Hi [[ session.user.profile.firstName ]]

如何應對 COVID-19 資安危機


網路犯罪分子和間諜行為者都借助這次危機來達到其目標。 在這網路研討會中,我們的專家會分享這些參與者到底在做什麼,以及如何阻止他們。
Recorded Mar 20 2020 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matthew Wong, FireEye 技術顧問
Presentation preview: 如何應對 COVID-19 資安危機

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Embrace the CFI 2.0 Initiatives To Enhance Your Cybersecurity Posture Recorded: Jan 26 2021 65 mins
    Gary Woo - Solution Architect, FireEye; Pak Ho CHAN - Cybersecurity Practice Lead, Thales Transport & Security (HK)
    To cope with the evolving cybersecurity risks, Hong Kong Monetary Authority (HKMA) announced the Cyber Fortification Initiative (CFI) 2.0 to reflex the latest technology trends and incorporate up-to-date global cybersecurity practices. Cyber Resilience Assessment Framework (C-RAF) is one of the 3 pillars that assists organizations to identify unrecognized gaps.
    Thales and FireEye brings you the best-of-breed expertise and cyber security tool to prepare your organization for this initiative and to improve your cybersecurity posture further.
    Join us now and to learn:-
    Why Thales and FireEye?
    -Thales: Extensive local experience for HKMA requirement with practical skillset
    -FireEye Mandiant Security Validation (formerly Verodin): the global leader in continuous security validation with real and most relevant cyber security threats and adversaries targeting your organizations
    -Highlight C-RAF 2.0 updates
    -How it works for iCAST?
    -Case study
    Who should attend?
    -IT Professionals, Security Professionals from Financial Institutions, Banks and Securities
  • 2021年網路安全預測-全球重新開始 Recorded: Dec 23 2020 57 mins
    Manfred Hung


    • 遠端工作將如何發展並影響組織營運
    • 深入洞察威脅執行者將如何利用疫情
    • 對情報導向資安驗證日益增長的需求
    • 雲端安全的未來狀況
    • 國家級活動和不斷變化的 TTP
    • 勒索軟體如何從商業風險轉變為國家安全風險
  • Using Mandiant Advantage – A How To Guide, from the Experts Recorded: Nov 12 2020 29 mins
    Igors Konovalovs Cyber Threat Intelligence Advisor FireEye
    Join our workshop to learn how to consume intelligence from your subscription to Mandiant Advantage.
    This 45min workshop, with 15 mins for Q&A will be hosted by Mandiant Cyber Threat Intelligence Advisor Igors Konovalovs, and APAC Solutions Architect, Su Gim Goh.

    They will walk you through the powerful Mandiant Advantage SaaS platform providing organisations of all sizes with to-the-minute, relevant cyber threat intelligence, so you can focus on the threats that matter now, and TAKE ACTION.
  • Cyber Summit 2020 | Spotlight on Financial Services: APAC Recorded: Nov 10 2020 91 mins
    Mandiant Solution Experts
    Session Agenda
    -2:15 p.m.-2:16 p.m. - Intro to Financial Services Track

    -2:16 p.m. - 2:47 p.m. - Navigating Today's Cyber Challenges- David Wong, VP, Mandiant Consulting

    -2:47 p.m. - 3:12 p.m. -Key Threats to Financial Services Today - John Miller, Director, Mandiant Threat Intelligence

    -3:12 p.m. - 3:31 p.m. - Improve Your Cybersecurity to Protect Against FIN11 - Ursula Cowen, Threat Research Analyst, Mandiant Security Validation and Andy Moore, Sr. Technical Analyst, Mandiant Threat Intelligence

    -3:31 p.m. - 3:46 p.m. - Spotlight on Financial Services: Q&A

    For the full Cyber Summit 2020 event program, please visit: http://www.fireeye.com/company/events/cyber-summit-2020-apac.html
  • Cyber Summit 2020 | Cloud and Enterprise Security: APAC Recorded: Nov 10 2020 87 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Phil Montgomery, SVP, FireEye; Steve Ledzian, CTO, APAC, FireEye
    Session Agenda:
    -12:45 p.m. - 1:10 p.m. - Take Control of Your Cloud Environments - Martin Holste, Cloud CTO, FireEye and Lisun Kung, Sr. Director, Cloudvisory, FireEye

    -1:10 p.m. - 1:31 p.m. - FireEye Products: A Complete Solution Working Together - Phil Montgomery, Sr. VP, Product Marketing, FireEye

    -1:31 p.m. - 1:54 p.m. - Detection and Response: Pioneered by FireEye - Steve Ledzian, CTO, APAC, FireEye

    - 1:54 p.m. - 2:09 p.m. - Live Q&A, APAC expert panel

    For the full Cyber Summit 2020 event program, please visit: http://www.fireeye.com/company/events/cyber-summit-2020-apac.html
  • Cyber Summit 2020 | From the Front Lines: APAC Recorded: Nov 10 2020 67 mins
    Sandra Joyce, EVP, Mandiant Threat Intel; Charles Carmakal SVP and CTO, Mandiant; Chris Key, EVP, Mandiant Solutions
    Session agenda:
    -11:30 a.m.-11:32 a.m. - Welcome intro

    -11:32 a.m.-11:42 a.m. SGT - New Ransomware Trends: A Threat Evolves - Sandra Joyce, EVP and Global Head of Mandiant Threat Intelligence

    - 11:42 a.m.-11:59 p.m. SGT - Preparing for Disruptive Intrusions: Mitigating the Risk of Data Theft, Ransomware, Public Shaming and Extortion - Charles Carmakal, SVP and Mandiant Strategic Services CTO

    - 11:59 p.m. - 12:17 p.m. SGT - Mandiant Advantage: Achieving Focused Business Outcomes through Threat Intelligence and Validation - Chris Key, EVP of Products, Mandiant Solutions

    - 12:17 p.m. - 12:37 p.m. SGT - Live APAC Roundtable Discussion - Anthony Ng, VP, Sales Engineering, FireEye; Vivek Chudgar, VP, Mandiant Consulting; Steve Ledzian, VP/CTO APAC, FireEye; Yihao Lim, Principal Intelligence Enablement Consultant, Mandiant

    To check out the full Cyber Summit 2020 event program, please visit http://www.fireeye.com/company/events/cyber-summit-2020-apac.html
  • A Global Reset: Cyber Security Predictions 2021 | Expert Roundtable Recorded: Nov 9 2020 45 mins
    FireEye Mandiant Expert Panel
    A Global Reset: Predictions for the Future of Cyber Security | Roundtable Discussion

    The year 2020 has been an unprecedented time of change and has shaped up in a way that nobody could have expected. This year’s activities continue to alter the future course of cyber security, making it even more important to ensure that we better prepare ourselves for what’s to come.

    On Monday, November 9th at 12 p.m./3 p.m. ET, join our expert panel as they share cyber trends and challenges in 2021. During the webinar, our experts will touch on various topics discussed in our upcoming report, A Global Reset: Predictions for the Future Cyber Security, including:
    • How remote work will evolve and affect organizations operationally
    • Insights into how threat actors will leverage the pandemic in their attacks
    • The growing need for intelligence-led security validation
    • The future state of cloud security
    • Nation-state activity and changing TTPs
    • How ransomware has pivoted from business risk to a national security risk

    Expert Panel:
    • Dave Baumgartner, CIO, FireEye (Moderator)
    • Maj. Gen. Earl Matthews, VP of Strategy, Mandiant Security Validation
    • Martin Holste, Cloud CTO, FireEye
    • John Hultquist, Sr. Director, Mandiant Threat Intelligence

    Please also check out our FireEye Cyber Summit 2020 for more interesting sessions: https://www.fireeye.com/company/events/cyber-summit-2020.html

    Register Now!
  • Augment and Automate Threat Intelligence Into Your Environment Recorded: Nov 9 2020 18 mins
    Joshua Bass, Senior Manager Product Management, Mandiant Security Validation
    The need to improve how companies prove security effectiveness in today’s business climate is clear: attacks are on the rise, targets are expanding, adversaries are more motivated, and their tactics are increasingly insidious.

    Now, more than ever, organizations need access to emerging threat data as it happens. Security leaders need to be able to provide proof to their organization that these threats cannot and will not breach their defenses by being able to prioritize the threats that matter to them now and take action.

    This session will show how relevant and emerging threat data combined with controls validation technology provides insight into what is most important to test against and what to prioritize based on the knowledge of who and what might be targeting an organization or industry. Through this approach to security validation, security leaders can provide evidence to C-level leadership and give them confidence that controls are working as they should against threats and adversaries delivering expected value and maintaining the organization’s accepted level of risk.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Improve Program Effectiveness through Security Transformation Recorded: Nov 9 2020 20 mins
    Nicholas Bennett, Managing Director, Mandiant Consulting; John M. DeLozier, Sr. Technical Director, Mandiant Consulting
    With the chance of an attacker affecting more organizations today—notably around ransomware progression and the shift to remote work—your security function is continually challenged to keep pace with incident prevention, detection and response.

    Transformation timelines often occur in two ways: proactive action to mitigate future threats, or reactive measures to remediate an existing incident—the latter can be detrimental. It’s imperative for security teams to develop and mature their security posture through capability improvement across four key areas: security architecture, cyber defense, governance and risk management.

    In this session, you'll learn how Mandiant helps organizations conduct transformational changes of critical security functions and staff readiness through hands-on support across these critical areas. We’ll also share a roadmap of our new transformation services on the horizon.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Covering Your Bases With FireEye Network Security and Forensics Recorded: Nov 9 2020 16 mins
    Rob Ayoub, Sr. Product Marketing Manager, Cloud Detection and Forensics
    Today's security professionals have more network security challenges than ever before. With infrastructure located on-premise, as well as in private, hybrid and multi-cloud environments, managing and securing the network has become increasingly complex.

    In this session, we’ll discuss the opportunities and challenges our customers face across a growing variety of use cases, how customers can integrate FireEye detection directly into their custom application, and how they can leverage FireEye’s full portfolio of solutions to address infrastructure security wherever they need it.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Halt Advanced Attackers: Endpoint Security with Protection Modules Recorded: Nov 9 2020 21 mins
    Vinoo Thomas, Sr. Product Line Manager, Endpoint Security, FireEye
    Advanced attackers fly under the radar of prevention or detection technologies, living off the land, leveraging features and tools found in the operating system. From an attacker’s perspective, using legitimate or existing tools and features makes the defender’s job inherently more difficult. Picking out the malicious use of built-in OS tools is like looking for a needle in a haystack.

    With FireEye Endpoint Security and our protection modules, these living off the land based attacks are made visible to FireEye and can be stopped. See how you can quickly implement Endpoint Security modules to disrupt attackers.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • All the Knowledge of FireEye at Your Fingertips Recorded: Nov 9 2020 14 mins
    Henrik Olsson, Product Line Manager, Endpoint Security, FireEye
    All the Knowledge of FireEye at Your Fingertips | Endpoint Security with Process Tracker, Enricher and Detection on Demand

    When an attack occurs, it may take a while to understand who is attacking, what methods are they using and what are they typically after. This information can very useful to understand how to detect all aspects of the attack, how to best remediate, and how to prevent it from happening again.

    Join us to hear how Endpoint Security with detection modules can arm you with the context you need to respond effectively, mitigate damage, and prevent the next attack from occurring.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • When the Breach Doesn’t Stop There Recorded: Nov 9 2020 10 mins
    Rob Cappiello, Principal Product Line Manager, Endpoint Security, FireEye
    Some attackers are staying one step ahead of detection and response, laying in wait and being stealthy to get to valuable data. They're patient, only escalating privileges when they are sure it will lead to something valuable and cleaning up their trail so it's difficult to see what they did. Once the attack is recognized, it may be too late to stop them from accomplishing their mission.

    In the past there has been no easy and reliable way to find these stealthy attacks. Now with Endpoint Security, Event Streamer and Helix, these low fidelity breadcrumbs are correlated to a single attack, with visibility into the attack.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Take Measure of Your Cloud Security Recorded: Nov 9 2020 16 mins
    Allison Wong, Sr. Product Manager, Cloudvisory, FireEye; Rajesh Rajeshirke, Principal Consultant, Mandiant
    Managing complex cloud deployments is challenging, especially when determining how pervasive rogue cloud instances, or cloud sprawl, is in your environment. But once you obtain a realistic measure of your cloud security posture, then you can effectively correct it.

    Watch this twenty-minute session to learn how FireEye Mandiant can bring world-class prevention, detection, and response capabilities to proactively outmaneuver threats in your cloud environment. We’ll discuss: The value of baselining your cloud security posture; How to gain greater visibility across hybrid, public, private, and multi-cloud environments; and Best practice cloud security based on frontline use cases.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • The Power of Streaming: Windows Event Streaming with FireEye Endpoint & Helix Recorded: Nov 9 2020 13 mins
    J.R. Wikes, Principal Systems Engineer, FireEye; Julius Di Filippo, Solutions Architect, FireEye
    Hunting threats is easier when have the power of all your sensors working together. By uniting previously unconnected sources, the multiplier effect brings power to your Security Operations Center.

    Join us to learn how FireEye Helix delivers this functionality entirely native to your workflows, bringing the world-class ability to prevent, detect, and respond to security threats to your organization. See how machine learning, algorithms and statistical analysis can enhance your detection capabilities. Hear real-life examples of how to improve your threat hunting with Windows logs.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Secure Access Service Edge: The Convergence of Security & Network Architectures Recorded: Nov 9 2020 31 mins
    David Batty, Principal Sales Engineer, FireEye; Paul Martini, CEO, iboss
    The shift to cloud-first and remote working has had its watershed moment, and many workforces are struggling to make the transition. Keeping remote workers secure outside the traditional network perimeter requires the network - and its entire security stack - to follow the user and their multiple devices anywhere, anytime. Fortunately, innovative new solutions can move network security to the cloud, so users and devices are protected, regardless of their location.

    Join FireEye and iboss as they describe their technology partnerships designed to provide customers with a secure access services edge (SASE) solution. Built on the FireEye Network Security platform, the solution combines FireEye industry-leading detection with iboss natively built cloud architecture. As a result, advanced threat protection can follow users and devices wherever they go, giving organizations peace of mind regarding the security of their data.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Understanding the Latest in FireEye Email Security Recorded: Nov 9 2020 18 mins
    Chris Filart, Sr. PMM, FireEye; Oz Wasserman, Technical Product Mgr., FireEye; Rahul Iyer, Technical Product Mgr., FireEye
    As cloud computing rapidly proliferates, many organizations are either considering or conducting a migration of their existing on-premise solution to the cloud.

    Gain valuable insight from our Email Security team on new and upcoming feature releases that protect the cloud email environment from impersonation email attacks, spear phishing, and other pervasive email-borne threats.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Detection On Demand: A One Year Update Recorded: Nov 9 2020 13 mins
    Rob Ayoub, Sr. Product Marketing Manager, FireEye; Alex Lanstein, Product Manager, Detection on Demand, FireEye
    Detection On Demand was launched at CDS 2019. At the time it was the first API SaaS service offered by FireEye and targeted customers who needed to rapidly obtain verdicts on files and objects.

    As we look at the improvements made in the last year - Alex Lanstein, Product Manager for Detection on Demand and Rob Ayoub, PMM for Detection on Demand will guide us through the customer successes and improvements to the platform made in the last year.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Validate Security Performance to Rationalize Investments Recorded: Nov 9 2020 19 mins
    Major General Earl Matthews, VP of Strategy for Mandiant Security Validation
    In the first half of the last decade, the rule of thumb for cyber security spending was roughly 3-4% of a total IT budget. By the end of that decade, average security spending had risen by 300%. Today, the typical organization uses 30-70 security tools, and spending in this area has gone through the roof. With so many controls deployed, there is often duplication. But without reliable evidence of security controls performance, it’s impossible to know where overlap exists or where technology is not delivering intended value so leaders can reliably remove unneeded controls without increasing risk.

    With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric.

    General Earl Matthews will discuss how to align a cyber security program with desired business outcomes, including cost-cutting demands, and teach attendees how to rationalize cyber security investments and prove their value to the C-suite. Attendees will learn a proven methodology to financially rationalize cyber security investments through security validation.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Top 5 Attacks Thwarted by Managed Defense This Year Recorded: Nov 9 2020 23 mins
    Nick Schroeder, Managed Defense Principle Consultant, Mandiant
    In 2020, the battle-savvy defenders of Mandiant Managed Defense have seen and stopped sophisticated attacks including MAZE ransomware, APT 34 phishing, and credential harvesting.

    Join us as we walk through these and other impactful threats we've seen and stopped this year and show how managed detection and response can help you outplay your attacker.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 如何應對 COVID-19 資安危機
  • Live at: Mar 20 2020 3:15 am
  • Presented by: Matthew Wong, FireEye 技術顧問
  • From:
Your email has been sent.
or close