Hi [[ session.user.profile.firstName ]]

Combating Advanced Threats in the Power & Utilities Industry

Webinar Series on Cyber Security in Critical Infrastructure.

We are delighted to invite you to FireEye’s webinar for the power and utilities industry, taking place on Tuesday 17th December.

This 40 minute session offers you the opportunity to hear from, and interact with, cyber security specialists with unique insight into the power and utilities industry.

This, the first in our Critical Infrastructure webinar series, hosted by Gene Casady, Chief Security Advisor, FireEye APJ, is designed to equip you with the latest industry information on Cyber Threats and the Cyber Landscape for Critical Infrastructure.


- The Advanced Threat Landscape in the Power & Utilities Industry – Observations and Challenges
- Building an Enterprise Strategy to Defend Against Advanced Persistent Threats
- Leveraging IT/OT Convergence to Layer in Security for the Power and Utilities Industry
- Fallacies of Critical Infrastructure Policy Compliance in Ensuring Cyber Security

Critical Talks with Gene Casady
A Special Webinar Series on Critical Infrastructure

a 30 mins session with 10 minutes Q&A
Recorded Dec 17 2013 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Craig Rosen, CISO, FireEye
Presentation preview: Combating Advanced Threats in the Power & Utilities Industry

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • An Elegant and Practical Model for Security Practitioners Recorded: Sep 12 2017 48 mins
    Steve Ledzian, FireEye APAC
    "Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.

    Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
  • Smarter Endpoint Security: How to go Beyond Prevention Recorded: Jun 20 2017 54 mins
    Caludio Scarabello, Director,Product Marketing, APJ FireEye
    Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Comprehensive endpoint protection requires prevention, AV, endpoint detection and response (EDR) and other capabilities. Even when organizations adopt multiple point products, there are still gaps in their endpoint protection.

    Some companies tout “next-generation endpoint security,” but what does that mean? Jim Waggoner, Sr. Director of Endpoint Product Management at FireEye will tell you how to make sure your next-generation endpoint security solution is delivering a comprehensive. In this webinar, you will:

    Learn about the current endpoint security landscape and the challenges it poses.
    - Find out what makes EDR capabilities valuable.
    - Understand why threat intelligence is important and how it affects endpoint threat detection and prevention.
    - Discover why a single endpoint agent should include:
    - Multiple detection and prevention engines.
    - Integrated workflows from detection to investigation to remediation.
    - Scalable, multiple form factors and breadth of OS support.
  • Securing Industrial Control System (ICS) - What you need to know Recorded: May 31 2017 45 mins
    Rob Caldwell, Manager, Mandiant Consulting
    Our Mandiant Industrial Control Systems (ICS) practice will discuss findings which have been captured over recent ICS security engagements which highlight critical security areas for customers. The discussion will focus on the Mandiant methodology that is used in ICS related engagements and examples of findings which are relevant to ICS customers; with specific focus on the relevant security challenges facing these ICS customers.
  • Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations Recorded: May 18 2017 59 mins
    Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company
    Attend this webinar to be one of the first to learn details about APT32, a significant espionage operation targeting global companies operating in Southeast Asia. Over the past several months, FireEye has focused major efforts on defending our clients against APT32, also known as OceanLotus Group.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How FireEye continues to improve your ability to detect, prevent and remediate APT32 attacks

    Take your first step to minimize the impact of the new APT group.
  • M-Trends 2017: Trends Behind Today's Breaches & Cyber Attacks | APAC Spotlight Recorded: Apr 19 2017 43 mins
    Tim Wellsmore, Director, Threat Intelligence,Mandiant Consulting; Rob van der Ende, Vice President, Mandiant Consulting, APAC
    Join this important webinar as the Mandiant team explores trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks. Register today for an intelligence-led look into:
    · New phishing trends breaching today’s companies.
    · Changes in modern attack telemetry and methodology.
    · Intelligence-led insights into emerging global threats.
    · Modern defensive strategies to better protect your organization.
    Special features spotlight trends in the APAC regions. Take a guided look at the M-Trends Report, pinpointing current and emerging global threats as discovered from the front lines of today’s leading forensic investigations.
  • FireEye in 2017 Recorded: Apr 7 2017 31 mins
    Bryce Boland, Asia Pacific CTO, FireEye
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Bryce Boland, FireEye's Asia Pacific CTO, as he describes how FireEye in APAC can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • 7 Questions To Consider When Looking For An Effective Endpoint Security Solution Recorded: Jan 25 2017 31 mins
    Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc.
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Financial Impact of Data Breaches Recorded: Jan 10 2017 49 mins
    Roger J. Francis, Senior Consultant at Mandiant, a FireEye company
    Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.

    In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
  • Predicting Change in 2017 in Cyber Security Recorded: Dec 14 2016 54 mins
    Bryce Boland, Chief Technology Officer for Asia Pacific; Tim Wellsmore, Director of Consulting and Intelligence, Mandiant
    Major events of 2016 have created great uncertainty about the future, but in cyber security, one thing is certain: Some attacks and crimes will continue and new challenges will emerge.

    What new developments in cyber security should you expect in 2017 in Asia Pacific?

    Join us to hear from some of FireEye’s top experts about our predictions for 2017 which draw from our executive team, Mandiant incident responders, FireEye iSIGHT Intelligence, and FireEye Labs.
    Register to understand what lies ahead, so you can prepare to stay one step ahead of cyber security threats.

    Join Bryce Boland, Chief Technology Officer for Asia Pacific and Tim Wellsmore, Director of Consulting and Intelligence, Mandiant in this presentation about emerging trends in the Asia Pacific region.
  • Why Today’s Changing Threat Landscape Requires Agile Security Recorded: Nov 12 2016 60 mins
    Rajiv Raghunarayan, Sr. Director, Product Marketing, FireEye. Robert Westervelt, Research Manager, IDC.
    Advanced threats continue to grow in severity, complexity and reach as threat actors expand their attacks to hit soft targets. Adding to this, as business workloads move to the cloud, and as shadow IT continues to proliferate, unforeseen security gaps expose new vectors for exploit and abuse.

    Attacks are not just targeting the core of a network, nor are they limited to just large scale enterprises. More and more, threat actors are aiming at vulnerable endpoints, distributed network environments and porous perimeter defenses. To combat this, security solutions need to be as agile as today’s threat actors.

    In this webinar, we will discuss the changing threat landscape and how today’s threat actors and advanced malware are impacting businesses of all sizes and types. Additionally, we will examine new security solutions and deployment models that provide agility, flexibility and widespread protective reach that scales and grows with IT and security needs.
  • Intel & Threat Analysis – The Defensive Duo Recorded: Nov 4 2016 41 mins
    Jens Monrad, Global Threat Intelligence Liaison, FireEye; Al Maslowski-Yerges Manager, Americas Systems Engineering
    The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

    "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

    Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

    •How to ensure you are responding to the alert that matters

    •Benefits of Alerts with threat Intelligence

    •Using threat intelligence to think like your attacker

    •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

    •How security teams can prioritize and optimize their response efforts.
  • Breach Defense: Prepare & Respond Recorded: Oct 25 2016 49 mins
    Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India
    Are you ready to handle a security breach? In the age of relentless cyber crimes and nation state sponsored cyber attacks, companies need to be breach-ready, and be proactive in their incident preparedness. This could essentially save organisations from devastating cost.
    Incident preparedness is more than having an incident response plan, it’s more than having skilled personnel on staff. Come join us for a discussion on key elements that every company should consider. Major security breaches have become part of everyone’s daily news feed—from the front page of the newspaper to the top of every security blog—you can’t miss the steady flood of new breaches impacting the world today. In today’s ever-changing world of business and technology, breaches are inevitable: you must be prepared and know how to respond before they happen
  • Breach Readiness: Next Generation of Incident Preparedness Recorded: Oct 2 2016 56 mins
    Russell Teague, Managing Director, Mandiant, a FireEye Company
    Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, a FireEye Company, will discuss the Next Generation of Incident Preparedness. Mandiant is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches. Russell will discuss what companies need to do to be breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.

    Incident preparedness is more than having an incident response plan, it's more than having skilled personnel on staff. Come join us in an eye-opening discussion on key elements that every company should consider. Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen. Learn how to become prepared from the industry leader in breach management and ultimately control your cost in post breach recovery.
  • Security-as-a-Service: New Threat Landscape Demands a New Paradigm Recorded: Sep 30 2016 47 mins
    Rudy Araujo, VP, Product & Solutions Marketing
    The security paradigm for nearly two decades has been to increasingly invest in technology. These solutions have not only failed to solve the problem but have made the challenge more complex. Even if true threats are detected, they are lost in a sea of alerts and lack the context to prioritize and build response. This security posture is only exacerbated by the skills deficit currently facing the industry.

    In this webinar, we look at the emergence of a new security-as-a-service paradigm and the capabilities required to help organizations reduce risk and time to protection. The discussion will cover how the cost, specialization and complexity of cyber defense have positioned security to follow other markets in adopting an “as-a-service” paradigm.

    We will also address the capabilities that define an ideal security-as-a-service partner such as:

    •the availability of security expertise
    •a broad intelligence capability and
    •flexible deployment options

    Not only does this approach improve a security posture and reduce risk but it does so with a lower total cost of ownership (TCO). Register today to learn more about this emerging security-as-a-service model.

    The FireEye Team
  • How prepared are APAC organisations in responding to a data breach? Recorded: Sep 20 2016 37 mins
    Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan
    Our Mandiant consultants have responded to and investigated many of 2015's biggest security incidents. The insights gained from these consultancies provide us with a unique vantage point when it comes to understanding the ever-evolving cyber threat landscape.

    This webinar will discuss key trends, statistics, and case studies to illustrate the evolution of the advanced threat actors over the last year in Asia Pacfic.

    Register for the webinar and join Bryce Boland – CTO FireEye Asia Pacific and Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan at FireEye as they dicsuss the top findings from this report and explains how to prepare and respond to a breach when it occurs
  • Know Your Enemy: New Financially-Motivated & Spear-Phishing Group Recorded: Aug 18 2016 50 mins
    Steve Elovitz, Manager, Consulting Services (Mandiant), Ian Ahl, Manager, Incident Response (Mandiant)
    Beginning in January 2016, Mandiant identified a financially-motivated threat actor that launched several tailored, spear-phishing campaigns—targeting industries that process large volumes of consumer credit cards such as retail, restaurant, and hospitality. To date, Mandiant has seen this group at over 150 organizations. This group is interesting due to the large number of organizations they quickly targeted, how quickly they shift tools, tactics, and procedures (TTPs), and their unusual persistence in attempting to re-compromise an organization after remediation.

    During this conversation, we will walk through examples from several Mandiant investigations of this groups activity. We will take a technical look at this threat actor's TTPs as well as talk about what to look for to determine if they are active in your environment.

    Register for this webinar as our experts share key insights on this new cyber threat group!
  • Recognise your Threats, Regulate your Risks Recorded: Jul 26 2016 53 mins
    Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India
    Cyberattacks against Banking and Financial Institutions have evolved from annoying pop-ups and machine crashes to denial-of-business events. CxO resignations and losses/damages running into crores of Rupees have heightened the awareness around cyber security, and shifted it from an IT problem to a business priority risk.
    Recently, Asia has been a hotspot for such cyberattacks, with many high-profile attacks being the subject of headlines across the region, including the most recent Bangladesh Bank breach.
    In its latest annexure to banks titled “Cyber Security Framework in Banks”, RBI has outlined a number of proactive measures that Banks in India need to take to ensure a robust cyber security/resilience framework, and to ensure adequate cyber security preparedness on a continuous basis.

    Here are just a few requirements:
    -Board approved cyber security policy
    -Continuous surveillance
    -Cyber crisis management plan
    -Cyber resilience framework
    -Cyber security awareness among stakeholders / top management / board
    FireEye invites all banks and financial institutions to join this exclusive webinar where the speakers will review the RBI guidelines and suggest ideas to bolster your response strategy and limit the consequences of a breach.

    Date: 26th July, Tuesday
    Time: 11:00 am
    Duration: 40 mins. With Q&A
    Vipul Kumra, Consulting Engineer, FireEye India
    Shantanu Mahajan, Consulting Engineer, FireEye India
  • Cyber Risk Conversation: Security Trends & Best Practices Recorded: Jul 26 2016 54 mins
    Ron Bushar, Managing Director, Mandiant (a FireEye company)
    Over the last decade, cyber security has evolved from a niche concern confined to IT professionals to a major priority for CEOs and boards of directors. Company leaders are now charged with managing cyber risk with the same urgency that they have managed traditional business risk.
    The emergence of cyber risk as a centerpiece of risk management is being fueled by new and increasingly complex threats. Organizations must deal with a quickly evolving set of threats to their information systems and data. Many of these threats were unimaginable just a few years ago.

    In this discussion, we explain the different forms of cyber risk and show how the threat level has risen in recent years. We also provide a basic framework for managing cyber risk, and finally, we pose five key questions business leaders should ask themselves to ensure their security posture is sufficiently robust and resilient to meet evolving threats.

    Register for this webinar today. As usual, we’ll leave time for Q&A.
  • Good Enough Security: Is It Hurting Your Business Recorded: Jun 22 2016 59 mins
    Shantanu Mahajan, Consulting Engineer, FireEye Technologies Pvt Ltd
    “Good Enough Security: Is It Hurting Your Business “
    Imagine a continuous state of alarm - that alarm sounding every second …24 hours a day …7 days a week …all year long …
    That’s the situation IT security teams around the world face with their cybersecurity tools. With so many alerts, it is not your security that is working hard, it’s your security team. And with so many alerts to review a security team can end up with alert fatigue, causing them to ignore a high percentage of the messages. When that happens, cyber attacks can slip by.
    Organizations with traditional defenses often face an uncomfortable and expensive tradeoff: add security staff and tools at considerable cost or risk fatigue and missing a critical alert.
    Truth is, you can avoid this tradeoff.
    Join the FireEye webinar “Good Enough Security: Is It Hurting Your Business” where we will throw some light on:

    1.The true costs of ineffective security
    2.Detection Efficacy: Invest in security tools that highlight alerts that matter
    3.Key considerations when evaluating a cyber security solution - The need for a platform that includes response
    Register Today
    The FireEye Team
    Time to check your security posture!

    Date: Wednesday, 22nd June 2016
    Time: 11:00 a.m
    Duration: 40 mins. and Q&A
    Speaker: Shantanu Mahajan, Consulting Engineer, FireEye Technologies Pvt Ltd.
  • Ransomware : A Disruption or Distraction? Recorded: Jun 1 2016 54 mins
    Vipul Kumra,Consulting Engineer, FireEye India
    It is 8:00 am, and you are on the way to work. You get a frenetic call from your office – “hackers are holding your computers hostage in exchange for a ransom”. Your order processing application is one of the casualties. Your last successful backup was over a month ago. Do you pay the ransom and regain control? Your money or your data?
    This scene may seem to be straight out of a Hollywood movie, but for several organisations, it has become an unfortunate reality today. Ransomware is a growing menace to enterprises and consumers alike, and given the recent trends observed by FireEye, it is here to stay. Some ransomware variants encrypt your critical files, others lock you out of the systems. Some demand bitcoins, others demand payment vouchers. Some are a disruption to your business, others are just a distraction.
    Join the FireEye webinar “Ransomware: A Disruption or Distraction", and get an in-depth view into the mechanics of ransomware. You will learn about:
    1.Ransomware: Impact & Trends
    2.The Economics of Ransomware
    3.A Distraction or Disruption
    4.Lessons Learned: Tackling Ransomware
FireEye APAC
FireEye English-speaking Asia Pacific & Japan

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Combating Advanced Threats in the Power & Utilities Industry
  • Live at: Dec 17 2013 5:00 am
  • Presented by: Craig Rosen, CISO, FireEye
  • From:
Your email has been sent.
or close