Hi [[ session.user.profile.firstName ]]

It’s Time to Build Your Breach Response Plan

The first half of 2017 was the tipping point for cyber threats globally. Organizations had to defend themselves against two cyber attacks involving rapid spreading malware. The latest incident severely disrupted global enterprises, causing significant downtime and impacting their revenue.

Such high-profile, large-scale attacks show us that no organisation is safe from the reach of cyber-criminality. Responding to these attacks will become more critical as breaches will have to be reported to the relevant regulatory body. By understanding your current security posture - internal processes and technology – combined with the external threat landscape – organisations can prepare themselves should a breach occur.

In this webinar, you will learn how to assess your risk profile, evaluate your operational strengths and weaknesses as well as your tactical approach to responding to co-ordinated, targeted attacks.
Recorded Dec 6 2017 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rob van der Ende Vice President, Asia Pacific & Japan and Paul Heaton, Senior Manager Mandiant Consulting Services | FireEye
Presentation preview: It’s Time to Build Your Breach Response Plan

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SOAR above your legacy Security Operations Center Sep 27 2018 3:00 am UTC 60 mins
    Shashwath Hegde, Solutions Architect, APAC, FireEye
    In this session, we begin by touring a typical Security Operations Center (SOC) and study the day to day activities of the various functions inside. We then explore the various challenges faced by these functions and introduce the idea of taking a platform approach. We wrap the session with an outlook at the future of Security Operations using this approach to consolidate, facilitate and automate workflows of the entire Security Operations Center (SOC).
  • 模仿電郵威脅 – 層出不窮的面具 Aug 23 2018 2:00 am UTC 60 mins
    洪文輝, Manfred Hung, FireEye 技術顧問
    您始終無法相信電子郵件的發件人真正發送了它。 模仿威脅正變得越來越流行,用戶也難以發現。

    在此網路研討會中,Nicholas Hsiao 北亞技術顧問將會討論“模仿電郵威脅 – 層出不窮的面具”,深入探討模仿攻擊背後的細節:
    • 涉及什麼心理認證
    • 攻擊者如何捕捉接受者的想像力和情感
    • 模仿攻擊是如何演變的
    • 模仿的未來是什麼
    • 威脅情報和電郵安全的速度如何影響網絡風險
  • IDC names FireEye as a Leader - MarketScape: APAC Threat Lifecycle Services 2018 Recorded: Aug 14 2018 39 mins
    Rob van der Ende, Vice President Asia Pacific & Japan, Mandiant, a FireEye company
    The cyber threat landscape is continuously evolving. Attackers develop new tools and techniques to breach technology environments, faster than most defenders can keep up with.

    IDC, a leading industry analyst firm, recently published a report called ‘MarketScape: Asia Pacific Threat Lifecycle Services 2018’, which highlights how organizations are struggling to rapidly identify the threats that really matter, due to a lack of visibility into both insider and external threats.

    In this webinar we will share with you how FireEye addresses this challenge through access to unique threat intelligence, collated from all the breaches we have been investigating around the world for more than 14 years, learning and observing the human aspects of the attackers.

    We believe that more visibility into attacker behaviour across the organization leads to efficient and effective threat detection and supports thorough remediation.

    Find out how services that span the full threat lifecycle can counter the threats organisations face from adversaries and help them become more resilient to breaches.
  • AI and the Future of Cyber Conflict Recorded: Jul 31 2018 61 mins
    Claudio Scarabello, Director Product, APAC, FireEye
    Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.

    Additionally, as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.

    Join Claudio Scarabello, Director Product, APAC, FireEye, for the final episode of our three-part series on AI as we discuss the:

    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Use of AI applications in businesses and associated vulnerabilities
  • Impersonation: The Many Masks of Email Threats Recorded: Jul 27 2018 50 mins
    Ken Bagnall, Vice President, Email Security
    You can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot.

    Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks:

    • What psychological authentication involves
    • How attackers prey on recipients’ imagination and emotions
    • How impersonation attacks are evolving
    • What is in the future for impersonation
    • How threat intelligence and the speed of email security impact cyber risk
  • TEMP.Periscope Surfaces in Cambodia: A Chinese espionage operation Recorded: Jul 24 2018 30 mins
    Tim Wellsmore, Director, Government Security Programs, APAC and Ben Wilson, Threat Intelligence Analyst
    Earlier this month, FireEye revealed an extensive cyber espionage carried out by China-linked TEMP.Periscope which targeted Cambodia’s political system. The effort—which was covered by Bloomberg, Time, Associated Press and others—compromised multiple ministries, diplomats and opposition members. It was carried out by China’s second most active cyber espionage groups, which has previously targeted US-, Europe- and Asia-based organizations.

    Join Tim Wellsmore, Director, Government Security Programs, APAC and Ben Wilson, Threat Intelligence Analyst for the webinar to learn more about TEMP.Periscope’s mission, and its attacker tactics, techniques and procedures.
  • How To Manage Your Risk with Threat Intelligence Recorded: Jul 18 2018 24 mins
    Rob Van Der Ende, Vice President Asia Pacific & Japan, FireEye Inc.
    Organizations continue to fight an asymmetric battle on the cyber front. Attackers are sophisticated, well-funded, well-organized and use highly targeted techniques. Security teams routinely struggle to understand which cyber threats pose the greatest risk to them and how to prioritize those they discover.

    Most organizations stake their security efficacy on legacy, signature-based tactical intelligence feeds that can’t anticipate attacks or provide context to guide response. Instead, these feeds increase alert volumes with false positives that make it nearly impossible to detect attacks and provide a false sense of security.

    The right threat intelligence can help organizations drive business efficiencies, by proactively assessing and managing risks that are relevant, improved detection and prevention of attacks, and building attack context for the alerts that they face.

    Find out how threat intelligence helps you stay on top of an evolving threat landscape.
  • The Impact of Artificial Intelligence in the Cyber Domain Recorded: Jun 28 2018 61 mins
    Claudio Scarabello, Director Product, APAC, FireEye
    Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense.

    Catch the second installation of our three-part webinar series on AI that covers:

    • How AI technology can enhance a businesses’ defensive capabilities
    • How cyber threats can use AI to improve the sophistication and scope of their attacks
    • How FireEye uses machine learning to bolster its internal defenses and tools

    Don’t miss part one of the three-part series “Artificial Intelligence in Cyber Warfare: A Primer” -
  • M-Trends 2018 – 了解現今的網路攻擊趨勢 Recorded: Jun 13 2018 44 mins
    蕭松瀛, Nicholas Hsiao
    每年 FireEye 旗下之 Mandiant 公司顧問回應來自全球各地威脅組織的各種網路事件。在年度 M-Trends 報告中摘要了這些經驗,並在報告中探索資安攻擊情勢的變化。

    在此網路研討會中,Nicholas Hsiao 將會討論:

    •小心複雜且有害的 APT 組織
  • Live Demo on FireEye Unified Security Platform Recorded: Jun 1 2018 43 mins
    Manfred Hung, Solution Architect, Greater China Region
    FireEye Unified Security Platform provides enterprise-grade protection against basic and sophisticated attackers. Network, email and endpoint alerts are integrated on a platform designed by front-line experts to prevent advanced attacks, accelerate incident response, and protect your core business.
    It allows organization to: -
    •control cost through simplification of purchasing and procurement
    •consolidate security vendors and gain improved synergy across multiple attack paths
    •accelerate discovery of serious incidents to reduce risk of business impact

    Join Manfred Hung, Solution Architect, Greater China Region of FireEye, to understand how these solutions can address your cybersecurity risks.

    Language: Mandarin
  • Artificial Intelligence in Cyber Warfare: A Primer Recorded: May 31 2018 63 mins
    Claudio Scarabello, Director Product, APAC, FireEye
    Artificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.In a live webinar, hear a key author of the report discuss what these findings reveal about advanced malware moving forward.

    Join Claudio Scarabello, Director Product, APAC, FireEye for the first installation of our three-part webinar series to:
    - Understand the fundamentals of AI, the differences between various techniques used to process data and the drawbacks to each approach.
    - Discuss how AI tools can be used for offensive and defensive purposes in the cyber domain.
    - Survey the future threat landscape and provide geopolitical context regarding how nations will use AI tools given their current levels of technological development and AI integration in civilian applications.
  • M-Trends 2018: Understanding Today's Cyber Attack Trends Recorded: May 3 2018 42 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services and Bryce Boland, FireEye APAC CTO
    Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.

    During this webinar, Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services and Bryce Boland, FireEye APAC CTO will discuss:

    - Longer-term trends in today's threat landscape
    - Sophisticated and harmful APT groups to look out for
    - Which organizations are most likely to be retargeted by attackers
    - The difficulty of finding skilled personnel and how it affects the security function
    - How weaknesses in security fundamentals contributed to successful compromises
    - Best practice red teaming tactics for improved security defense
  • The Real Cost of Data Breaches Recorded: Apr 25 2018 33 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services | FireEye
    The annual Cost of Data Breach study from the Ponemon Institute indicates a small year-over-year decline, but the average size and scope of data breaches continues to increase. Every year, Mandiant investigates more cyber incidents and we believe that the real cost of a data breach to an organization can be much higher than what is reported. The pending implementation of GDPR and its penalties for non-compliance, will also impact the costs to organizations.

    During this session we will share some insights with you into the damage attackers typically cause and what mitigating steps you can take to minimize the impact and cost of a data breach.
  • Mandatory Breach Disclosure and your Corporate Communications Strategy Recorded: Mar 20 2018 50 mins
    Patrick Neighorn, Head of Global Media Relations, FireEye and Jackson McKinley, Director of Incident Response, Mandiant
    In February 2018, Mandatory Data Breach Notification legislation took effect in Australia. It introduced unique challenges to the already difficult task of managing external communications after a cyber attack.

    On Tuesday, March 20, Patrick Neighorn, Head of Global Media Relations for FireEye, and Jackson McKinley, Director of Incident Response for Mandiant, a FireEye company, will share what happens behind the scenes when dealing with communications challenges during a breach.

    At this webinar, these two professionals will call on their extensive frontline experience with breached corporations worldwide to discuss: What common misperceptions exist regarding cyber forensic investigations, how long it takes executive teams to be notified and communications teams to be briefed, what information is typically shared and what organisations can do to effectively manage the message in the wake of a breach.

    Take this opportunity to better prepare for the upcoming Mandatory Breach Notification legislation.
  • Exclusive Q&A session : APT37 Recorded: Mar 16 2018 19 mins
    Benjamin Read, Senior Manager, Cyber Espionage at FireEye
    An exclusive 30-minute Q&A session with the presenter, Benjamin Read, Senior Manager, Cyber Espionage at FireEye

    Learn more about:
    •APT37’s historic support of North Korean interests.
    •Details on the malware suite employed by the actor.
    •Why APT37 is an emerging threat beyond the Korean peninsula.
  • APT37: The Overlooked North Korean Threat Recorded: Mar 8 2018 59 mins
    Ben Read, Senior Manager Cyber Espionage, FireEye
    Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.

    APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

    FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. Join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:

    • A history of APT37 support for North Korean interests
    • Details on the malware suite employed by APT37
    • How APT37 has been influencing the world beyond the Korean peninsula
  • Building a secure future for women in Cyber Security Recorded: Mar 6 2018 62 mins
    Zeina Zakhour, Denise Bedell, Vasu Jakkal, Roxy Dee, Emma Hunwick
    Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.

    Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.

    Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:

    -How did they make their first break?
    -Why does the industry have such a hard time retaining talent?
    -What are some of their favourite parts about their job?
    -Their advice to women in the industry
    -Their advice to cyber security execs looking to create more diverse teams

    Moderator: Denise Bedell (Content Innovo)
    Zeina Zakhour (Atos), Vasu Jakkal (FireEye), Roxy Dee (Hurricane Labs), Emma Hunwick (PwC)
  • Cyber Evolution: En Route to Strengthening Resilience in Asia-Pacific Recorded: Feb 8 2018 52 mins
    Rob van der Ende, VP APJ, Mandiant, Douglas Ure, MD, Client Advisory Services, Marsh Asia, Richard Green, MD Marsh
    The cyber threat landscape is morphing constantly and dramatically. Around the world, cyber dependency grows as increasing digital interconnection among people, things, and organisations expand. Asia-Pacific (APAC) is no different.

    From currency volatility to political instability and evolving regulations, conducting business across borders today involves more risks – and companies must add cyber to their list of risk concerns. Financial services, energy and utilities, and telecommunications are among the most investigated industries in APAC, highlighting the urgent need for higher awareness levels, stronger mitigation measures, and improved cybersecurity postures.

    While there is no easy fix for these problems, we are seeing steps being taken in the right direction. The regulatory climate in the APAC region is beginning to change, even if slowly.

    As trusted cyber advisers, FireEye and Marsh & McLennan Companies – each a leader in its own field – have collaborated to share their insights to help organisations across APAC build and strengthen their enterprise cyber resilience.
  • Security Predictions for 2018: An APAC Viewpoint Recorded: Dec 13 2017 37 mins
    Bryce Boland, Asia Pacific CTO
    As the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Not many things are absolute in the security industry, but we know for certain that threat actors will continue to attack and defenders will be tasked with stopping them.

    Join Bryce Boland, Asia Pacific CTO at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail:

    •What types of nation-state activity we will be seeing
    •What new regulations such as GDPR mean for organizations
    •How to ensure a secure environment as more organizations migrate to the cloud

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Are APAC organisations response-ready to a data breach? Recorded: Nov 16 2017 45 mins
    Rob van der Ende, Vice President, Asia Pacific & Japan Mandiant Consulting Services | FireEye
    Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen.

    Mandiant, a FireEye Company, is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches.

    Join us for a discussion on the importance of being breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: It’s Time to Build Your Breach Response Plan
  • Live at: Dec 6 2017 2:00 am
  • Presented by: Rob van der Ende Vice President, Asia Pacific & Japan and Paul Heaton, Senior Manager Mandiant Consulting Services | FireEye
  • From:
Your email has been sent.
or close