Hi [[ session.user.profile.firstName ]]

TIBER-EU - How Mandiant Engagements Enhance Your Cyber Resilience

The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives of TIBER-EU are improving the protection, detection and response capabilities of entities, enhancing the resilience of the financial sector; and providing assurance to the authorities about the cyber resilience capabilities of the entities under their responsibility.

Join FireEye Mandiant Senior Consultant Angelo Perniola and Principal Consultant Jay Christiansen to:

-Understand how the TIBER scheme aims to improve Financial Service organisations resilience to advanced persistent threats by conducting Red Team Operations leveraging cyber threat intelligence and targeted attack scenarios that focus on high value targets and assets.
-Gain insight into how FireEye Mandiant leverages its world-leading Threat Intelligence and Incident Response capabilities to understand attackers and their modus operandi in order to identify the most relevant attack scenarios in line with threats such as ransomware, SWIFT frauds and Customer PII leaks.
-See how the Mandiant Red Team uses the compiled intel, in the form of a Targeted Threat Intelligence Report, to create attack plans and risk management trackers for the engagement, as well as how they carry out the stealthy TIBER cyber-attacks using tools and techniques mapped against MITRE ATT&CK framework and each APT’s specific capabilities
-Understand how all the pieces fit together to create and end-to-end test and what deliverables can be expected from Mandiant in terms of root cause analysis of issues, strategic recommendations, technical findings and analysis, as well as follow on opportunities for collaboration with the client tech teams in the Purple Team and Security Validation follow-ons.
Recorded Jun 10 2020 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Angelo Perniola, Senior Consultant & Jay Christiansen, Principal Consultant
Presentation preview: TIBER-EU - How Mandiant Engagements Enhance Your Cyber Resilience

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A Red Teaming Case Study Sep 15 2020 9:00 am UTC 41 mins
    Vivek Chudgar, Sr. Director - Mandiant Consulting
    Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
    This session reviews a red team case study in which an objective-based assessment involved emulating the activities of an advanced, nation state attacker across the entire attack lifecycle. Come learn valuable insights from how one organization dealt with genuine attack conditions.
  • Leveraging Threat Intelligence - To Guide Cyber Risk Decisions Aug 26 2020 4:30 am UTC 60 mins
    Shantanu Mahajan, Regional Security Architect, India
    Is cyber threat intelligence just feeds? Can it help at different levels in the organization? If yes, how?
    Cyber threat intelligence is an essential capability in an organization’s security program. Used properly, it can enable better-informed security and business decisions and ultimately allow organizations to take decisive action to protect their users, data and reputation against adversaries.
    Please join us for the webinar and we will help you understand what cyber threat intelligence enables organizations with. We will also cover use cases that stand out uniquely with the application of cyber threat intelligence.
  • 如何簡化網路安全並降低風險 Aug 20 2020 2:30 am UTC 45 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    管理資安監控是一項挑戰,尤其是當組織每天收到平均10,000多個警報時。
    當應對漏洞的平均時間為32天時,組織需要減少從警報到修復的時間,以降低總體資安風險。

    在這網路研討會中,我們會分享:
    •了解技術整合的好處
    •了解單個平台可以為您的資安團隊和流程做什麼
    •探索您現有的資安投資尚未開發的潛力
  • Ransomware Trends with A Focus on MAZE Aug 18 2020 9:00 am UTC 55 mins
    Steve Ledzian VP, CTO - APAC, FireEye
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
  • An Intelligence Driven Approach to Security Validation Recorded: Aug 4 2020 56 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • Cybersecurity Expertise and Female Leadership: Why Boardrooms Need Both Recorded: Jul 22 2020 62 mins
    Coco Brown, Founder and CEO, Athena Alliance; Alexa King, EVP, General Counsel, FireEye
    Although diversity in the c-suite and the boardroom is improving, there is more work to be done. Through its Elevate initiative, FireEye looks to continue to help connect, educate and enable cyber security leaders to assume responsibilities within today’s boards.
     
    During this discussion, Alexa King, FireEye EVP, General Counsel and Board Member, and Coco Brown, the founder and CEO of the accomplished Athena Alliance platform, will share details and key learnings from their own personal journeys. They will highlight some of the opportunities that exist for women in cyber security as they identify and prepare for board level roles, as well as the best ways to go about advocating for others.

    Alexa and Coco strongly believe in the power of women as executives in cyber security, and how important it is to have different perspectives on a board. Making connections, bringing opportunities to more women and offering support along the way will help benefit all women leaders in cyber.
  • iBoss Cloud + FireEye - Cloud Network Security as a Service Recorded: Jul 21 2020 57 mins
    Simon Eappariello, Senior Vice President, EMEIA & APJ, iBoss
    The network perimeter has eroded, making traditional network security appliances ineffective at securing users and devices that are no longer bound by network boundaries. Built on a proprietary containerized architecture designed 100% for the cloud, iboss cloud secures Internet access from anywhere, including in and out of your physical network perimeter.Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense and data loss at all times. Since iboss cloud lives in the cloud, network security goes where users go with elastic and instant scaling to meet the demands of the cloud-first future.
  • The Ultimate Pairing of Threat Intel and Validation Recorded: Jun 30 2020 30 mins
    Brian Contos, VP, Technology Innovation for Mandiant Security Validation & Sandra Joyce SVP, Global Intelligence for Mandiant
    Sandra Joyce, FireEye SVP & Head of Global Intelligence, returns to talk with Brian about recent infamous hacker groups’ exploitation of COVID-19, why having more security tools damages your chance of surviving a breach, and gives insight into findings from the Mandiant Validation Security Effectiveness Report.
  • 保护Azure和O365针对攻击者的侵害 Recorded: Jun 18 2020 43 mins
    FireEye 大中華區技术顾问 - 尹思凡
    您是否知道攻击者正在使用Office的eDiscovery功能来搜寻敏感数据?FireEye具有专门针对使用eDiscovery和从eDiscovery生成的规则,这在入侵的组织中通常很少见。

    请即注册网路研讨会以了解更多关于O365安全性

    联络: Steven.Yin@FireEye.com
  • Validate Security Performance to Rationalize Investments Recorded: Jun 11 2020 52 mins
    Major General Earl Matthews, VP of Strategy for Mandiant Security Validation
    Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

    In this session, led by Major General Earl Matthews, VP of Strategy for Mandiant Security Validation, you can learn:

    - Best practices for investment prioritization when it comes to hiring, training and security solution procurement
    - How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
    - Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
  • C-Suite Conversations: The Value of Threat Intelligence Recorded: Jun 11 2020 47 mins
    Nigel Gardner, Sr. Cyber Threat Intelligence Leader, MGM & Bart Lenaerts-Bergmans, Sr. Product Marketing Manager, Mandiant
    Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders?
    Join this session to hear Nigel Gardner, Senior Cyber Threat Intelligence Leader at MGM Resorts discuss:

    • Types of threat intelligence consumers
    • Whether to use outcomes or operational metrics to communicate threat intelligence
    • Whether ROI-based justification is required to measure the success of threat intelligence
    • Use cases that illustrate working and nonworking approaches
  • Cloud Security for Government: A Conversation with the CyberWire and FireEye Recorded: Jun 11 2020 59 mins
    Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
    Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

    On June 11th at 3:00 PM ET, the CyberWire and FireEye subject matter experts will discuss how government IT managers can overcome these challenges and pave the way for a successful path forward. Our conversation will cover not only the state of cloud for government use, but also how to:

    - Gain greater visibility across hybrid, public, private, and multi-cloud environments
    - Achieve cloud compliance, enforcement, and control
    - Manage and mitigate risks in the cloud, from a CISO’s perspective
    - Secure the remote workforce
  • How to Fortify Your Security Operations with Technology and Expertise Recorded: Jun 11 2020 52 mins
    Patrick O’Sullivan, Director of Security Engineering, Alorica​, & Stanley Parret, Principal Consultant, Mandiant​
    Today is the day you outplay cyber attackers. They can deliver easy to execute, threats with immediate impact through an as-a-service model. To beat them, CISOs must assemble skilled cyber security staff, threat intelligence and technology into an innovative managed detection and response (MDR) capability.

    Navigating the MDR marketplace can be difficult without insight from peer organizations with established programs. Stanley Parret, Mandiant Principal Consultant and Patrick O'Sullivan, Director of Security Engineering at Alorica can give you insights and advice for selecting the best MDR solutions for your needs and show you how you can outmaneuver attackers.

    Join this session to:
     Understand emergent threats and tactics that drive your need to quickly detect and respond to cyber threats.
     Realize that you’re not in an either-or situation and learn how to align people, technology and operations in your SOC.
     See what it looks like to outplay your attacker in a live tabletop exercise.
  • Sandworm Resurfaced: The Continuing Story Recorded: Jun 11 2020 59 mins
    Andy Greenberg Author, Journalist, WIRED & John Hultquist, Sr. Director, Intelligence Analysis, Mandiant Threat Intelligence
    A few years ago, in the wake of the annexation of Crimea by the Russian Federation, the world became aware of the extent of Russia's cyber attack capabilities. The story of this first real instance of sustained, unrestricted cyber war is captured in WIRED journalist Andy Greenberg’s award-winning book SANDWORM: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers.

    In this session, Andy Greenberg is welcomed by John Hultquist of Mandiant for a review of Sandworm activities, from blackouts in Ukraine to NotPetya, the most costly cyberattack in history. They will also discuss the enduring relevance of the Sandworm group in light of the recent U.S. National Security Agency warning about the group’s continuing activities to disrupt global government and corporate networks and systems.
  • Mandiant’s Perspective On The Threat Actors In Europe Recorded: Jun 11 2020 60 mins
    Adrien Bataille, Senior Consultant, FireEye Mandiant
    In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. Mandiant investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.
  • A Red Teaming Case Study Recorded: Jun 11 2020 42 mins
    Vivek Chudgar, Sr. Director - Mandiant Consulting
    Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
    This session reviews a red team case study in which an objective-based assessment involved emulating the activities of an advanced, nation state attacker across the entire attack lifecycle. Come learn valuable insights from how one organization dealt with genuine attack conditions.
  • FireEye Endpoint Security War Story Recorded: Jun 11 2020 50 mins
    Anthony Ng, Vice President of Systems Engineering, APAC
    When Mandiant respond to a breach they need equally elite weapons to facilitate their response. This war story will look at how Mandiant Incident Responders fought off APT38 using some of the more sophisticated functions of FireEye Endpoint Security.
  • Proactive Cyber Crime Defense Through Public-Private Partnerships Recorded: Jun 10 2020 59 mins
    Tim Wellsmore, head of Mandiant government programs across Asia Pacific and Japan
    Cyber crime has redefined security operations for governments and the private sector. A continually evolving threat environment means cyber crime is growing in both scale and diversity. Public and private organizations must shed any pre-disposed focus on cyber espionage to adopt a proactive, intelligence led mission.

    Tim Wellsmore, head of Mandiant government programs across Asia Pacific and Japan, helps Australia manage national efforts on financially motivated cyber security threats and related cyber intelligence collection. In this session, he’ll:

    - Examine an intelligence led model for uplifting government cyber defense operations to counter cyber crime threat activity.
    - Show you how the private sector can uniquely support governments as they implement a proactive intelligence-led cyber mission.-
    - Deliver insights on the tactics and methods cyber criminals use against both public and private sector organizations.
  • Modern Cyber Risk Management for Better Decision Making Recorded: Jun 10 2020 43 mins
    Matt Keane, Principal Consultant at FireEye Mandiant, & Jennifer Guzzetta, Product Marketing Manager at FireEye Mandiant
    Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk models, which leaves gaps between attacker and defender behaviors.

    Transformation of your risk management processes, plus the people behind them, can solve for this.

    Aligning your organization’s security efforts with the risk appetite of data owners and business leaders must become a priority.

    This webinar spotlights a transformational model that operationalizes security risk management to improve and optimize decision making by:

    •Identifying challenges in your current cyber risk management program
    •Establishing a modern cyber risk management strategy
    •Shifting the players and processes involved in your cybersecurity decision support
    •Integrating risk management priorities across the entire security function
    •Monitoring progress with the right kind of security metrics

    Join Matt Keane, Principal Consultant at FireEye Mandiant, for his expertise on transforming your security risk management approach by bridging the gap between vital security teams and improving their decision making.
  • Security Without Barriers: How to Adopt, Implement, and Measure Cyber Resilience Recorded: Jun 10 2020 48 mins
    Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
    Adoption of cloud computing, an increasingly remote workforce and more reliance on mobile devices to access enterprise applications has radically changed how technology is deployed and used. Organizations need to protect their digital assets with strategies that evolve to support changing conditions.
    Attend this session to learn how a cyber resilience strategy can help protect your organization, as well as how you can explain the new cyber security landscape to your stakeholders.
    Topics include:
    • How cyber resilience can better protect your assets whenever and wherever your users require access
    • How to maintain an open and collaborative environment while still meeting security needs
    • How you can explain your security program goals to stakeholders
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: TIBER-EU - How Mandiant Engagements Enhance Your Cyber Resilience
  • Live at: Jun 10 2020 11:00 am
  • Presented by: Angelo Perniola, Senior Consultant & Jay Christiansen, Principal Consultant
  • From:
Your email has been sent.
or close