session.user.profile.firstName ]]

Securing Enterprise Networks against Advanced Attacks

How can your company ensure all threat vectors are protected? In this webinar you will:

- Find out what it takes to secure your organization from today’s evasive advanced cyber threats
- Discover how to detect blended attacks that point products miss
- Learn how to safeguard your intellectual property, critical infrastructure, and customer records from multi-vector, targeted attacks
- Understand how to respond to incidents faster by reducing the number of false positives your security team has to sift through
- Get introduced to the FireEye products that can help achieve enterprise network security
Recorded May 29 2015 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rajiv Raghunarayan, Director, Product Marketing
Presentation preview: Securing Enterprise Networks against Advanced Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • M-Trends 2018 – 了解現今的網路攻擊趨勢 Jun 13 2018 2:00 am UTC 75 mins
    蕭松瀛, Nicholas Hsiao
    每年 FireEye 旗下之 Mandiant 公司顧問回應來自全球各地威脅組織的各種網路事件。在年度 M-Trends 報告中摘要了這些經驗,並在報告中探索資安攻擊情勢的變化。

    在此網路研討會中,Nicholas Hsiao 將會討論:

    •小心複雜且有害的 APT 組織
  • Artificial Intelligence in the Cyber Domain May 31 2018 3:00 am UTC 60 mins
    Ben Fitzpatrick, Director Global Services & Intelligence, Asia Pacific & Japan
    Artificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.In a live webinar, hear a key author of the report discuss what these findings reveal about advanced malware moving forward.

    Join Ben Fitzpatrick, Director Global Services & Intelligence, APJ, for the first installation of our three-part webinar series to:
    - Understand the fundamentals of AI, the differences between various techniques used to process data and the drawbacks to each approach.
    - Discuss how AI tools can be used for offensive and defensive purposes in the cyber domain.
    - Survey the future threat landscape and provide geopolitical context regarding how nations will use AI tools given their current levels of technological development and AI integration in civilian applications.
  • M-Trends 2018: Understanding Today's Cyber Attack Trends Recorded: May 3 2018 42 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services and Bryce Boland, FireEye APAC CTO
    Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.

    During this webinar, Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services and Bryce Boland, FireEye APAC CTO will discuss:

    - Longer-term trends in today's threat landscape
    - Sophisticated and harmful APT groups to look out for
    - Which organizations are most likely to be retargeted by attackers
    - The difficulty of finding skilled personnel and how it affects the security function
    - How weaknesses in security fundamentals contributed to successful compromises
    - Best practice red teaming tactics for improved security defense
  • The Real Cost of Data Breaches Recorded: Apr 25 2018 33 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services | FireEye
    The annual Cost of Data Breach study from the Ponemon Institute indicates a small year-over-year decline, but the average size and scope of data breaches continues to increase. Every year, Mandiant investigates more cyber incidents and we believe that the real cost of a data breach to an organization can be much higher than what is reported. The pending implementation of GDPR and its penalties for non-compliance, will also impact the costs to organizations.

    During this session we will share some insights with you into the damage attackers typically cause and what mitigating steps you can take to minimize the impact and cost of a data breach.
  • Mandatory Breach Disclosure and your Corporate Communications Strategy Recorded: Mar 20 2018 50 mins
    Patrick Neighorn, Head of Global Media Relations, FireEye and Jackson McKinley, Director of Incident Response, Mandiant
    In February 2018, Mandatory Data Breach Notification legislation took effect in Australia. It introduced unique challenges to the already difficult task of managing external communications after a cyber attack.

    On Tuesday, March 20, Patrick Neighorn, Head of Global Media Relations for FireEye, and Jackson McKinley, Director of Incident Response for Mandiant, a FireEye company, will share what happens behind the scenes when dealing with communications challenges during a breach.

    At this webinar, these two professionals will call on their extensive frontline experience with breached corporations worldwide to discuss: What common misperceptions exist regarding cyber forensic investigations, how long it takes executive teams to be notified and communications teams to be briefed, what information is typically shared and what organisations can do to effectively manage the message in the wake of a breach.

    Take this opportunity to better prepare for the upcoming Mandatory Breach Notification legislation.
  • Exclusive Q&A session : APT37 Recorded: Mar 16 2018 19 mins
    Benjamin Read, Senior Manager, Cyber Espionage at FireEye
    An exclusive 30-minute Q&A session with the presenter, Benjamin Read, Senior Manager, Cyber Espionage at FireEye

    Learn more about:
    •APT37’s historic support of North Korean interests.
    •Details on the malware suite employed by the actor.
    •Why APT37 is an emerging threat beyond the Korean peninsula.
  • APT37: The Overlooked North Korean Threat Recorded: Mar 8 2018 59 mins
    Ben Read, Senior Manager Cyber Espionage, FireEye
    Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.

    APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

    FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. Join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:

    • A history of APT37 support for North Korean interests
    • Details on the malware suite employed by APT37
    • How APT37 has been influencing the world beyond the Korean peninsula
  • Building a secure future for women in Cyber Security Recorded: Mar 6 2018 62 mins
    Zeina Zakhour, Denise Bedell, Vasu Jakkal, Roxy Dee, Emma Hunwick
    Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.

    Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.

    Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:

    -How did they make their first break?
    -Why does the industry have such a hard time retaining talent?
    -What are some of their favourite parts about their job?
    -Their advice to women in the industry
    -Their advice to cyber security execs looking to create more diverse teams

    Moderator: Denise Bedell (Content Innovo)
    Zeina Zakhour (Atos), Vasu Jakkal (FireEye), Roxy Dee (Hurricane Labs), Emma Hunwick (PwC)
  • Cyber Evolution: En Route to Strengthening Resilience in Asia-Pacific Recorded: Feb 8 2018 52 mins
    Rob van der Ende, VP APJ, Mandiant, Douglas Ure, MD, Client Advisory Services, Marsh Asia, Richard Green, MD Marsh
    The cyber threat landscape is morphing constantly and dramatically. Around the world, cyber dependency grows as increasing digital interconnection among people, things, and organisations expand. Asia-Pacific (APAC) is no different.

    From currency volatility to political instability and evolving regulations, conducting business across borders today involves more risks – and companies must add cyber to their list of risk concerns. Financial services, energy and utilities, and telecommunications are among the most investigated industries in APAC, highlighting the urgent need for higher awareness levels, stronger mitigation measures, and improved cybersecurity postures.

    While there is no easy fix for these problems, we are seeing steps being taken in the right direction. The regulatory climate in the APAC region is beginning to change, even if slowly.

    As trusted cyber advisers, FireEye and Marsh & McLennan Companies – each a leader in its own field – have collaborated to share their insights to help organisations across APAC build and strengthen their enterprise cyber resilience.
  • Security Predictions for 2018: An APAC Viewpoint Recorded: Dec 13 2017 37 mins
    Bryce Boland, Asia Pacific CTO
    As the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Not many things are absolute in the security industry, but we know for certain that threat actors will continue to attack and defenders will be tasked with stopping them.

    Join Bryce Boland, Asia Pacific CTO at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail:

    •What types of nation-state activity we will be seeing
    •What new regulations such as GDPR mean for organizations
    •How to ensure a secure environment as more organizations migrate to the cloud

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Are APAC organisations response-ready to a data breach? Recorded: Nov 16 2017 45 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services | FireEye
    Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen.

    Mandiant, a FireEye Company, is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches.

    Join us for a discussion on the importance of being breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.
  • Incident Response: An Investigation Case Study Recorded: Oct 26 2017 39 mins
    Vivek Chudgar, Senior Director – Mandiant Consulting (APAC)
  • An Elegant and Practical Model for Security Practitioners Recorded: Oct 25 2017 37 mins
    Christian Frain, Manager of Systems Engineering
    "Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.   Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
  • Delivering Advanced Security Capabilities to Any Organization: APAC Perspective Recorded: Oct 25 2017 58 mins
    Claudio Scarabello, Director, Product Marketing, APJ
    Today’s security operations are frequently disjointed and plagued by limited visibility and false alerts. As a result, organizations are unable to quickly and cost-effectively prioritize and respond to threats. FireEye can help deliver advanced security operations to any organization while disrupting the economics of security. Capabilities typically seen only in Fortune 50 companies will become available any FireEye solution. In this live webinar:

    - Learn about how a centralized security operations platform:
    o Improves visibility across your entire cyber security infrastructure
    o Surfaces and provides context for the most critical alerts
    o Empowers decision making to decrease the time from detection to response
    -See a demo of how Helix identifies and responds to an alert
    -Have the opportunity to ask questions in a live Q&A session
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" Recorded: Oct 24 2017 49 mins
    David Grout, Director, Southern Europe Systems Engineering, FireEye
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Asia Pacific Cyber Threat Landscape Recorded: Oct 24 2017 40 mins
    Bryce Boland, Asia Pacific CTO
    From the first time that criminal charges were files against a known state actor for hacking in 2014 to the recent US Senate Intelligence Committee hearing on Russian influence on the 2016 US Election, FireEye has been integral to investigations where cyber attacks resulted in the most significant impact on governments around the world. We will highlight some of the most public investigations, look to key government leaders to understand their perspective on the impact of cyber, and lastly review the top strategic mistakes that organizations make when trying to address cyber risk.
  • An Elegant and Practical Model for Security Practitioners Recorded: Sep 12 2017 48 mins
    Steve Ledzian, FireEye APAC
    "Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.

    Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
  • Smarter Endpoint Security: How to go Beyond Prevention Recorded: Jun 20 2017 54 mins
    Caludio Scarabello, Director,Product Marketing, APJ FireEye
    Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Comprehensive endpoint protection requires prevention, AV, endpoint detection and response (EDR) and other capabilities. Even when organizations adopt multiple point products, there are still gaps in their endpoint protection.

    Some companies tout “next-generation endpoint security,” but what does that mean? Jim Waggoner, Sr. Director of Endpoint Product Management at FireEye will tell you how to make sure your next-generation endpoint security solution is delivering a comprehensive. In this webinar, you will:

    Learn about the current endpoint security landscape and the challenges it poses.
    - Find out what makes EDR capabilities valuable.
    - Understand why threat intelligence is important and how it affects endpoint threat detection and prevention.
    - Discover why a single endpoint agent should include:
    - Multiple detection and prevention engines.
    - Integrated workflows from detection to investigation to remediation.
    - Scalable, multiple form factors and breadth of OS support.
  • Securing Industrial Control System (ICS) - What you need to know Recorded: May 31 2017 45 mins
    Rob Caldwell, Manager, Mandiant Consulting
    Our Mandiant Industrial Control Systems (ICS) practice will discuss findings which have been captured over recent ICS security engagements which highlight critical security areas for customers. The discussion will focus on the Mandiant methodology that is used in ICS related engagements and examples of findings which are relevant to ICS customers; with specific focus on the relevant security challenges facing these ICS customers.
  • Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations Recorded: May 18 2017 59 mins
    Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company
    Attend this webinar to be one of the first to learn details about APT32, a significant espionage operation targeting global companies operating in Southeast Asia. Over the past several months, FireEye has focused major efforts on defending our clients against APT32, also known as OceanLotus Group.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How FireEye continues to improve your ability to detect, prevent and remediate APT32 attacks

    Take your first step to minimize the impact of the new APT group.
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Enterprise Networks against Advanced Attacks
  • Live at: May 29 2015 4:00 am
  • Presented by: Rajiv Raghunarayan, Director, Product Marketing
  • From:
Your email has been sent.
or close