Hi [[ session.user.profile.firstName ]]

人工智能在網絡領域的影響

人工智能(AI)為企業提供了更好的方法來保護他們的系統,但它也為黑客提供了更好的方法來破壞這些系統。 企業需要了解AI在依賴網絡防御之前如何影響網絡安全。
Nicholas Hsiao 北亞技術顧問將會討論有關人工智能系列的第二單元:
•人工智能技術如何加強企業的防禦能力
•網絡威脅如何利用人工智能提高攻擊的複雜性和範圍
•FireEye如何使用機器學習來增強其內部防禦和工具
Recorded Oct 18 2018 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
蕭松瀛, Nicholas Hsiao, FireEye 技術顧問
Presentation preview: 人工智能在網絡領域的影響

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Proactive Solutions to Stop Modern Ransomware in its Tracks Jun 9 2020 7:00 pm UTC 60 mins
    Nader Zaveri, Incident Response Mgr; Matt Bromiley, Principal Consultant; Kimberly Goody, Threat Intelligence Sr. Mgr.
    Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require organizations to apply a holistic security risk mitigation strategy from the C-suite to practitioners.

    This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:

    • Learn modern ransomware trends and attacker behaviors observed on the frontlines
    • Realize why proactive assessment is critical when preparing for and preventing ransomware
    • Understand how threat intelligence, hunting, and response provides the decision support and detection needed to outmaneuver ransomware actors
    • Implement effective mitigation strategies to stop ransomware attackers in their tracks

    Register today to join Nader Zaveri – Incident Response Manager, Matt Bromiley – Managed Defense Principal Consultant, and Kimberly Goody – Threat Intelligence Senior Manager, as they provide expert insights on modern-day ransomware attacks and how best to mitigate them.
  • Rethink Cyber Defense Strategies Starting with Threats Jun 9 2020 6:00 pm UTC 60 mins
    Peter Watts, former Director for Cybersecurity Policy, National Security Council
    Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
    Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces.
    In this session, Peter Watts, threat intelligence veteran and former Director for Cybersecurity Policy, National Security Council lays out:

    • A modern definition of threat intelligence with important milestones
    • How to recognize and develop critical success factors for producing or consuming threat intelligence
    • The impact of actionable threat intelligence on security risk leaders and their organizations
    • Future use cases that may reshape how we think about cyber defense and business value
  • Tips for Securing Your Cloud Environments Jun 9 2020 5:00 pm UTC 60 mins
    Chris Romano, Mandiant Senior Consultant and Greg Blaum, Mandiant Principal Consultant
    For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye Mandiant experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.

    In this session, Mandiant consultants Greg Blaum and Chris Romano share lessons learned from real-world incident response experiences, identify some common pitfalls and provide best practices for organizations to harden their cloud environments and reduce the risk of compromise. They also discuss the pitfalls and best practices presented in M-Trends 2020.
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness Jun 9 2020 4:00 pm UTC 60 mins
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    -MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    -Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    -Impact of environmental drift on your security posture and how to plan for it
    -Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>
  • Take Control of Your Cloud Environments Jun 9 2020 3:00 pm UTC 60 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation Jun 9 2020 11:00 am UTC 60 mins
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye
    Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Security Validation enables you to:

    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT&CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The results can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • Security Validation - what is it and how can it improve security effectiveness? Jun 9 2020 9:00 am UTC 60 mins
    Mike Batten - VP Sales Engineering EMEA, FireEye
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • An Intelligence Driven Approach to Security Validation Jun 9 2020 2:00 am UTC 60 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • FireEye Chat | Front and Center: How to Empower. Evolve. Defend. Recorded: Jun 5 2020 28 mins
    Vasu Jakkal CMO, FireEye; General Earl Matthews VP, Strategy, Mandiant Security Validation; Martin Holste Cloud CTO, FireEye
    Cyber attackers never rest, but neither does FireEye. In our upcoming Virtual Summit on June 9-11, industry professionals will showcase best practices, research and strategies to empower organizations to evolve their cyber security solutions and better defend against attackers.

    In this latest episode of the quarterly talk show FireEye Chat, we dive deeper into two topics from the virtual summit: security effectiveness and cloud security. Watch now to hear from our experts who are front and center from their homes as they tackle these common questions:

    • How secure are you? And can we be sure we’re protected against the evolving threat landscape?
    • Are your cyber security products effective and working the way they should?
    • Do you know how to be secure in the cloud?
    • What should you consider when moving to the cloud?
  • Integrating Better Intelligence for Better Security Recorded: May 27 2020 50 mins
    James Graham, Sr. PMM, FireEye ; Jeff Guilfoyle, CISSP, Solution Architect, FireEye; Finian Mackin, Sr. PM, Anomali
    Anomali and FireEye Mandiant Threat Intelligence: Integrating Better Intelligence for Better Security

    As attackers grow more resourceful and effective in their efforts to expose and compromise users and their data, it is becoming more important than ever to integrate effective cyber threat intelligence to drive better detection and apply added context to potential threats. Anomali’s addition of FireEye Mandiant Threat Intelligence to its App Store presents a scalable way to integrate industry-leading threat intelligence into your security systems and program.

    Join experts from FireEye and Anomali for a panel discussion surrounding the value of cyber threat intelligence, the need for increased integration of intelligence to drive better security, and the added value that a combined Anomali-FireEye solution can provide.​

    Register Now!
  • Navigating MAZE: Analysis of a Rising Ransomware Threat Recorded: May 21 2020 58 mins
    Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence & Jeremy Kennelly, Manager, Mandiant Threat Intelligence
    The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.

    Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.

    In this exclusive webinar, attendees will learn about:
    •Common intrusion vectors across MAZE ransomware incidents
    •Actors’ reliance upon open-source and commercially available attack tools
    •Data exfiltration techniques present across most MAZE ransomware incidents
  • 2020 Mandiant Security Effectiveness Report Findings Recorded: May 19 2020 60 mins
    Matt Hartley SVP Mandiant Strategy for FireEye Mandiant & Devon Goforth Sr Dir Security Instrumentation for FireEye Mandiant
    2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality

    Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

    The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.

    Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:

    - Do I have confidence in the effectiveness of my security controls?
    - Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
    - Am I stopping data leakage and protecting data integrity?
    - How can I simplify and standardize my security stack?
    - Do I have evidence to support communicating key metrics to executives?

    Register Now to Reserve Your Seat!
  • 电子邮件防御方案–您的第一道资安防线 Recorded: May 14 2020 36 mins
    FireEye 大中華區技术顾问 郑聿铭
    91% 的成功入侵也是來自電子郵件,冒充高管和供應鏈合作夥伴是一個日益嚴重的問題。 這網路研討會將探討解決這些威脅的方案,而這些威脅可能未被發現並仍潛伏在您的收件箱中。
  • Security Effectiveness Strategies Recorded: May 13 2020 59 mins
    General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Intel Consulting
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

    Register Now
  • Intelligence Led Threat Protection For SaaS-Mobile Environments Recorded: May 6 2020 60 mins
    Rob Ayoub, Sr. Product Marketing Manager, FireEye; Salah Nassar, VP of Marketing, CipherCloud, Inc.
    The continued migration to the cloud and the unprecedented rise in the number of employees working from home has created challenging security implications, leaving many organizations scrambling to gain needed visibility and control into their SaaS/Cloud usage. With employees working remotely, SOC teams need to see threats wherever their companies do business and the ability to reduce those threats as quickly as possible.

    In this webinar, we will discuss how FireEye’s detection capabilities can be combined with CipherCloud to stop malicious content from being shared.

    Register Now!
  • Threat Intelligence Drives Effective Vulnerability Management Recorded: Apr 30 2020 57 mins
    Jared Semrau, Sr. Mgr.,Vulnerability and Exploitation, Mandiant; Kathleen Metrick, Analyst, Strategic Intelligence, Mandiant
    Organizations value cyber threat intelligence (CTI) because it helps their security teams stay focused on, and stay ahead of, the most impactful threats. One of the critical strategic and tactical roles that CTI plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk.

    Join us to hear FireEye Threat Intelligence experts, Jared Semrau and Kathleen Metrick share:
    • The importance of comprehensive CTI to drive better-informed vulnerability management decisions
    • Insight into how FireEye tracks, prioritizes and categorizes vulnerabilities to help organizations more effectively manage and mitigate the risks associated with these potential threats
    • The latest research findings around the speed and frequency of exploitation

    Register for the webinar
  • M-Trends 2020: Insights into Today’s Cyber Attacks| The APAC Perspective Recorded: Apr 17 2020 60 mins
    Rob van der Ende, Senior VP, FireEye Mandiant and Steve Ledzian, VP CTO APAC, FireEye
    Protect your organization against today’s most dangerous attackers.
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from the M-Trends 2020 Report - our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber-attacks in 2019.

    Join us for this webinar, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition with insights and trends in the APAC region, including:
    • Perspectives on trending attacks and how to combat them
    • Details on the most active attack groups in 2019
    • Malware family trends
    • Insights from cloud investigations, along with common weaknesses and best practices
    • Case studies with practical security lessons
  • Knowing is Half the Battle: Cloud Visibility and Protection Recorded: Apr 14 2020 59 mins
    Martin Holste, Cloud CTO, FireEye featuring Andras Cser, VP, Principal Analyst, Security and Risk, Forrester
    As organizations move more data into multi-cloud environments, it becomes increasingly difficult to protect against cyber attacks. You need to know where your data is and have the visibility you need to control and protect your assets.

    Join this webinar on Tuesday, April 14, 2020 at 8 a.m. PT/11 a.m. ET to uncover how to optimize your organization’s cloud security solution. Hear industry expert Martin Holste and featured speaker, Andras Cser, as they help attendees to:

    • Learn what cloud providers do and do not secure under the shared responsibility model
    • Understand why it’s important to identify and track changes to assets and permissions
    • Discover how to establish robust visibility and detection across all cloud environments to reduce overall risk
  • 被揭穿的5大雲端安全迷思 Recorded: Apr 2 2020 34 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    到2022年,至少有95%的雲端資安故障預計是來自客戶的過失(Gartner)。但是,改變您對雲端安全的看法,就可以成為一個成功的故事。
    在這研討會揭示一些關於遷移到雲端常見的神話,這些神話會危及您快速並安全地遷移到雲端。
  • They Come in the Night: Emerging Ransomware Trends Recorded: Mar 31 2020 57 mins
    Kelli Vanderlee Manager, Intelligence Analysis, FireEye & Kimberly Goody, Sr. Manager, FireEye Intelligence
    Ransomware is remote digital extortion. Disruptive and costly to address, it affects all kinds of organizations, from space technology firms to global manufacturers and industrial environments.

    FireEye Threat Intelligence research has uncovered an increasing number of common characteristics in ransomware attacks, including new trends in intrusion vectors, dwell time, deployment time of day and the use of additional tactics to increase leverage against victims.

    Join Threat Intelligence experts Kelli Vanderlee and Kimberly Goody, on Tuesday, March 31, 2020 at 8 a.m. PT/11 a.m. ET, to learn about the latest research and ask them critical questions. During this presentation, attendees will hear about:

    • The latest ransomware threats
    • Threat actor tactics
    • Ways to use this intelligence to defend your organization

    Register for the webinar
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 人工智能在網絡領域的影響
  • Live at: Oct 18 2018 2:00 am
  • Presented by: 蕭松瀛, Nicholas Hsiao, FireEye 技術顧問
  • From:
Your email has been sent.
or close