Hi [[ session.user.profile.firstName ]]

Maximizing Threat Intelligence Programs Step by Step

This on demand session will be available starting at 5:00 a.m. PT.

Demand for threat intelligence is in high demand and different organizational stakeholders have broad set of requirements.

Learn from our enablement specialists how you can maximize threat intelligence investments and what the steps are in building out a global threat intelligence program that aligns stakeholders with ROI for the business.

For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
Live online Nov 9 1:00 pm UTC
or after on demand 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Renze Jongman, Principal Intelligence Enablement Consultant, Intel Capability Development, Mandiant
Presentation preview: Maximizing Threat Intelligence Programs Step by Step

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 如何保持網路安全”衛生”? Oct 22 2020 2:00 am UTC 50 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
  • Australian Government and Critical Infrastructure Intelligence Briefing Recorded: Oct 12 2020 61 mins
    Tim Wellsmore, Director
    A cyber intelligence briefing for Australian Government Agencies and Critical Infrastructure organisations.
  • FireEye Chat | Front and Center on Ransomware Recorded: Sep 29 2020 22 mins
    Sandra Joyce, EVP, Threat Intelligence; Kimberly Goody, Sr. Mgr., Threat Intelligence; Charles Carmakal, SVP/CTO, Mandiant
    Ransomware continues to be one of the most disruptive cyber threats facing organizations today and has been further underscored by the COVID-19 pandemic. Attackers have more aggressively pivoted their targets and tactics, techniques and procedures (TTPs) to broaden their impact to affect public infrastructure trickling down to individuals and their day-to-day lives.

    In this latest episode of FireEye Chat, we’ll bring together Mandiant experts to further discuss:
    • How ransomware has transitioned from business risk to national security risk
    • The wider implications of ransomware in today’s environment observed from the frontlines
    • How threat intelligence is vital in identifying trends and informing decisions that will help to better protect organizations

    Expert panel:
    • Sandra Joyce, EVP, Head of Mandiant Threat Intelligence
    • Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence
    • Charles Carmakal, SVP and CTO, Mandiant

    Watch Now
  • 資安有效性報告 2020: 深入了解網路狀況現實 Recorded: Sep 24 2020 45 mins
    洪文輝 Manfred Hung, FireEye 技術顧問
    【Mandiant資安有效性報告2020】深入研究了網路、電子郵件、端點和基於雲端的資安控制的性能 - 並證實了人們普遍關注的問題:資安控制的性能沒有達到預期效果。令人震驚的是,由Mandiant資安驗證(前稱Verodin)團隊的專家進行的數千次測試顯示,對於53%的測試環境,攻擊在不知情的情況下成功繞過了資安控制。這表明需要基於四個基本要素對資安有效性進行持續驗證。
    - 我對資安控制的有效性有信心嗎?
    - 我能否快速評估威脅情報或最新攻擊的相關性?
    - 我是否能阻止數據洩漏並保護數據的完整性?
    - 我如何才能簡化和標準化我的安全堆疊?
    - 我是否有證據支持與高階主管溝通關鍵指標?
  • 勒索軟體趨勢分析 – 如何應對如MAZE的攻擊 Recorded: Sep 23 2020 67 mins
    洪文輝 Manfred Hung FireEye 技術顧問
  • How Continuous Validation Helps Protect the Supply Chain Recorded: Sep 22 2020 59 mins
    Matt Shelton, Director, Technology Risk and Threat Intelligence, FireEye
    The Expanding Attack Surface: How Continuous Validation Helps Protect the Supply Chain

    Organizations are increasingly using third party providers to manage critical components of their infrastructure. The introduction of cloud services, managed service providers, and Software-as-a-Service (SaaS) has increased the size of an organization’s attack surface. A breach of proprietary and confidential information is just as impactful coming from the supply chain as it is from an organization’s infrastructure. Join Matt Shelton, Director, Technology Risk and Threat Intelligence, as he explains how intelligence-led validation can help tighten controls and reduce risk. In this webinar:

    -Hear about the realities of today’s threat landscape, sophisticated attackers and the implications on managing your security stack and processes
    -Learn how threat intelligence helps you take decisive action
    -Find out how continuous validation helps you understand the true measure of your security
    -Get insights into an actual use case where a company’s supply chain was breached to see how intelligence-led validation could have helped prevent it

    Register Now
  • FireEye Virtual Partner Momentum - HK Recorded: Sep 16 2020 70 mins
    FireEye HK Sales Leaders; APAC Channel Director
    At FireEye, we will be focused on accelerating FireEye's progress along with our partners, and this is reflected in the theme for Momentum: Relentless. Together, we are committed to keeping you updated on our insights, partner programs and resources, and the latest solutions to help you deliver growth and win in the security market.

    Over the years, we improved the value of our core products, while innovating solutions to drive our future growth. With the acquisition of Verodin (now known as FireEye Mandiant Security Validation) and Cloudvisory, we bring security improvement and efficiencies across every working environment.

    Join us at our HK Virtual Partner Momentum at 10 am on Sept 16, 2020, we will share updates of FireEye HK and highlight partner strategies and priorities.
  • A Red Teaming Case Study Recorded: Sep 15 2020 41 mins
    Vivek Chudgar, Sr. Director - Mandiant Consulting
    Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
    This session reviews a red team case study in which an objective-based assessment involved emulating the activities of an advanced, nation state attacker across the entire attack lifecycle. Come learn valuable insights from how one organization dealt with genuine attack conditions.
  • Help, my users have been hacked! What happened and how do I respond? Recorded: Sep 3 2020 43 mins
    Matthew Wong, Solution Architect, Greater China Region [Conducted in Cantonese]
    A Breach Investigation Scenario Leveraging FireEye Endpoint Security

    FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.

    Join FireEye Expert as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how the investigation can be used to find and contain the impact of a breach in nearly any environment.
  • Ransomware Trend With A Focus On Maze Recorded: Aug 20 2020 54 mins
    Matthew Wong, Solution Architect, Greater China Region, FireEye
    勒索軟件趨勢分析 – 如何應對如MAZE的攻擊
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics.

    This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
    *Conducted in Cantonese
  • 如何簡化網路安全並降低風險 Recorded: Aug 20 2020 45 mins
    洪文輝 Manfred Hung, FireEye 技術顧問

  • Ransomware Trends with A Focus on MAZE Recorded: Aug 18 2020 55 mins
    Steve Ledzian VP, CTO - APAC, FireEye
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
  • An Intelligence Driven Approach to Security Validation Recorded: Aug 4 2020 56 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • Cybersecurity Expertise and Female Leadership: Why Boardrooms Need Both Recorded: Jul 22 2020 62 mins
    Coco Brown, Founder and CEO, Athena Alliance; Alexa King, EVP, General Counsel, FireEye
    Although diversity in the c-suite and the boardroom is improving, there is more work to be done. Through its Elevate initiative, FireEye looks to continue to help connect, educate and enable cyber security leaders to assume responsibilities within today’s boards.
    During this discussion, Alexa King, FireEye EVP, General Counsel and Board Member, and Coco Brown, the founder and CEO of the accomplished Athena Alliance platform, will share details and key learnings from their own personal journeys. They will highlight some of the opportunities that exist for women in cyber security as they identify and prepare for board level roles, as well as the best ways to go about advocating for others.

    Alexa and Coco strongly believe in the power of women as executives in cyber security, and how important it is to have different perspectives on a board. Making connections, bringing opportunities to more women and offering support along the way will help benefit all women leaders in cyber.
  • iBoss Cloud + FireEye - Cloud Network Security as a Service Recorded: Jul 21 2020 57 mins
    Simon Eappariello, Senior Vice President, EMEIA & APJ, iBoss
    The network perimeter has eroded, making traditional network security appliances ineffective at securing users and devices that are no longer bound by network boundaries. Built on a proprietary containerized architecture designed 100% for the cloud, iboss cloud secures Internet access from anywhere, including in and out of your physical network perimeter.Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense and data loss at all times. Since iboss cloud lives in the cloud, network security goes where users go with elastic and instant scaling to meet the demands of the cloud-first future.
  • The Ultimate Pairing of Threat Intel and Validation Recorded: Jun 30 2020 30 mins
    Brian Contos, VP, Technology Innovation for Mandiant Security Validation & Sandra Joyce SVP, Global Intelligence for Mandiant
    Sandra Joyce, FireEye SVP & Head of Global Intelligence, returns to talk with Brian about recent infamous hacker groups’ exploitation of COVID-19, why having more security tools damages your chance of surviving a breach, and gives insight into findings from the Mandiant Validation Security Effectiveness Report.
  • 保护Azure和O365针对攻击者的侵害 Recorded: Jun 18 2020 43 mins
    FireEye 大中華區技术顾问 - 尹思凡


    联络: Steven.Yin@FireEye.com
  • Validate Security Performance to Rationalize Investments Recorded: Jun 11 2020 52 mins
    Major General Earl Matthews, VP of Strategy for Mandiant Security Validation
    Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

    In this session, led by Major General Earl Matthews, VP of Strategy for Mandiant Security Validation, you can learn:

    - Best practices for investment prioritization when it comes to hiring, training and security solution procurement
    - How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
    - Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
  • C-Suite Conversations: The Value of Threat Intelligence Recorded: Jun 11 2020 47 mins
    Nigel Gardner, Sr. Cyber Threat Intelligence Leader, MGM & Bart Lenaerts-Bergmans, Sr. Product Marketing Manager, Mandiant
    Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders?
    Join this session to hear Nigel Gardner, Senior Cyber Threat Intelligence Leader at MGM Resorts discuss:

    • Types of threat intelligence consumers
    • Whether to use outcomes or operational metrics to communicate threat intelligence
    • Whether ROI-based justification is required to measure the success of threat intelligence
    • Use cases that illustrate working and nonworking approaches
  • Cloud Security for Government: A Conversation with the CyberWire and FireEye Recorded: Jun 11 2020 59 mins
    Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
    Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

    On June 11th at 3:00 PM ET, the CyberWire and FireEye subject matter experts will discuss how government IT managers can overcome these challenges and pave the way for a successful path forward. Our conversation will cover not only the state of cloud for government use, but also how to:

    - Gain greater visibility across hybrid, public, private, and multi-cloud environments
    - Achieve cloud compliance, enforcement, and control
    - Manage and mitigate risks in the cloud, from a CISO’s perspective
    - Secure the remote workforce
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Maximizing Threat Intelligence Programs Step by Step
  • Live at: Nov 9 2020 1:00 pm
  • Presented by: Renze Jongman, Principal Intelligence Enablement Consultant, Intel Capability Development, Mandiant
  • From:
Your email has been sent.
or close