Hi [[ session.user.profile.firstName ]]

Good Enough Security: Is It Hurting Your Business

“Good Enough Security: Is It Hurting Your Business “
Imagine a continuous state of alarm - that alarm sounding every second …24 hours a day …7 days a week …all year long …
That’s the situation IT security teams around the world face with their cybersecurity tools. With so many alerts, it is not your security that is working hard, it’s your security team. And with so many alerts to review a security team can end up with alert fatigue, causing them to ignore a high percentage of the messages. When that happens, cyber attacks can slip by.
Organizations with traditional defenses often face an uncomfortable and expensive tradeoff: add security staff and tools at considerable cost or risk fatigue and missing a critical alert.
Truth is, you can avoid this tradeoff.
Join the FireEye webinar “Good Enough Security: Is It Hurting Your Business” where we will throw some light on:

1.The true costs of ineffective security
2.Detection Efficacy: Invest in security tools that highlight alerts that matter
3.Key considerations when evaluating a cyber security solution - The need for a platform that includes response
Register Today
The FireEye Team
Time to check your security posture!


Date: Wednesday, 22nd June 2016
Time: 11:00 a.m
Duration: 40 mins. and Q&A
Speaker: Shantanu Mahajan, Consulting Engineer, FireEye Technologies Pvt Ltd.
Recorded Jun 22 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Shantanu Mahajan, Consulting Engineer, FireEye Technologies Pvt Ltd
Presentation preview: Good Enough Security: Is It Hurting Your Business

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Evolving to an Intel-led Security Organization May 21 2019 5:30 am UTC 60 mins
    Shantanu Mahajan, Regional Security Architect – India & SAARC
    Threat intelligence has the power to enhance an organization’s security effectiveness, improve its time-to-response, and reduce business risk. No matter where an organization is on the continuum of security operations maturity, threat intelligence can provide significant value. The question is, what is the best way to maximize that value? What advantages can you gain through simple process or technology changes to ensure that you’re ready to respond quickly to the threats that matter?
  • Leading with threat intelligence – How to select the right security provider Apr 30 2019 5:30 am UTC 60 mins
    Shantanu Mahajan, Regional Security Architect at FireEye
    Today’s sophisticated attackers often hide within the noise of abundant alerts generated by a myriad of security products. Limited budgets, a shortage of skilled security staff, and rigid regulatory requirements make it difficult for organizations to effectively identify and understand these threats—negatively affecting risk-based decision making and asset protection.

    Effective cyber security requires an understanding of who is likely to target you, and how they operate.

    As security leaders and executives turn to service providers to evaluate their security maturity, manage business risks and build sustainable security programs, they often ask ‘how do I select the right security partner for my organization?’

    Join Shantanu Mahajan, Regional Security Architect at FireEye, as he shares insights on:

    • Selecting the right service provider for your organization
    • Realizing limitations of providers who apply traditional and compliance-focused approaches
    • Working with providers who intimately monitor attackers across the evolving threat landscape
    • Understanding the role of cyber threat intelligence in effective cyber security services
    • Asking the right questions of your security providers to enable critical business decisions
  • A 360-Degree View of the Latest APT Groups Recorded: Apr 18 2019 58 mins
    Fred Plan, Sr. Threat Intel Analyst, FireEye
    FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.

    The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.

    In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:

    • A high-level overview on how nation-state interests are driving APT activity
    • Insight into the most recent APT groups investigated by FireEye
    • The latest adversary tactics, techniques and procedures (TTPs) these groups use

    Register NOW for the live webinar
  • The Email Security Goal: ONE Single Solution Recorded: Mar 19 2019 50 mins
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • M-Trends 2019: Trends Behind Today's Cyber Attacks Recorded: Mar 14 2019 58 mins
    Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    Join us for this webinar, as experts, Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Hidden risks found across M&A business activities
    • Best practices lessons learned from the front lines of incident response


    Register for the webinar NOW!
  • FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends Recorded: Mar 11 2019 20 mins
    Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEye
    FireEye Chat
    Front and Center with Today’s Leading Cyber Security Experts

    FireEye Chat is a new quarterly talk show that brings guest experts front and center to cover today’s most important cybersecurity topics.

    Episode #1: Front and Center with Kevin Mandia and the Evolution of M-Trends

    Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it. They also cover:
    • Key milestones in the evolution of the report
    • How M-Trends has raised awareness about the importance of cyber security
    • The most significant trends in today’s cyber threat landscape.

    Watch now to get unique insights, direct from the frontlines, in what promises to be a series of lively and thought-provoking exchanges.
  • Top 5 Cloud Security Myths Debunked Recorded: Feb 28 2019 56 mins
    Martin Holste, CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar on Thursday, February 28, helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • The Best Way to Assess Incident Response Preparedness Recorded: Feb 21 2019 56 mins
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • The Cyber Security Skills Gap Recorded: Jan 30 2019 58 mins
    Shantanu Mahajan, Regional Security Architect - India, FireEye
    Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.

    During this webinar we will be covering how the industry has been affected by a cyber-skills shortage and the challenges of inhouse vs. outsourcing of cyber security operations. And how this gap can be covered with ‘on-demand’ expert resources who have with them, real time insight and expertise of dealing with cyber breaches.
  • Big-Guy Security for the Little Guy Recorded: Dec 13 2018 51 mins
    Claudio Scarabello Director Product, APAC FireEye Inc
    Threats Actors Target Vendors to Large Organisations

    We observe that state-sponsored espionage groups steal intellectual property for economic advantage. While the main players appear to understand this threat, many smaller supply-chain vendors and contractors may not. The targeting of third-party vendors and contractors is a tactic these threat actors are increasingly using to spy on hardened targets. A recent discovery of a treasure trove of openly available sensitive data is a reminder and call-to-action for many smaller enterprises to improve their cyber resilience. Attend this session to hear more about this case and threat actors potentially using these tactics.
    Join if you’re from a large organization that needs to understand third-party risk or if you’re from a small organization that needs to demonstrate due diligence to your largest customers.
  • Facing Forward: Cyber Security in 2019 and Beyond Recorded: Dec 11 2018 57 mins
    Christopher Porter, Chief Intelligence Strategist, FireEye
    As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

    Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye Threat Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

    •Threats to the aviation industry, including cyber espionage and cybercrime
    •What to expect from established and emerging nation states
    •How threat actors are changing their tactics to stay ahead of defenders

    Register today to learn what lies ahead and stay one step ahead of cyber security threats.
  • 通過網絡取證揭示隱藏的網絡威脅 Recorded: Nov 22 2018 40 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    許多現代網絡攻擊通常繞過防火牆和其他外圍防禦,讓資安人員發揮“打擊鼴鼠”的作用,盡可能快速有效地擊敗威脅。 網絡取證策略可以讓資安團隊了解網絡流量,並讓他們快速找到隱藏在其網絡中的威脅。
    Manfred Hung技術顧問將詳細介紹:
    •了解網絡取證策略的好處
    •利用網絡取證來提高安全性並提高流量可見性
    •深入了解網絡取證如何改善事件回應時間並將損失風險降至最低
    •了解網絡取證如何實現追溯並狩捕威脅
  • 人工智能和未來的網絡衝突 Recorded: Nov 15 2018 42 mins
    蕭松瀛, Nicholas Hsiao, FireEye 技術顧問
    在網絡世界中攻擊者使用人工智能(AI)將導致攻擊更具針對性,影響更多人,並造成更大傷害。 資安專業人員必須了解這沖突對未來攻擊有什麼含意。
    此外,隨著越來越多公司將AI應用程序集成到他們的業務中,他們必須了解與此技術相關的風險。
    Nicholas Hsiao 北亞技術顧問在人工智能系列的最終回講解以下議題:
    •隨著攻擊者開發和執行AI的能力,地緣政治格局也隨之轉變
    •在業務中使用AI應用程序,相關漏洞和風險緩解方法
  • APT38: Un-usual Suspects Recorded: Nov 15 2018 42 mins
    FireEye
    APT38 is a newly identified cyber-crime organization that has attempted to steal over $1.1 billion by attacking more than 16 financial organizations in 13 different countries – many of them located in the Asia Pacific region. This North Korean regime-backed group is careful in its planning and often lives in a compromised victim environment for months before initiating their fraudulent banking transactions.

    Please join the FireEye experts for a detailed discussion on the tactics, techniques and procedures used by APT38 and what you can do to defend your organization.
  • 智慧端點防護的新境界: 超越一般防病毒產品 Recorded: Oct 25 2018 52 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    數十年來,防病毒(AV)保護已成為端點安全的基礎,儘管存在已知的防護差距。 為了應對不斷變化的威脅,組織需要一個可以加強防禦的集成端點解決方案。
    Manfred Hung技術顧問將詳細介紹:
    •為何端點安全產品未能提供完整保護
    •全面的端點保護解決方案所需的功能
    oAV與威脅情報
    o檢測和響應
    o行為和利用分析
    o可視性和自動化
    •FireEye Endpoint Security解決方案如何以單一控制台,能夠快速地從檢測到調查和修復
  • Connecting the Dots: the Importance of an Integrated Security Solution Recorded: Oct 24 2018 51 mins
    Misha Sokolnikov, Director of Product Marketing, FireEye
    As cyber threats continue to proliferate and expand, so does the arsenal of tools organizations employ to protect against the attackers. With most security solutions equipping to solve only narrow problems, it has become the norm for organizations to deploy an unbearable amount of technologies. Join Misha Sokolnikov, Director of Product Marketing, FireEye as he provides:

    • An overview of why security solutions today are not integrated and cause complexity, inefficiencies and excessive alert noise
    • The tactics that threat actors use to take advantage of disjointed, complex security technologies
    • The most critical threat vectors and how the consolidation and integration of security tools can help you improve your security posture

    Register Now!
  • Executive Panel | Financial Services: Cyber Threats on the Horizon Recorded: Oct 24 2018 25 mins
    Kevin Taylor, EMEA VP; Sandra Joyce, VP, Global Intel Operations; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP
    Cyber threats plague the financial services industry:
    • Advanced persistent threat (APT) actors seek to support economic reforms and reach state goals
    • Financial threat actors seek financial gain through the direct theft of funds or the sale of stolen information
    • Disruptive threat actors and hacktivists seek to gain publicity, divert banks' attentions, or demonstrate a political motive

    Any one of these threats would increase activity in an industry, but the presence of all three likely accounts for the large number of intrusions in financial services organizations.

    Join us for a live video panel and get executive insights for critical topics relevant to the financial services industry, including the:
    • Nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs)
    • Ripple effect consequences of geopolitics
    • Cost of a breach and importance of risk awareness in the boardroom
    • Need to keep GDPR a high priority
  • Autopsy of a real ICS case – TRITON Recorded: Oct 24 2018 47 mins
    David Grout, Director Technical, South EMEA, FireEye
    Mandiant responded to an incident in 2017 at a critical infrastructure organisation where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. This malware, called TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.

    Join David Grout, our Technical Director for South EMEA, for a live session and get insights into the technical framework details and the potential outcomes.
  • The Double-Edged Sword of Cloud Security Recorded: Oct 24 2018 31 mins
    Shashwath Hegde, Solutions Architect, APAC, FireEye
    In many ways, public cloud is more secure than a traditional data center. And yet, assets on the public cloud are still being compromised just as those stored in traditional data centers. Mandiant, the industry leader in incident response consulting, estimates that 15 percent of all of its incident response involves public cloud assets. So, if the cloud is more secure, why is it still getting hacked?

    In this session, we will discuss
    • the challenges in Cloud Security
    • how to design an effective strategy to tackle them
  • Cyber Security Risk Management –New Methods to Gain Control Recorded: Oct 23 2018 58 mins
    Matthew Keane, Sr. Director, FireEye, Travis Fry, Sr. Consultant, FireEye & Michelle Visser, Partner, Ropes & Gray
    Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.

    This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.

    Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:

    • Security risks across the complete cyber attack lifecycle, not only detection and response
    • A simple and proven method for approaching the risk reality facing all organizations
    • The rising cyber security insurance market and how it will affect risk management efforts
    • Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
    • Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
    • Best practice exercises to test your incident response plan based on real-world experiences
    • Techniques for effectively reporting risk and capability needs to a Board-level audience
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Good Enough Security: Is It Hurting Your Business
  • Live at: Jun 22 2016 5:30 am
  • Presented by: Shantanu Mahajan, Consulting Engineer, FireEye Technologies Pvt Ltd
  • From:
Your email has been sent.
or close