Hi [[ session.user.profile.firstName ]]

How prepared are APAC organisations in responding to a data breach?

Our Mandiant consultants have responded to and investigated many of 2015's biggest security incidents. The insights gained from these consultancies provide us with a unique vantage point when it comes to understanding the ever-evolving cyber threat landscape.

This webinar will discuss key trends, statistics, and case studies to illustrate the evolution of the advanced threat actors over the last year in Asia Pacfic.

Register for the webinar and join Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan at FireEye as they dicsuss the top findings from this report and explains how to prepare and respond to a breach when it occurs
Recorded Sep 20 2016 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan
Presentation preview: How prepared are APAC organisations in responding to a data breach?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 通過網絡取證揭示隱藏的網絡威脅 Nov 22 2018 2:00 am UTC 60 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    許多現代網絡攻擊通常繞過防火牆和其他外圍防禦,讓資安人員發揮“打擊鼴鼠”的作用,盡可能快速有效地擊敗威脅。 網絡取證策略可以讓資安團隊了解網絡流量,並讓他們快速找到隱藏在其網絡中的威脅。
    Manfred Hung技術顧問將詳細介紹:
    •了解網絡取證策略的好處
    •利用網絡取證來提高安全性並提高流量可見性
    •深入了解網絡取證如何改善事件回應時間並將損失風險降至最低
    •了解網絡取證如何實現追溯並狩捕威脅
  • 人工智能和未來的網絡衝突 Recorded: Nov 15 2018 42 mins
    蕭松瀛, Nicholas Hsiao, FireEye 技術顧問
    在網絡世界中攻擊者使用人工智能(AI)將導致攻擊更具針對性,影響更多人,並造成更大傷害。 資安專業人員必須了解這沖突對未來攻擊有什麼含意。
    此外,隨著越來越多公司將AI應用程序集成到他們的業務中,他們必須了解與此技術相關的風險。
    Nicholas Hsiao 北亞技術顧問在人工智能系列的最終回講解以下議題:
    •隨著攻擊者開發和執行AI的能力,地緣政治格局也隨之轉變
    •在業務中使用AI應用程序,相關漏洞和風險緩解方法
  • APT38: Un-usual Suspects Recorded: Nov 15 2018 45 mins
    FireEye
    APT38 is a newly identified cyber-crime organization that has attempted to steal over $1.1 billion by attacking more than 16 financial organizations in 13 different countries – many of them located in the Asia Pacific region. This North Korean regime-backed group is careful in its planning and often lives in a compromised victim environment for months before initiating their fraudulent banking transactions.

    Please join the FireEye experts for a detailed discussion on the tactics, techniques and procedures used by APT38 and what you can do to defend your organization.
  • 智慧端點防護的新境界: 超越一般防病毒產品 Recorded: Oct 25 2018 52 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    數十年來,防病毒(AV)保護已成為端點安全的基礎,儘管存在已知的防護差距。 為了應對不斷變化的威脅,組織需要一個可以加強防禦的集成端點解決方案。
    Manfred Hung技術顧問將詳細介紹:
    •為何端點安全產品未能提供完整保護
    •全面的端點保護解決方案所需的功能
    oAV與威脅情報
    o檢測和響應
    o行為和利用分析
    o可視性和自動化
    •FireEye Endpoint Security解決方案如何以單一控制台,能夠快速地從檢測到調查和修復
  • Connecting the Dots: the Importance of an Integrated Security Solution Recorded: Oct 24 2018 51 mins
    Misha Sokolnikov, Director of Product Marketing, FireEye
    As cyber threats continue to proliferate and expand, so does the arsenal of tools organizations employ to protect against the attackers. With most security solutions equipping to solve only narrow problems, it has become the norm for organizations to deploy an unbearable amount of technologies. Join Misha Sokolnikov, Director of Product Marketing, FireEye as he provides:

    • An overview of why security solutions today are not integrated and cause complexity, inefficiencies and excessive alert noise
    • The tactics that threat actors use to take advantage of disjointed, complex security technologies
    • The most critical threat vectors and how the consolidation and integration of security tools can help you improve your security posture

    Register Now!
  • Executive Panel | Financial Services: Cyber Threats on the Horizon Recorded: Oct 24 2018 25 mins
    Kevin Taylor, EMEA VP; Sandra Joyce, VP, Global Intel Operations; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP
    Cyber threats plague the financial services industry:
    • Advanced persistent threat (APT) actors seek to support economic reforms and reach state goals
    • Financial threat actors seek financial gain through the direct theft of funds or the sale of stolen information
    • Disruptive threat actors and hacktivists seek to gain publicity, divert banks' attentions, or demonstrate a political motive

    Any one of these threats would increase activity in an industry, but the presence of all three likely accounts for the large number of intrusions in financial services organizations.

    Join us for a live video panel and get executive insights for critical topics relevant to the financial services industry, including the:
    • Nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs)
    • Ripple effect consequences of geopolitics
    • Cost of a breach and importance of risk awareness in the boardroom
    • Need to keep GDPR a high priority
  • Autopsy of a real ICS case – TRITON Recorded: Oct 24 2018 47 mins
    David Grout, Director Technical, South EMEA, FireEye
    Mandiant responded to an incident in 2017 at a critical infrastructure organisation where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. This malware, called TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.

    Join David Grout, our Technical Director for South EMEA, for a live session and get insights into the technical framework details and the potential outcomes.
  • The Double-Edged Sword of Cloud Security Recorded: Oct 24 2018 31 mins
    Shashwath Hegde, Solutions Architect, APAC, FireEye
    In many ways, public cloud is more secure than a traditional data center. And yet, assets on the public cloud are still being compromised just as those stored in traditional data centers. Mandiant, the industry leader in incident response consulting, estimates that 15 percent of all of its incident response involves public cloud assets. So, if the cloud is more secure, why is it still getting hacked?

    In this session, we will discuss
    • the challenges in Cloud Security
    • how to design an effective strategy to tackle them
  • Cyber Security Risk Management –New Methods to Gain Control Recorded: Oct 23 2018 58 mins
    Matthew Keane, Sr. Director, FireEye, Travis Fry, Sr. Consultant, FireEye & Michelle Visser, Partner, Ropes & Gray
    Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.

    This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.

    Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:

    • Security risks across the complete cyber attack lifecycle, not only detection and response
    • A simple and proven method for approaching the risk reality facing all organizations
    • The rising cyber security insurance market and how it will affect risk management efforts
    • Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
    • Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
    • Best practice exercises to test your incident response plan based on real-world experiences
    • Techniques for effectively reporting risk and capability needs to a Board-level audience
  • How to Elevate Security as a Boardroom Priority Recorded: Oct 23 2018 61 mins
    Simon Moor, Director, Northern Europe, FireEye; Duncan Brown, Associate VP, European Infrastructure & Security, IDC EMEA
    Despite the continued focus on security and cyber-risk, most organisations demonstrate poor alignment between the business and security in the consideration of risk. This disconnect can start right at the beginning of a business process, where security is often not involved early enough (or at all) in strategic projects. Boardroom visibility of security threats is often weak, while the nature of security threats means that a continuous reassessment of risk is required, but rarely occurs.

    This webinar explores the gap between security and business risk, and examines the opportunities for alignment in Digital Trust, as a prerequisite for digital transformation.
  • Are you Ready to Handle a Cyber Crisis? Recorded: Oct 23 2018 59 mins
    Rob van der Ende, VP APJ, Mandiant, a FireEye company & Mimi Yang, Senior Foreign Legal Consultant Ropes & Gray
    How prepared are you and your organization to respond to a data breach?
    Executives and their teams in PR/Communications, Cybersecurity, IT, (external) Legal Counsel, and others, should all be intimately aware of the Breach Response Plan and practice their tasks regularly through a Cyber Breach Simulation, or Tabletop Exercise.

    Ropes & Gray and Mandiant have joined forces to help you evaluate your organization’s ability to respond effectively to a cyber incident before it occurs. The Tabletop Exercise uses gameplay techniques to assess your cyber crisis processes, tools and proficiency from legal, governance and technical perspectives. During the exercise, multiple scenarios based on real-world experience are simulated in a roundtable environment, allowing Ropes & Gray to provide concrete legal advice to your organization based on the results, including advice on potential enhancements to your organization’s cyber breach and incident response preparedness that Mandiant and Ropes & Gray identify through the exercise.

    About Ropes & Gray
    Ropes & Gray privacy & cybersecurity attorneys have advised and assisted clients in responding to cyberincidents of multiple shapes and sizes, including many of the largest incidents in history, and apply that extensive background to counsel clients on cybersecurity incident preparedness.

    About Mandiant
    Mandiant, a FireEye company, has over 14 years of near-daily interaction with organized, persistent attackers and threat groups around the world. Mandiant consultants spend hundreds of thousands of hours annually working with organizations of all sizes to remediate security breaches, identify vulnerabilities and provide guidance on closing security gaps.
  • Cyber Security in Today's IoT World Recorded: Oct 22 2018 41 mins
    Parnian Najafi Borazjani, Senior Analyst, FireEye
    IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.

    The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
    Moreover, device consumers such as corporations should be aware of their attack surface.

    Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
  • Your breach readiness master plan: take the sting out of a cyber attack Recorded: Oct 22 2018 61 mins
    Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant
    With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

    “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

    Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

    •How to identify security maturity improvement areas before, during and after a breach
    •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
    •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
    •Which key strategic communication tactics should be considered when reporting a breach
  • What Executives Should Know about Cyber AI Recorded: Oct 22 2018 54 mins
    Claudio Scarabello Director Product, APAC FireEye Inc
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • FireEye Global Threat Response – How we Protect the World Recorded: Oct 22 2018 57 mins
    Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • FireEye Cyber Resilience Virtual Summit Recorded: Oct 18 2018 5 mins
    Vasu Jakkal, Executive Vice President and Chief Marketing Officer, FireEye
    Executive Vice President and Chief Marketing Officer, Vasu Jakkal, shares what you can expect from the Cyber Resilience Virtual Summit. Learn why the intelligence-led approach matters and what you need to know to prepare, defend and protect your organization from a breach.
  • 人工智能在網絡領域的影響 Recorded: Oct 18 2018 48 mins
    蕭松瀛, Nicholas Hsiao, FireEye 技術顧問
    人工智能(AI)為企業提供了更好的方法來保護他們的系統,但它也為黑客提供了更好的方法來破壞這些系統。 企業需要了解AI在依賴網絡防御之前如何影響網絡安全。
    Nicholas Hsiao 北亞技術顧問將會討論有關人工智能系列的第二單元:
    •人工智能技術如何加強企業的防禦能力
    •網絡威脅如何利用人工智能提高攻擊的複雜性和範圍
    •FireEye如何使用機器學習來增強其內部防禦和工具
  • SOAR above your legacy Security Operations Center Recorded: Sep 27 2018 23 mins
    Shashwath Hegde, Solutions Architect, APAC, FireEye
    In this session, we begin by touring a typical Security Operations Center (SOC) and study the day to day activities of the various functions inside. We then explore the various challenges faced by these functions and introduce the idea of taking a platform approach. We wrap the session with an outlook at the future of Security Operations using this approach to consolidate, facilitate and automate workflows of the entire Security Operations Center (SOC).
  • 網絡戰中的人工智能:入門 Recorded: Sep 20 2018 44 mins
    蕭松瀛, Nicholas Hsiao, FireEye 技術顧問
    人工智能(AI)是一種變革性的雙用途技術,可以為組織提供更好的網絡防禦工具,並幫助對手改進攻擊方法。 更有效地了解人工智能的當前和未來潛力﹔將有助於用戶了解相關新興技術如何影響他們的業務。
    Nicholas Hsiao技術顧問將會分三個單元討論人工智能,在第一單元會講解以下議題:
    •了解AI的基本原理,用於處理數據的各種技術之間的差異以及每種方法的缺點。
    •討論如何將AI工具用於網絡領域的攻擊和防禦性目的。
    •深測未來的威脅形勢,並提供有關各國如何使用人工智能工具的地緣政治背景,考慮到他們目前的技術發展水平和人工智能在民用應用中的整合
  • You're Hacked and You Know It: Incident Response is my Better Half Recorded: Sep 11 2018 46 mins
    Claudio Scarabello, Director Product, APAC, FireEye
    Your security operations centre just discovered a major breach. It’s not clear what the attackers stole but so far it looks bad. What happens next? Do you have a well-prepared response plan, and has it been tested before today?

    Robust incident response capabilities are often overlooked in cyber security programs since emphasis is predominantly on preventing a breach and any budget allocated to breach response would seem like an admission of failure. This presentation uncovers what are the real challenges faced by organizations and uses a real-world case study, Cybersecurity Malaysia, as a backdrop to outline the solutions. Take 30 minutes to gain actionable tips so you can validate the preparedness of your organization.
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How prepared are APAC organisations in responding to a data breach?
  • Live at: Sep 20 2016 4:00 am
  • Presented by: Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan
  • From:
Your email has been sent.
or close