Hi [[ session.user.profile.firstName ]]

Ransomware : A Disruption or Distraction?

It is 8:00 am, and you are on the way to work. You get a frenetic call from your office – “hackers are holding your computers hostage in exchange for a ransom”. Your order processing application is one of the casualties. Your last successful backup was over a month ago. Do you pay the ransom and regain control? Your money or your data?
This scene may seem to be straight out of a Hollywood movie, but for several organisations, it has become an unfortunate reality today. Ransomware is a growing menace to enterprises and consumers alike, and given the recent trends observed by FireEye, it is here to stay. Some ransomware variants encrypt your critical files, others lock you out of the systems. Some demand bitcoins, others demand payment vouchers. Some are a disruption to your business, others are just a distraction.
Join the FireEye webinar “Ransomware: A Disruption or Distraction", and get an in-depth view into the mechanics of ransomware. You will learn about:
1.Ransomware: Impact & Trends
2.The Economics of Ransomware
3.A Distraction or Disruption
4.Lessons Learned: Tackling Ransomware
Recorded Jun 1 2016 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vipul Kumra,Consulting Engineer, FireEye India
Presentation preview: Ransomware : A Disruption or Distraction?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • AI and the Future of Cyber Conflict Jul 31 2018 3:00 am UTC 75 mins
    Claudio Scarabello, Director Product, APAC, FireEye
    Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.

    Additionally, as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.

    Join Claudio Scarabello, Director Product, APAC, FireEye, for the final episode of our three-part series on AI as we discuss the:

    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Use of AI applications in businesses and associated vulnerabilities
  • The Impact of Artificial Intelligence in the Cyber Domain Jun 28 2018 3:00 am UTC 60 mins
    Claudio Scarabello, Director Product, APAC, FireEye
    Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense.

    Catch the second installation of our three-part webinar series on AI that covers:

    • How AI technology can enhance a businesses’ defensive capabilities
    • How cyber threats can use AI to improve the sophistication and scope of their attacks
    • How FireEye uses machine learning to bolster its internal defenses and tools

    Don’t miss part one of the three-part series “Artificial Intelligence in Cyber Warfare: A Primer” -
    https://www.brighttalk.com/webcast/10469/318781
  • M-Trends 2018 – 了解現今的網路攻擊趨勢 Recorded: Jun 13 2018 44 mins
    蕭松瀛, Nicholas Hsiao
    每年 FireEye 旗下之 Mandiant 公司顧問回應來自全球各地威脅組織的各種網路事件。在年度 M-Trends 報告中摘要了這些經驗,並在報告中探索資安攻擊情勢的變化。

    在此網路研討會中,Nicholas Hsiao 將會討論:

    •現今威脅情勢的長期趨勢
    •小心複雜且有害的 APT 組織
    •哪些組織最有可能成為攻擊者的目標
    •尋找專業技術人員的難處及其對資安運作的影響
    •資安基礎的弱點如何致使被成功入侵
    •改善資安防禦的紅隊演練戰術
  • Live Demo on FireEye Unified Security Platform Recorded: Jun 1 2018 43 mins
    Manfred Hung, Solution Architect, Greater China Region
    FireEye Unified Security Platform provides enterprise-grade protection against basic and sophisticated attackers. Network, email and endpoint alerts are integrated on a platform designed by front-line experts to prevent advanced attacks, accelerate incident response, and protect your core business.
    It allows organization to: -
    •control cost through simplification of purchasing and procurement
    •consolidate security vendors and gain improved synergy across multiple attack paths
    •accelerate discovery of serious incidents to reduce risk of business impact

    Join Manfred Hung, Solution Architect, Greater China Region of FireEye, to understand how these solutions can address your cybersecurity risks.

    Language: Mandarin
  • Artificial Intelligence in Cyber Warfare: A Primer Recorded: May 31 2018 63 mins
    Claudio Scarabello, Director Product, APAC, FireEye
    Artificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.In a live webinar, hear a key author of the report discuss what these findings reveal about advanced malware moving forward.

    Join Claudio Scarabello, Director Product, APAC, FireEye for the first installation of our three-part webinar series to:
    - Understand the fundamentals of AI, the differences between various techniques used to process data and the drawbacks to each approach.
    - Discuss how AI tools can be used for offensive and defensive purposes in the cyber domain.
    - Survey the future threat landscape and provide geopolitical context regarding how nations will use AI tools given their current levels of technological development and AI integration in civilian applications.
  • M-Trends 2018: Understanding Today's Cyber Attack Trends Recorded: May 3 2018 42 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services and Bryce Boland, FireEye APAC CTO
    Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.

    During this webinar, Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services and Bryce Boland, FireEye APAC CTO will discuss:

    - Longer-term trends in today's threat landscape
    - Sophisticated and harmful APT groups to look out for
    - Which organizations are most likely to be retargeted by attackers
    - The difficulty of finding skilled personnel and how it affects the security function
    - How weaknesses in security fundamentals contributed to successful compromises
    - Best practice red teaming tactics for improved security defense
  • The Real Cost of Data Breaches Recorded: Apr 25 2018 33 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services | FireEye
    The annual Cost of Data Breach study from the Ponemon Institute indicates a small year-over-year decline, but the average size and scope of data breaches continues to increase. Every year, Mandiant investigates more cyber incidents and we believe that the real cost of a data breach to an organization can be much higher than what is reported. The pending implementation of GDPR and its penalties for non-compliance, will also impact the costs to organizations.

    During this session we will share some insights with you into the damage attackers typically cause and what mitigating steps you can take to minimize the impact and cost of a data breach.
  • Mandatory Breach Disclosure and your Corporate Communications Strategy Recorded: Mar 20 2018 50 mins
    Patrick Neighorn, Head of Global Media Relations, FireEye and Jackson McKinley, Director of Incident Response, Mandiant
    In February 2018, Mandatory Data Breach Notification legislation took effect in Australia. It introduced unique challenges to the already difficult task of managing external communications after a cyber attack.

    On Tuesday, March 20, Patrick Neighorn, Head of Global Media Relations for FireEye, and Jackson McKinley, Director of Incident Response for Mandiant, a FireEye company, will share what happens behind the scenes when dealing with communications challenges during a breach.

    At this webinar, these two professionals will call on their extensive frontline experience with breached corporations worldwide to discuss: What common misperceptions exist regarding cyber forensic investigations, how long it takes executive teams to be notified and communications teams to be briefed, what information is typically shared and what organisations can do to effectively manage the message in the wake of a breach.

    Take this opportunity to better prepare for the upcoming Mandatory Breach Notification legislation.
  • Exclusive Q&A session : APT37 Recorded: Mar 16 2018 19 mins
    Benjamin Read, Senior Manager, Cyber Espionage at FireEye
    An exclusive 30-minute Q&A session with the presenter, Benjamin Read, Senior Manager, Cyber Espionage at FireEye

    Learn more about:
    •APT37’s historic support of North Korean interests.
    •Details on the malware suite employed by the actor.
    •Why APT37 is an emerging threat beyond the Korean peninsula.
  • APT37: The Overlooked North Korean Threat Recorded: Mar 8 2018 59 mins
    Ben Read, Senior Manager Cyber Espionage, FireEye
    Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.

    APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

    FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. Join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:

    • A history of APT37 support for North Korean interests
    • Details on the malware suite employed by APT37
    • How APT37 has been influencing the world beyond the Korean peninsula
  • Building a secure future for women in Cyber Security Recorded: Mar 6 2018 62 mins
    Zeina Zakhour, Denise Bedell, Vasu Jakkal, Roxy Dee, Emma Hunwick
    Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.

    Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.

    Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:

    -How did they make their first break?
    -Why does the industry have such a hard time retaining talent?
    -What are some of their favourite parts about their job?
    -Their advice to women in the industry
    -Their advice to cyber security execs looking to create more diverse teams

    Moderator: Denise Bedell (Content Innovo)
    Panelists:
    Zeina Zakhour (Atos), Vasu Jakkal (FireEye), Roxy Dee (Hurricane Labs), Emma Hunwick (PwC)
  • Cyber Evolution: En Route to Strengthening Resilience in Asia-Pacific Recorded: Feb 8 2018 52 mins
    Rob van der Ende, VP APJ, Mandiant, Douglas Ure, MD, Client Advisory Services, Marsh Asia, Richard Green, MD Marsh
    The cyber threat landscape is morphing constantly and dramatically. Around the world, cyber dependency grows as increasing digital interconnection among people, things, and organisations expand. Asia-Pacific (APAC) is no different.

    From currency volatility to political instability and evolving regulations, conducting business across borders today involves more risks – and companies must add cyber to their list of risk concerns. Financial services, energy and utilities, and telecommunications are among the most investigated industries in APAC, highlighting the urgent need for higher awareness levels, stronger mitigation measures, and improved cybersecurity postures.

    While there is no easy fix for these problems, we are seeing steps being taken in the right direction. The regulatory climate in the APAC region is beginning to change, even if slowly.

    As trusted cyber advisers, FireEye and Marsh & McLennan Companies – each a leader in its own field – have collaborated to share their insights to help organisations across APAC build and strengthen their enterprise cyber resilience.
  • Security Predictions for 2018: An APAC Viewpoint Recorded: Dec 13 2017 37 mins
    Bryce Boland, Asia Pacific CTO
    As the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Not many things are absolute in the security industry, but we know for certain that threat actors will continue to attack and defenders will be tasked with stopping them.

    Join Bryce Boland, Asia Pacific CTO at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail:

    •What types of nation-state activity we will be seeing
    •What new regulations such as GDPR mean for organizations
    •How to ensure a secure environment as more organizations migrate to the cloud

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Are APAC organisations response-ready to a data breach? Recorded: Nov 16 2017 45 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services | FireEye
    Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen.

    Mandiant, a FireEye Company, is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches.

    Join us for a discussion on the importance of being breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.
  • Incident Response: An Investigation Case Study Recorded: Oct 26 2017 39 mins
    Vivek Chudgar, Senior Director – Mandiant Consulting (APAC)
    TBA
  • An Elegant and Practical Model for Security Practitioners Recorded: Oct 25 2017 37 mins
    Christian Frain, Manager of Systems Engineering
    "Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.   Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
  • Delivering Advanced Security Capabilities to Any Organization: APAC Perspective Recorded: Oct 25 2017 58 mins
    Claudio Scarabello, Director, Product Marketing, APJ
    Today’s security operations are frequently disjointed and plagued by limited visibility and false alerts. As a result, organizations are unable to quickly and cost-effectively prioritize and respond to threats. FireEye can help deliver advanced security operations to any organization while disrupting the economics of security. Capabilities typically seen only in Fortune 50 companies will become available any FireEye solution. In this live webinar:

    - Learn about how a centralized security operations platform:
    o Improves visibility across your entire cyber security infrastructure
    o Surfaces and provides context for the most critical alerts
    o Empowers decision making to decrease the time from detection to response
    -See a demo of how Helix identifies and responds to an alert
    -Have the opportunity to ask questions in a live Q&A session
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" Recorded: Oct 24 2017 49 mins
    David Grout, Director, Southern Europe Systems Engineering, FireEye
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Asia Pacific Cyber Threat Landscape Recorded: Oct 24 2017 40 mins
    Bryce Boland, Asia Pacific CTO
    From the first time that criminal charges were files against a known state actor for hacking in 2014 to the recent US Senate Intelligence Committee hearing on Russian influence on the 2016 US Election, FireEye has been integral to investigations where cyber attacks resulted in the most significant impact on governments around the world. We will highlight some of the most public investigations, look to key government leaders to understand their perspective on the impact of cyber, and lastly review the top strategic mistakes that organizations make when trying to address cyber risk.
  • An Elegant and Practical Model for Security Practitioners Recorded: Sep 12 2017 48 mins
    Steve Ledzian, FireEye APAC
    "Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.

    Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ransomware : A Disruption or Distraction?
  • Live at: Jun 1 2016 5:30 am
  • Presented by: Vipul Kumra,Consulting Engineer, FireEye India
  • From:
Your email has been sent.
or close