Hi [[ session.user.profile.firstName ]]

7 Questions To Consider When Looking For An Effective Endpoint Security Solution

The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
Recorded Jan 25 2017 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc.
Presentation preview: 7 Questions To Consider When Looking For An Effective Endpoint Security Solution

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Rethink Cyber Defense Strategies Starting with Threats Jun 9 2020 6:00 pm UTC 60 mins
    Peter Watts, former Director for Cybersecurity Policy, National Security Council
    Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
    Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces.
    In this session, Peter Watts, threat intelligence veteran and former Director for Cybersecurity Policy, National Security Council lays out:

    • A modern definition of threat intelligence with important milestones
    • How to recognize and develop critical success factors for producing or consuming threat intelligence
    • The impact of actionable threat intelligence on security risk leaders and their organizations
    • Future use cases that may reshape how we think about cyber defense and business value
  • Tips for Securing Your Cloud Environments Jun 9 2020 5:00 pm UTC 60 mins
    Chris Romano, Mandiant Senior Consultant and Greg Blaum, Mandiant Principal Consultant
    For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye Mandiant experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.

    In this session, Mandiant consultants Greg Blaum and Chris Romano share lessons learned from real-world incident response experiences, identify some common pitfalls and provide best practices for organizations to harden their cloud environments and reduce the risk of compromise. They also discuss the pitfalls and best practices presented in M-Trends 2020.
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness Jun 9 2020 4:00 pm UTC 60 mins
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    -MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    -Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    -Impact of environmental drift on your security posture and how to plan for it
    -Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>
  • Take Control of Your Cloud Environments Jun 9 2020 3:00 pm UTC 60 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation Jun 9 2020 11:00 am UTC 60 mins
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye
    Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Security Validation enables you to:

    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT&CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The results can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • Security Validation - what is it and how can it improve security effectiveness? Jun 9 2020 9:00 am UTC 60 mins
    Mike Batten - VP Sales Engineering EMEA, FireEye
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • Intelligence-Driven Security Validation: Why Cyber Security needs Validation. Jun 9 2020 2:00 am UTC 60 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lacked the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high cost of their defenses.
    Security validation helps organizations validate and consolidate their existing security investments before throwing more tools at the problem. And by integrating and operationalizing threat intelligence, organizations can develop an effective, highly scalable security posture. During this session, you can learn how to achieve a more efficient, effective and future-proof security program through security validation.
  • Integrating Better Intelligence for Better Security Recorded: May 27 2020 50 mins
    James Graham, Sr. PMM, FireEye ; Jeff Guilfoyle, CISSP, Solution Architect, FireEye; Finian Mackin, Sr. PM, Anomali
    Anomali and FireEye Mandiant Threat Intelligence: Integrating Better Intelligence for Better Security

    As attackers grow more resourceful and effective in their efforts to expose and compromise users and their data, it is becoming more important than ever to integrate effective cyber threat intelligence to drive better detection and apply added context to potential threats. Anomali’s addition of FireEye Mandiant Threat Intelligence to its App Store presents a scalable way to integrate industry-leading threat intelligence into your security systems and program.

    Join experts from FireEye and Anomali for a panel discussion surrounding the value of cyber threat intelligence, the need for increased integration of intelligence to drive better security, and the added value that a combined Anomali-FireEye solution can provide.​

    Register Now!
  • Navigating MAZE: Analysis of a Rising Ransomware Threat Recorded: May 21 2020 58 mins
    Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence & Jeremy Kennelly, Manager, Mandiant Threat Intelligence
    The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.

    Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.

    In this exclusive webinar, attendees will learn about:
    •Common intrusion vectors across MAZE ransomware incidents
    •Actors’ reliance upon open-source and commercially available attack tools
    •Data exfiltration techniques present across most MAZE ransomware incidents
  • 2020 Mandiant Security Effectiveness Report Findings Recorded: May 19 2020 60 mins
    Matt Hartley SVP Mandiant Strategy for FireEye Mandiant & Devon Goforth Sr Dir Security Instrumentation for FireEye Mandiant
    2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality

    Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

    The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.

    Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:

    - Do I have confidence in the effectiveness of my security controls?
    - Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
    - Am I stopping data leakage and protecting data integrity?
    - How can I simplify and standardize my security stack?
    - Do I have evidence to support communicating key metrics to executives?

    Register Now to Reserve Your Seat!
  • 电子邮件防御方案–您的第一道资安防线 Recorded: May 14 2020 36 mins
    FireEye 大中華區技术顾问 郑聿铭
    91% 的成功入侵也是來自電子郵件,冒充高管和供應鏈合作夥伴是一個日益嚴重的問題。 這網路研討會將探討解決這些威脅的方案,而這些威脅可能未被發現並仍潛伏在您的收件箱中。
  • Security Effectiveness Strategies Recorded: May 13 2020 59 mins
    General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Intel Consulting
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

    Register Now
  • Intelligence Led Threat Protection For SaaS-Mobile Environments Recorded: May 6 2020 60 mins
    Rob Ayoub, Sr. Product Marketing Manager, FireEye; Salah Nassar, VP of Marketing, CipherCloud, Inc.
    The continued migration to the cloud and the unprecedented rise in the number of employees working from home has created challenging security implications, leaving many organizations scrambling to gain needed visibility and control into their SaaS/Cloud usage. With employees working remotely, SOC teams need to see threats wherever their companies do business and the ability to reduce those threats as quickly as possible.

    In this webinar, we will discuss how FireEye’s detection capabilities can be combined with CipherCloud to stop malicious content from being shared.

    Register Now!
  • Threat Intelligence Drives Effective Vulnerability Management Recorded: Apr 30 2020 57 mins
    Jared Semrau, Sr. Mgr.,Vulnerability and Exploitation, Mandiant; Kathleen Metrick, Analyst, Strategic Intelligence, Mandiant
    Organizations value cyber threat intelligence (CTI) because it helps their security teams stay focused on, and stay ahead of, the most impactful threats. One of the critical strategic and tactical roles that CTI plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk.

    Join us to hear FireEye Threat Intelligence experts, Jared Semrau and Kathleen Metrick share:
    • The importance of comprehensive CTI to drive better-informed vulnerability management decisions
    • Insight into how FireEye tracks, prioritizes and categorizes vulnerabilities to help organizations more effectively manage and mitigate the risks associated with these potential threats
    • The latest research findings around the speed and frequency of exploitation

    Register for the webinar
  • M-Trends 2020: Insights into Today’s Cyber Attacks| The APAC Perspective Recorded: Apr 17 2020 60 mins
    Rob van der Ende, Senior VP, FireEye Mandiant and Steve Ledzian, VP CTO APAC, FireEye
    Protect your organization against today’s most dangerous attackers.
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from the M-Trends 2020 Report - our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber-attacks in 2019.

    Join us for this webinar, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition with insights and trends in the APAC region, including:
    • Perspectives on trending attacks and how to combat them
    • Details on the most active attack groups in 2019
    • Malware family trends
    • Insights from cloud investigations, along with common weaknesses and best practices
    • Case studies with practical security lessons
  • Knowing is Half the Battle: Cloud Visibility and Protection Recorded: Apr 14 2020 59 mins
    Martin Holste, Cloud CTO, FireEye featuring Andras Cser, VP, Principal Analyst, Security and Risk, Forrester
    As organizations move more data into multi-cloud environments, it becomes increasingly difficult to protect against cyber attacks. You need to know where your data is and have the visibility you need to control and protect your assets.

    Join this webinar on Tuesday, April 14, 2020 at 8 a.m. PT/11 a.m. ET to uncover how to optimize your organization’s cloud security solution. Hear industry expert Martin Holste and featured speaker, Andras Cser, as they help attendees to:

    • Learn what cloud providers do and do not secure under the shared responsibility model
    • Understand why it’s important to identify and track changes to assets and permissions
    • Discover how to establish robust visibility and detection across all cloud environments to reduce overall risk
  • 被揭穿的5大雲端安全迷思 Recorded: Apr 2 2020 34 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    到2022年,至少有95%的雲端資安故障預計是來自客戶的過失(Gartner)。但是,改變您對雲端安全的看法,就可以成為一個成功的故事。
    在這研討會揭示一些關於遷移到雲端常見的神話,這些神話會危及您快速並安全地遷移到雲端。
  • They Come in the Night: Emerging Ransomware Trends Recorded: Mar 31 2020 57 mins
    Kelli Vanderlee Manager, Intelligence Analysis, FireEye & Kimberly Goody, Sr. Manager, FireEye Intelligence
    Ransomware is remote digital extortion. Disruptive and costly to address, it affects all kinds of organizations, from space technology firms to global manufacturers and industrial environments.

    FireEye Threat Intelligence research has uncovered an increasing number of common characteristics in ransomware attacks, including new trends in intrusion vectors, dwell time, deployment time of day and the use of additional tactics to increase leverage against victims.

    Join Threat Intelligence experts Kelli Vanderlee and Kimberly Goody, on Tuesday, March 31, 2020 at 8 a.m. PT/11 a.m. ET, to learn about the latest research and ask them critical questions. During this presentation, attendees will hear about:

    • The latest ransomware threats
    • Threat actor tactics
    • Ways to use this intelligence to defend your organization

    Register for the webinar
  • FireEye線上研討會 - 取回您的資安監控掌控權 Recorded: Mar 24 2020 45 mins
    零壹科技 技術顧問 謝季樺
    網路安全正面臨前所未有的挑戰。幾乎每一天,都有新的威脅暴露出公司的脆弱性,迫使他們購買更 多產品並僱用更多的人才。這些反應式方法導致複雜性不斷升級,使得另一個漏洞攻擊者可以趁機利用。「資安監控」無論大或小都需要全面和基礎的方法。
  • 如何應對 COVID-19 資安危機 Recorded: Mar 20 2020 34 mins
    Matthew Wong, FireEye 技術顧問
    近日由於大眾對COVID-19的廣泛興趣,犯罪分子和間諜威脅者都在散佈著圍繞COVID-19大流行為主題的惡意文件。

    網路犯罪分子和間諜行為者都借助這次危機來達到其目標。 在這網路研討會中,我們的專家會分享這些參與者到底在做什麼,以及如何阻止他們。
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 7 Questions To Consider When Looking For An Effective Endpoint Security Solution
  • Live at: Jan 25 2017 2:00 pm
  • Presented by: Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc.
  • From:
Your email has been sent.
or close