In this session, we begin by touring a typical Security Operations Center (SOC) and study the day to day activities of the various functions inside. We then explore the various challenges faced by these functions and introduce the idea of taking a platform approach. We wrap the session with an outlook at the future of Security Operations using this approach to consolidate, facilitate and automate workflows of the entire Security Operations Center (SOC).
RecordedSep 27 201823 mins
Your place is confirmed, we'll send you email reminders
Matt Shelton, Director, Risk & Threat Intelligence & Risk Management
FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.
In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:
•Uses threat intelligence to proactively protect the organization
•Detects threats using FireEye Network Security products
•Responds to incidents with FireEye Endpoint Security
•Leverages Helix as its security operations platform
•Hunts for known and unknown threats within its environment.
Stanley Parret, Principal Consultant, FireEye Managed Defense
The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.
Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:
-The impact of staffing shortages on security practitioners
-How they’re being required to protect more with less
-The options available to security teams who need to extend their capacity
Ben Forster, Sr. Product Marketing Manager, FireEye
Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.
In this webinar:
- Understand the benefits of technology consolidation
- Learn about what a single platform can do for your people and processes
- Discover the untapped potential of your security investments
Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant
Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite
Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.
C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.
Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:
• Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
• Ensure that the board’s security investment decisions support your organization’s appetite for risk
• Establish a framework that ensures the alignment of strategic priorities with security spending
• Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
• Apply these lessons to a sample business scenario.
Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant
Many organizations struggle with how to prioritize hardening and protective security actions.
Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.
Join our webinar, where Mandiant incident response experts Nick Bennet and Matt McWhirt will discuss the following topics:
• Five technical categories to consider when implementing preventative security
• Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
• Common pitfalls in evidence destruction, investigation techniques and remediation timing
• Recommendations for enabling effective remediation and the power of operational playbooks
Register today to learn how to better handle your organization’s next security incident.
Shantanu Mahajan, Regional Security Architect – India & SAARC
Threat intelligence has the power to enhance an organization’s security effectiveness, improve its time-to-response, and reduce business risk. No matter where an organization is on the continuum of security operations maturity, threat intelligence can provide significant value. The question is, what is the best way to maximize that value? What advantages can you gain through simple process or technology changes to ensure that you’re ready to respond quickly to the threats that matter?
Shantanu Mahajan, Regional Security Architect at FireEye
Today’s sophisticated attackers often hide within the noise of abundant alerts generated by a myriad of security products. Limited budgets, a shortage of skilled security staff, and rigid regulatory requirements make it difficult for organizations to effectively identify and understand these threats—negatively affecting risk-based decision making and asset protection.
Effective cyber security requires an understanding of who is likely to target you, and how they operate.
As security leaders and executives turn to service providers to evaluate their security maturity, manage business risks and build sustainable security programs, they often ask ‘how do I select the right security partner for my organization?’
Join Shantanu Mahajan, Regional Security Architect at FireEye, as he shares insights on:
• Selecting the right service provider for your organization
• Realizing limitations of providers who apply traditional and compliance-focused approaches
• Working with providers who intimately monitor attackers across the evolving threat landscape
• Understanding the role of cyber threat intelligence in effective cyber security services
• Asking the right questions of your security providers to enable critical business decisions
FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.
The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.
In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:
• A high-level overview on how nation-state interests are driving APT activity
• Insight into the most recent APT groups investigated by FireEye
• The latest adversary tactics, techniques and procedures (TTPs) these groups use
Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye
FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:
-Get a brief overview on the latest email threat trends
-Learn about the must haves for email security solutions and the benefits of having one provider
-Find out about additional email security capabilities that can help you have an adaptable solution
-Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant
Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.
Join us for this webinar, as experts, Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant discuss highlights and case studies from this year’s edition, including:
• Evolving attack trends in today’s threat landscape
• New advanced persistent threat (APT) groups that emerged in 2018
• Hidden risks found across M&A business activities
• Best practices lessons learned from the front lines of incident response
Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEye
Front and Center with Today’s Leading Cyber Security Experts
FireEye Chat is a new quarterly talk show that brings guest experts front and center to cover today’s most important cybersecurity topics.
Episode #1: Front and Center with Kevin Mandia and the Evolution of M-Trends
Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it. They also cover:
• Key milestones in the evolution of the report
• How M-Trends has raised awareness about the importance of cyber security
• The most significant trends in today’s cyber threat landscape.
Watch now to get unique insights, direct from the frontlines, in what promises to be a series of lively and thought-provoking exchanges.
Jeff Laskowski, Security Consulting Director, FireEye Mandiant
Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.
In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:
• Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
• Assess your organization’s crisis management capabilities through the lens of an executive team
• Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations
Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
Shantanu Mahajan, Regional Security Architect - India, FireEye
Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.
During this webinar we will be covering how the industry has been affected by a cyber-skills shortage and the challenges of inhouse vs. outsourcing of cyber security operations. And how this gap can be covered with ‘on-demand’ expert resources who have with them, real time insight and expertise of dealing with cyber breaches.
Claudio Scarabello Director Product, APAC FireEye Inc
Threats Actors Target Vendors to Large Organisations
We observe that state-sponsored espionage groups steal intellectual property for economic advantage. While the main players appear to understand this threat, many smaller supply-chain vendors and contractors may not. The targeting of third-party vendors and contractors is a tactic these threat actors are increasingly using to spy on hardened targets. A recent discovery of a treasure trove of openly available sensitive data is a reminder and call-to-action for many smaller enterprises to improve their cyber resilience. Attend this session to hear more about this case and threat actors potentially using these tactics.
Join if you’re from a large organization that needs to understand third-party risk or if you’re from a small organization that needs to demonstrate due diligence to your largest customers.
Christopher Porter, Chief Intelligence Strategist, FireEye
As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.
Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye Threat Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:
•Threats to the aviation industry, including cyber espionage and cybercrime
•What to expect from established and emerging nation states
•How threat actors are changing their tactics to stay ahead of defenders
Register today to learn what lies ahead and stay one step ahead of cyber security threats.
APT38 is a newly identified cyber-crime organization that has attempted to steal over $1.1 billion by attacking more than 16 financial organizations in 13 different countries – many of them located in the Asia Pacific region. This North Korean regime-backed group is careful in its planning and often lives in a compromised victim environment for months before initiating their fraudulent banking transactions.
Please join the FireEye experts for a detailed discussion on the tactics, techniques and procedures used by APT38 and what you can do to defend your organization.