Hi [[ session.user.profile.firstName ]]

Threat Intelligence Drives Effective Vulnerability Management

Organizations value cyber threat intelligence (CTI) because it helps their security teams stay focused on, and stay ahead of, the most impactful threats. One of the critical strategic and tactical roles that CTI plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk.

Join us to hear FireEye Threat Intelligence experts, Jared Semrau and Kathleen Metrick share:
• The importance of comprehensive CTI to drive better-informed vulnerability management decisions
• Insight into how FireEye tracks, prioritizes and categorizes vulnerabilities to help organizations more effectively manage and mitigate the risks associated with these potential threats
• The latest research findings around the speed and frequency of exploitation

Register for the webinar
Recorded Apr 30 2020 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jared Semrau, Sr. Mgr.,Vulnerability and Exploitation, Mandiant; Kathleen Metrick, Analyst, Strategic Intelligence, Mandiant
Presentation preview: Threat Intelligence Drives Effective Vulnerability Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 如何保持網路安全”衛生”? Oct 22 2020 2:00 am UTC 50 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    為了在不斷變化的威脅環境中保持領先,資安團隊必須不斷改進其流程和技術。但即使投資過後,資安專家仍然需要回答一些緊迫的問題。
    •誰是針對我的產業的攻擊者,他們使用什麼技術?
    •什麼警報最重要,我如何應對?
    •我的工具、控制和流程是否按預期運作?
    •我應該在哪些方面作出重點改善?
    立即參加了解如何管理日常的網路保健。
    網路研討會的關鍵要點
    •了解行之有效的方法來持續評估您的資安控制的有效性
    •了解如何針對最新的威脅行為者的方法進行測試
    •如何衡量諸如MITRE之類的既定框架的差距
  • Australian Government and Critical Infrastructure Intelligence Briefing Oct 12 2020 11:00 pm UTC 60 mins
    Tim Wellsmore, Director
    A cyber intelligence briefing for Australian Government Agencies and Critical Infrastructure organisations.
  • 資安有效性報告 2020: 深入了解網路狀況現實 Recorded: Sep 24 2020 45 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    【Mandiant資安有效性報告2020】深入研究了網路、電子郵件、端點和基於雲端的資安控制的性能 - 並證實了人們普遍關注的問題:資安控制的性能沒有達到預期效果。令人震驚的是,由Mandiant資安驗證(前稱Verodin)團隊的專家進行的數千次測試顯示,對於53%的測試環境,攻擊在不知情的情況下成功繞過了資安控制。這表明需要基於四個基本要素對資安有效性進行持續驗證。
    收看此網路研討會,以了解資安驗證的基本要素,並獲得回答以下問題的知識。
    - 我對資安控制的有效性有信心嗎?
    - 我能否快速評估威脅情報或最新攻擊的相關性?
    - 我是否能阻止數據洩漏並保護數據的完整性?
    - 我如何才能簡化和標準化我的安全堆疊?
    - 我是否有證據支持與高階主管溝通關鍵指標?
  • 勒索軟體趨勢分析 – 如何應對如MAZE的攻擊 Recorded: Sep 23 2020 67 mins
    洪文輝 Manfred Hung FireEye 技術顧問
    勒索軟體威脅行為者正在加強他們的手段以及他們的贖金要求,贖金要求的金額正在攀升至數百萬美元。配備有重要資安控制措施的大型組織仍然成為策略性攻擊者的獵物。
    請立即報名參加這網路研討會,探討勒索軟件是如何發展的,更重要的是,你可以做些什麼,並了解如何控制你的下一次勒索軟體的經驗。
  • How Continuous Validation Helps Protect the Supply Chain Recorded: Sep 22 2020 59 mins
    Matt Shelton, Director, Technology Risk and Threat Intelligence, FireEye
    The Expanding Attack Surface: How Continuous Validation Helps Protect the Supply Chain

    Organizations are increasingly using third party providers to manage critical components of their infrastructure. The introduction of cloud services, managed service providers, and Software-as-a-Service (SaaS) has increased the size of an organization’s attack surface. A breach of proprietary and confidential information is just as impactful coming from the supply chain as it is from an organization’s infrastructure. Join Matt Shelton, Director, Technology Risk and Threat Intelligence, as he explains how intelligence-led validation can help tighten controls and reduce risk. In this webinar:

    -Hear about the realities of today’s threat landscape, sophisticated attackers and the implications on managing your security stack and processes
    -Learn how threat intelligence helps you take decisive action
    -Find out how continuous validation helps you understand the true measure of your security
    -Get insights into an actual use case where a company’s supply chain was breached to see how intelligence-led validation could have helped prevent it

    Register Now
  • FireEye Virtual Partner Momentum - HK Recorded: Sep 16 2020 70 mins
    FireEye HK Sales Leaders; APAC Channel Director
    At FireEye, we will be focused on accelerating FireEye's progress along with our partners, and this is reflected in the theme for Momentum: Relentless. Together, we are committed to keeping you updated on our insights, partner programs and resources, and the latest solutions to help you deliver growth and win in the security market.

    Over the years, we improved the value of our core products, while innovating solutions to drive our future growth. With the acquisition of Verodin (now known as FireEye Mandiant Security Validation) and Cloudvisory, we bring security improvement and efficiencies across every working environment.

    Join us at our HK Virtual Partner Momentum at 10 am on Sept 16, 2020, we will share updates of FireEye HK and highlight partner strategies and priorities.
  • A Red Teaming Case Study Recorded: Sep 15 2020 41 mins
    Vivek Chudgar, Sr. Director - Mandiant Consulting
    Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
    This session reviews a red team case study in which an objective-based assessment involved emulating the activities of an advanced, nation state attacker across the entire attack lifecycle. Come learn valuable insights from how one organization dealt with genuine attack conditions.
  • Help, my users have been hacked! What happened and how do I respond? Recorded: Sep 3 2020 43 mins
    Matthew Wong, Solution Architect, Greater China Region [Conducted in Cantonese]
    A Breach Investigation Scenario Leveraging FireEye Endpoint Security

    FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.

    Join FireEye Expert as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how the investigation can be used to find and contain the impact of a breach in nearly any environment.
  • Ransomware Trend With A Focus On Maze Recorded: Aug 20 2020 54 mins
    Matthew Wong, Solution Architect, Greater China Region, FireEye
    勒索軟件趨勢分析 – 如何應對如MAZE的攻擊
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics.

    This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
    *Conducted in Cantonese
  • 如何簡化網路安全並降低風險 Recorded: Aug 20 2020 45 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    管理資安監控是一項挑戰,尤其是當組織每天收到平均10,000多個警報時。
    當應對漏洞的平均時間為32天時,組織需要減少從警報到修復的時間,以降低總體資安風險。

    在這網路研討會中,我們會分享:
    •了解技術整合的好處
    •了解單個平台可以為您的資安團隊和流程做什麼
    •探索您現有的資安投資尚未開發的潛力
  • Ransomware Trends with A Focus on MAZE Recorded: Aug 18 2020 55 mins
    Steve Ledzian VP, CTO - APAC, FireEye
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
  • An Intelligence Driven Approach to Security Validation Recorded: Aug 4 2020 56 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • Cybersecurity Expertise and Female Leadership: Why Boardrooms Need Both Recorded: Jul 22 2020 62 mins
    Coco Brown, Founder and CEO, Athena Alliance; Alexa King, EVP, General Counsel, FireEye
    Although diversity in the c-suite and the boardroom is improving, there is more work to be done. Through its Elevate initiative, FireEye looks to continue to help connect, educate and enable cyber security leaders to assume responsibilities within today’s boards.
     
    During this discussion, Alexa King, FireEye EVP, General Counsel and Board Member, and Coco Brown, the founder and CEO of the accomplished Athena Alliance platform, will share details and key learnings from their own personal journeys. They will highlight some of the opportunities that exist for women in cyber security as they identify and prepare for board level roles, as well as the best ways to go about advocating for others.

    Alexa and Coco strongly believe in the power of women as executives in cyber security, and how important it is to have different perspectives on a board. Making connections, bringing opportunities to more women and offering support along the way will help benefit all women leaders in cyber.
  • iBoss Cloud + FireEye - Cloud Network Security as a Service Recorded: Jul 21 2020 57 mins
    Simon Eappariello, Senior Vice President, EMEIA & APJ, iBoss
    The network perimeter has eroded, making traditional network security appliances ineffective at securing users and devices that are no longer bound by network boundaries. Built on a proprietary containerized architecture designed 100% for the cloud, iboss cloud secures Internet access from anywhere, including in and out of your physical network perimeter.Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense and data loss at all times. Since iboss cloud lives in the cloud, network security goes where users go with elastic and instant scaling to meet the demands of the cloud-first future.
  • The Ultimate Pairing of Threat Intel and Validation Recorded: Jun 30 2020 30 mins
    Brian Contos, VP, Technology Innovation for Mandiant Security Validation & Sandra Joyce SVP, Global Intelligence for Mandiant
    Sandra Joyce, FireEye SVP & Head of Global Intelligence, returns to talk with Brian about recent infamous hacker groups’ exploitation of COVID-19, why having more security tools damages your chance of surviving a breach, and gives insight into findings from the Mandiant Validation Security Effectiveness Report.
  • 保护Azure和O365针对攻击者的侵害 Recorded: Jun 18 2020 43 mins
    FireEye 大中華區技术顾问 - 尹思凡
    您是否知道攻击者正在使用Office的eDiscovery功能来搜寻敏感数据?FireEye具有专门针对使用eDiscovery和从eDiscovery生成的规则,这在入侵的组织中通常很少见。

    请即注册网路研讨会以了解更多关于O365安全性

    联络: Steven.Yin@FireEye.com
  • Validate Security Performance to Rationalize Investments Recorded: Jun 11 2020 52 mins
    Major General Earl Matthews, VP of Strategy for Mandiant Security Validation
    Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

    In this session, led by Major General Earl Matthews, VP of Strategy for Mandiant Security Validation, you can learn:

    - Best practices for investment prioritization when it comes to hiring, training and security solution procurement
    - How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
    - Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
  • C-Suite Conversations: The Value of Threat Intelligence Recorded: Jun 11 2020 47 mins
    Nigel Gardner, Sr. Cyber Threat Intelligence Leader, MGM & Bart Lenaerts-Bergmans, Sr. Product Marketing Manager, Mandiant
    Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders?
    Join this session to hear Nigel Gardner, Senior Cyber Threat Intelligence Leader at MGM Resorts discuss:

    • Types of threat intelligence consumers
    • Whether to use outcomes or operational metrics to communicate threat intelligence
    • Whether ROI-based justification is required to measure the success of threat intelligence
    • Use cases that illustrate working and nonworking approaches
  • Cloud Security for Government: A Conversation with the CyberWire and FireEye Recorded: Jun 11 2020 59 mins
    Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
    Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

    On June 11th at 3:00 PM ET, the CyberWire and FireEye subject matter experts will discuss how government IT managers can overcome these challenges and pave the way for a successful path forward. Our conversation will cover not only the state of cloud for government use, but also how to:

    - Gain greater visibility across hybrid, public, private, and multi-cloud environments
    - Achieve cloud compliance, enforcement, and control
    - Manage and mitigate risks in the cloud, from a CISO’s perspective
    - Secure the remote workforce
  • How to Fortify Your Security Operations with Technology and Expertise Recorded: Jun 11 2020 52 mins
    Patrick O’Sullivan, Director of Security Engineering, Alorica​, & Stanley Parret, Principal Consultant, Mandiant​
    Today is the day you outplay cyber attackers. They can deliver easy to execute, threats with immediate impact through an as-a-service model. To beat them, CISOs must assemble skilled cyber security staff, threat intelligence and technology into an innovative managed detection and response (MDR) capability.

    Navigating the MDR marketplace can be difficult without insight from peer organizations with established programs. Stanley Parret, Mandiant Principal Consultant and Patrick O'Sullivan, Director of Security Engineering at Alorica can give you insights and advice for selecting the best MDR solutions for your needs and show you how you can outmaneuver attackers.

    Join this session to:
     Understand emergent threats and tactics that drive your need to quickly detect and respond to cyber threats.
     Realize that you’re not in an either-or situation and learn how to align people, technology and operations in your SOC.
     See what it looks like to outplay your attacker in a live tabletop exercise.
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Threat Intelligence Drives Effective Vulnerability Management
  • Live at: Apr 30 2020 3:00 pm
  • Presented by: Jared Semrau, Sr. Mgr.,Vulnerability and Exploitation, Mandiant; Kathleen Metrick, Analyst, Strategic Intelligence, Mandiant
  • From:
Your email has been sent.
or close