Hi [[ session.user.profile.firstName ]]

Security Effectiveness Strategies

Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
-Who are the attackers that target my industry and what techniques do they use?
-Which alerts matter most and how do I respond?
-Are my tools, controls, processes working as expected?
-Where should I focus improvement efforts?

Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

-Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
-Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
-Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

Register Now
Recorded May 13 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Major General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Threat Intel
Presentation preview: Security Effectiveness Strategies

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Proactively Prepare to Defend Against Threats that Matter Apr 13 2021 3:00 pm UTC 60 mins
    Michael Armistead, Sr. Vice President, Mandiant Advantage Products & Moderated by Dan Lamorena, VP, Mandiant
    Know Your Enemy and Know Yourself: How to Proactively Prepare to Defend Against Threats that Matter

    Security teams are under constant pressure to know their adversaries and the attack tactics they use, and prioritize resources to protect the organization. This is best achieved with expert intelligence about what matters right now, combined with data-driven detection and response and a clear picture of how security controls perform.

    Join Mandiant for a discussion about how relevant breach intelligence delivered in a scalable and consistent manner empowers you to prioritize your organization’s security focus and build an effective detection and response operation. When combined with validation of security performance, you’re able to measure and strengthen the health of your security infrastructure and protect against the worst cyber offenders.
    Attend this session to discover:
    - How to operationalize threat intelligence to understand relevant threats and attack techniques targeted at your organization
    - Best practices for validating performance of security controls, people, and processes to determine where to prioritize focus
    - The importance of automation and expert managed services across all capabilities to improve efficiency, reduce costs, and strengthen security

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • Vigilance in An Era When Ransomware Is Big Business Live 60 mins
    Expert Security Panel
    Ransomware has become big business with targets spanning organizations across industries. If you are attacked, the cost to your organization could total more than $1 million. This session will offer valuable insights and recommendations on how you can best protect your company and assets, remain ever vigilant and be able to respond across any infected device or server you manage.

    In this session you will learn about:

    -The tactics attackers use to find their targets and begin the attack
    -Tools you can use to stop a ransomware attack in its tracks
    -Best practices to prevent and mitigate ransomware and reduce the cost to your organization


    -James Beeson, Senior Vice President and Global CISO, Cigna
    -Evan Pena, Director of Consulting, Mandiant
    -Matt Bromiley, Senior Principal Consultant, Mandiant
    -Robert Kusters, Senior Product Marketing Manager, Cloud Endpoint

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • Malware Maelstrom: Guarding Against the Return of APT10 and its Subsets Recorded: Apr 13 2021 46 mins
    Adrien Bataille, Senior Consultant, FireEye Mandiant & Mitchell Clarke, Principal Consultant, FireEye Mandiant
    In 2020, during an incident response engagement, FireEye Mandiant stumbled upon APT10 for the first time since the U.S. indictments against the group in late 2018. Upon re-discovery and identification of the group’s new and evolved tooling, FireEye Mandiant determined that other previous incident response engagements that were largely unrecognized had likely featured APT10.

    This presentation will take a deep dive look into:
    ● How FireEye Mandiant re-discovered APT10 and the threat actor’s new malware and updated tools
    ● The difficulties in conducting malware-based attribution and possible subsets of APT10
    ● How organizations can spot this threat group and what defensive steps to take

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • A Playbook for Resiliency: Contain and Remediate Ransomware Before It Can Act Recorded: Apr 13 2021 65 mins
    Mitchell Clarke, Principal Consultant, FireEye Mandiant & Phil Pearce, Senior Consultant, FireEye Mandiant
    Attackers have become skilled at rapidly detonating ransomware within victim environments. By taking certain steps companies can quickly halt a ransomware intrusion and take action to contain and remediate the compromise, protecting critical data and wrestling control of their environment away from attackers.

    Join Mandiant detection and response experts to discover how best to stop a ransomware attack in its tracks and keep it from disrupting business and causing costly harm.
    During this talk, you will learn:
    • New ways ransomware intrusions are being carried out
    • How to build a playbook for resiliency against future ransomware intrusions
    • What actions to take, how to prioritize them, and the rationale behind each to contain and remediate the attack

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • FireEye Chat | Front & Center on the Impact of SUNBURST on the Security Industry Recorded: Apr 13 2021 29 mins
    Sandra Joyce, EVP, Mandiant; Christopher Krebs, Founding Partner, Krebs Stamos Group LLC; Josh Madeley, Manager, Mandiant
    FireEye Mandiant recently uncovered the SUNBURST incident, a wide-scale supply chain attack. Our revelations galvanized both public and private organization networks across multiple sectors and prompted the security industry to reexamine and reinforce its defensive measures.

    In this episode of FireEye Chat, our experts take a close look at the threat group behind the SUNBURST incident as well as its implications on the broader cyber security industry. We also consider what your organization should do to better protect itself from a breach of this magnitude.

    Watch Now!
  • Assessing and Managing Cyber Risk: An Approach for Chief Risk Officers (CROs) Recorded: Apr 13 2021 60 mins
    Steve Ledzian | Vice President, Chief Technology Officer, Asia Pacific
    Simply investing in cyber security controls isn’t enough, as countless victims of cyber-attacks have learned the hard way. This session will offer valuable insights and recommendations for Chief Risk Officers (CROs) and C-suite decision makers about how to move beyond simply ticking a box to ensuring their cyber security investments are effective and working as intended to provide risk assurance.

    In this lesson you will learn about:
    ● The importance of moving from auditing security control existence to security control effectiveness
    ● Determining the right level of risk for your organization
    ● How to assess if security controls are working as they should

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • 對微軟ProxyLogon Exchange漏洞的見解和相關攻擊活動 Recorded: Apr 9 2021 61 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    近日,大眾了解到影響微軟Exchange服務器的多個漏洞。從那時起,許多人開始意識到這些攻擊可能會影響數以萬計的企業--其中許多人可能不知道從哪裡開始。無論您的企業規模、行業或地區如何,您都可以採取一些步驟來識別環境中被利用的 Exchange 漏洞。
    - 這次攻擊發生了什麼事?
    - 到目前為止,我們對威脅行為者有什麼了解?
    - 此攻擊對我的企業有何影響?
    - 我現在可以而且應該做什麼?
    加入我們討論這些針對 Microsoft Exchange 服務器的攻擊。我們在本次會議中的目標是讓您逐步完成評估環境的具體後續步驟。
  • 对微软 ProxyLogon Exchange 漏洞的见解和相关攻击活动 Recorded: Apr 8 2021 43 mins
    郑聿铭 - FireEye 大中華區技术顾问
    最近,公众了解到影响微软Exchange服务器的多个漏洞。从那时起,许多人开始意识到这些攻击可能会影响数以万计的组织--其中许多人可能不知道从哪里开始。无论您的组织规模、行业或地区如何,您都可以采取一些步骤来识别环境中被利用的 Exchange漏洞。
    - 这次攻击发生了什么?
    - 到目前为止,我们对威胁行为者有什么了解?
    - 此攻击对我的组织有何影响?
    - 我现在可以而且应该做什么?
    加入我们讨论这些针对 Microsoft Exchange 服务器的攻击。我们在本次会议中的目标是让您逐步完成评估环境的具体后续步骤。
  • Insights into the ProxyLogon Exchange Vulnerabilities & related attack activity Recorded: Mar 23 2021 64 mins
    Steve Ledzian, Yihao Lim, Vinoo Thomas & Ryan Delany
    • Steve Ledzian, CTO & VP, APAC - FireEye
    • Yihao Lim, Principal Intelligence Enablement Consultant, APAC - Mandiant
    • Vinoo Thomas, Senior Product Line Manager - Endpoint, APAC - FireEye
    • Ryan Delany, Senior Technical Marketing Manager - SaaS Endpoint - FireEye

    Regardless of your organization’s size, industry, or locale, there are steps that you can take to identify Exchange exploitation in your environment.

    In this session, we address the following questions:
    • What’s happening with this attack?
    • What do we know about the threat actors so far?
    • How does this attack impact my organization?
    • What can—and should—I do right now?

    Join us to discuss these attacks on Microsoft Exchange servers. Our goal in this session is for you to walk away with concrete next steps to assess your environment.
  • Embrace the CFI 2.0 Initiatives To Enhance Your Cybersecurity Posture Recorded: Jan 26 2021 65 mins
    Gary Woo - Solution Architect, FireEye; Pak Ho CHAN - Cybersecurity Practice Lead, Thales Transport & Security (HK)
    To cope with the evolving cybersecurity risks, Hong Kong Monetary Authority (HKMA) announced the Cyber Fortification Initiative (CFI) 2.0 to reflex the latest technology trends and incorporate up-to-date global cybersecurity practices. Cyber Resilience Assessment Framework (C-RAF) is one of the 3 pillars that assists organizations to identify unrecognized gaps.
    Thales and FireEye brings you the best-of-breed expertise and cyber security tool to prepare your organization for this initiative and to improve your cybersecurity posture further.
    Join us now and to learn:-
    Why Thales and FireEye?
    -Thales: Extensive local experience for HKMA requirement with practical skillset
    -FireEye Mandiant Security Validation (formerly Verodin): the global leader in continuous security validation with real and most relevant cyber security threats and adversaries targeting your organizations
    -Highlight C-RAF 2.0 updates
    -How it works for iCAST?
    -Case study
    Who should attend?
    -IT Professionals, Security Professionals from Financial Institutions, Banks and Securities
  • 2021年網路安全預測-全球重新開始 Recorded: Dec 23 2020 57 mins
    Manfred Hung


    • 遠端工作將如何發展並影響組織營運
    • 深入洞察威脅執行者將如何利用疫情
    • 對情報導向資安驗證日益增長的需求
    • 雲端安全的未來狀況
    • 國家級活動和不斷變化的 TTP
    • 勒索軟體如何從商業風險轉變為國家安全風險
  • Using Mandiant Advantage – A How To Guide, from the Experts Recorded: Nov 12 2020 29 mins
    Igors Konovalovs Cyber Threat Intelligence Advisor FireEye
    Join our workshop to learn how to consume intelligence from your subscription to Mandiant Advantage.
    This 45min workshop, with 15 mins for Q&A will be hosted by Mandiant Cyber Threat Intelligence Advisor Igors Konovalovs, and APAC Solutions Architect, Su Gim Goh.

    They will walk you through the powerful Mandiant Advantage SaaS platform providing organisations of all sizes with to-the-minute, relevant cyber threat intelligence, so you can focus on the threats that matter now, and TAKE ACTION.
  • Cyber Summit 2020 | Spotlight on Financial Services: APAC Recorded: Nov 10 2020 91 mins
    Mandiant Solution Experts
    Session Agenda
    -2:15 p.m.-2:16 p.m. - Intro to Financial Services Track

    -2:16 p.m. - 2:47 p.m. - Navigating Today's Cyber Challenges- David Wong, VP, Mandiant Consulting

    -2:47 p.m. - 3:12 p.m. -Key Threats to Financial Services Today - John Miller, Director, Mandiant Threat Intelligence

    -3:12 p.m. - 3:31 p.m. - Improve Your Cybersecurity to Protect Against FIN11 - Ursula Cowen, Threat Research Analyst, Mandiant Security Validation and Andy Moore, Sr. Technical Analyst, Mandiant Threat Intelligence

    -3:31 p.m. - 3:46 p.m. - Spotlight on Financial Services: Q&A

    For the full Cyber Summit 2020 event program, please visit: http://www.fireeye.com/company/events/cyber-summit-2020-apac.html
  • Cyber Summit 2020 | Cloud and Enterprise Security: APAC Recorded: Nov 10 2020 87 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Phil Montgomery, SVP, FireEye; Steve Ledzian, CTO, APAC, FireEye
    Session Agenda:
    -12:45 p.m. - 1:10 p.m. - Take Control of Your Cloud Environments - Martin Holste, Cloud CTO, FireEye and Lisun Kung, Sr. Director, Cloudvisory, FireEye

    -1:10 p.m. - 1:31 p.m. - FireEye Products: A Complete Solution Working Together - Phil Montgomery, Sr. VP, Product Marketing, FireEye

    -1:31 p.m. - 1:54 p.m. - Detection and Response: Pioneered by FireEye - Steve Ledzian, CTO, APAC, FireEye

    - 1:54 p.m. - 2:09 p.m. - Live Q&A, APAC expert panel

    For the full Cyber Summit 2020 event program, please visit: http://www.fireeye.com/company/events/cyber-summit-2020-apac.html
  • Cyber Summit 2020 | From the Front Lines: APAC Recorded: Nov 10 2020 67 mins
    Sandra Joyce, EVP, Mandiant Threat Intel; Charles Carmakal SVP and CTO, Mandiant; Chris Key, EVP, Mandiant Solutions
    Session agenda:
    -11:30 a.m.-11:32 a.m. - Welcome intro

    -11:32 a.m.-11:42 a.m. SGT - New Ransomware Trends: A Threat Evolves - Sandra Joyce, EVP and Global Head of Mandiant Threat Intelligence

    - 11:42 a.m.-11:59 p.m. SGT - Preparing for Disruptive Intrusions: Mitigating the Risk of Data Theft, Ransomware, Public Shaming and Extortion - Charles Carmakal, SVP and Mandiant Strategic Services CTO

    - 11:59 p.m. - 12:17 p.m. SGT - Mandiant Advantage: Achieving Focused Business Outcomes through Threat Intelligence and Validation - Chris Key, EVP of Products, Mandiant Solutions

    - 12:17 p.m. - 12:37 p.m. SGT - Live APAC Roundtable Discussion - Anthony Ng, VP, Sales Engineering, FireEye; Vivek Chudgar, VP, Mandiant Consulting; Steve Ledzian, VP/CTO APAC, FireEye; Yihao Lim, Principal Intelligence Enablement Consultant, Mandiant

    To check out the full Cyber Summit 2020 event program, please visit http://www.fireeye.com/company/events/cyber-summit-2020-apac.html
  • A Global Reset: Cyber Security Predictions 2021 | Expert Roundtable Recorded: Nov 9 2020 45 mins
    FireEye Mandiant Expert Panel
    A Global Reset: Predictions for the Future of Cyber Security | Roundtable Discussion

    The year 2020 has been an unprecedented time of change and has shaped up in a way that nobody could have expected. This year’s activities continue to alter the future course of cyber security, making it even more important to ensure that we better prepare ourselves for what’s to come.

    On Monday, November 9th at 12 p.m./3 p.m. ET, join our expert panel as they share cyber trends and challenges in 2021. During the webinar, our experts will touch on various topics discussed in our upcoming report, A Global Reset: Predictions for the Future Cyber Security, including:
    • How remote work will evolve and affect organizations operationally
    • Insights into how threat actors will leverage the pandemic in their attacks
    • The growing need for intelligence-led security validation
    • The future state of cloud security
    • Nation-state activity and changing TTPs
    • How ransomware has pivoted from business risk to a national security risk

    Expert Panel:
    • Dave Baumgartner, CIO, FireEye (Moderator)
    • Maj. Gen. Earl Matthews, VP of Strategy, Mandiant Security Validation
    • Martin Holste, Cloud CTO, FireEye
    • John Hultquist, Sr. Director, Mandiant Threat Intelligence

    Please also check out our FireEye Cyber Summit 2020 for more interesting sessions: https://www.fireeye.com/company/events/cyber-summit-2020.html

    Register Now!
  • Augment and Automate Threat Intelligence Into Your Environment Recorded: Nov 9 2020 18 mins
    Joshua Bass, Senior Manager Product Management, Mandiant Security Validation
    The need to improve how companies prove security effectiveness in today’s business climate is clear: attacks are on the rise, targets are expanding, adversaries are more motivated, and their tactics are increasingly insidious.

    Now, more than ever, organizations need access to emerging threat data as it happens. Security leaders need to be able to provide proof to their organization that these threats cannot and will not breach their defenses by being able to prioritize the threats that matter to them now and take action.

    This session will show how relevant and emerging threat data combined with controls validation technology provides insight into what is most important to test against and what to prioritize based on the knowledge of who and what might be targeting an organization or industry. Through this approach to security validation, security leaders can provide evidence to C-level leadership and give them confidence that controls are working as they should against threats and adversaries delivering expected value and maintaining the organization’s accepted level of risk.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Improve Program Effectiveness through Security Transformation Recorded: Nov 9 2020 20 mins
    Nicholas Bennett, Managing Director, Mandiant Consulting; John M. DeLozier, Sr. Technical Director, Mandiant Consulting
    With the chance of an attacker affecting more organizations today—notably around ransomware progression and the shift to remote work—your security function is continually challenged to keep pace with incident prevention, detection and response.

    Transformation timelines often occur in two ways: proactive action to mitigate future threats, or reactive measures to remediate an existing incident—the latter can be detrimental. It’s imperative for security teams to develop and mature their security posture through capability improvement across four key areas: security architecture, cyber defense, governance and risk management.

    In this session, you'll learn how Mandiant helps organizations conduct transformational changes of critical security functions and staff readiness through hands-on support across these critical areas. We’ll also share a roadmap of our new transformation services on the horizon.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Covering Your Bases With FireEye Network Security and Forensics Recorded: Nov 9 2020 16 mins
    Rob Ayoub, Sr. Product Marketing Manager, Cloud Detection and Forensics
    Today's security professionals have more network security challenges than ever before. With infrastructure located on-premise, as well as in private, hybrid and multi-cloud environments, managing and securing the network has become increasingly complex.

    In this session, we’ll discuss the opportunities and challenges our customers face across a growing variety of use cases, how customers can integrate FireEye detection directly into their custom application, and how they can leverage FireEye’s full portfolio of solutions to address infrastructure security wherever they need it.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Halt Advanced Attackers: Endpoint Security with Protection Modules Recorded: Nov 9 2020 21 mins
    Vinoo Thomas, Sr. Product Line Manager, Endpoint Security, FireEye
    Advanced attackers fly under the radar of prevention or detection technologies, living off the land, leveraging features and tools found in the operating system. From an attacker’s perspective, using legitimate or existing tools and features makes the defender’s job inherently more difficult. Picking out the malicious use of built-in OS tools is like looking for a needle in a haystack.

    With FireEye Endpoint Security and our protection modules, these living off the land based attacks are made visible to FireEye and can be stopped. See how you can quickly implement Endpoint Security modules to disrupt attackers.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Effectiveness Strategies
  • Live at: May 13 2020 7:00 pm
  • Presented by: Major General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Threat Intel
  • From:
Your email has been sent.
or close