Hi [[ session.user.profile.firstName ]]

Ist Ihr Unternehmen auf Cyberangriffe vorbereitet?

Haben Sie sich bereits gefragt, ob Ihr Unternehmen auf Cyberangriffe vorbereitet ist? Erfahren Sie mehr über die aktuellen Entwicklungen der Cyberabwehr und warum Sie sich nur durch eine umfassende Strategie zur Erkennung, Vermeidung und Behandlung vor modernen Cyberattacken schützen können.
Recorded Dec 4 2014 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joerg Loehler, Systems Engineer, FireEye
Presentation preview: Ist Ihr Unternehmen auf Cyberangriffe vorbereitet?
  • Channel
  • Channel profile
  • Trends Behind Today's Breaches & Cyber Attacks in EMEA Apr 6 2017 12:30 pm UTC 45 mins
    Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence
    Join us in a live webinar as Jens Monrad explores trends that define today’s threat landscape based on Mandiant’s investigation of last year’s successful cyber attacks.
    Register today and get insights into:
    •New phishing trends breaching today’s companies
    •Changes in modern attack telemetry and methodology
    •Intelligence-led insights into emerging global threats
    •Modern defensive strategies to better protect your organisation
    •How GDPR is changing business in EMEA
  • FireEye in 2017 Mar 30 2017 3:00 pm UTC 45 mins
    Kevin Taylor, EMEA VP; Grady Summers, EVP & CTO
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Grady Summers, FireEye’s CTO and Kevin Taylor, FireEye’s VP for EMEA, as they describe how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace Mar 28 2017 9:30 am UTC 45 mins
    Daniele Nicita, Consulting Systems Engineer, FireEye Italia
    Oggi tutti parlano di Endpoint, il panorama è piuttosto confuso, i messaggi marketing sembrano essere tutti uguali indipendentemente dal vendor che li propone.
    Quali sono le domande da porsi per fare chiarezza?
    Partecipa ad un webinar live dove Daniele Nicita analizzerà le 7 domande che più spesso si è sentito fare e che aiutano a chiarire questo mondo degli Endpoint in rapidissimo cambiamento.
  • Operationalizing Threat Intelligence Recorded: Mar 16 2017 45 mins
    Igors Konovalovs, Sales Director, EMEA, FireEye iSIGHT Intelligence
    Learn how intelligence-led organizations globally apply threat intelligence to prioritize vulnerability patching, accelerate incident response, reveal strategic risks and plan cyber security investments.

    Amongst other things this webinar will provide insight into:
    1. Importance of visibility over an entire attack lifecycle
    2. How NATO military doctrine for intelligence collection & analysis can be applied in a commercial environment
    3. Key Threat Hunting skills and requirements
  • Une approche proactive et intelligente de la sécurité Recorded: Mar 16 2017 41 mins
    David Grout, Director, Southern Europe Systems Engineering, FireEye; Antonin Hily, MSSP Director, Sopra Steria
    La multiplication et la complexification des cyberattaques sur le marché français nécessitent de repenser la sécurité et passer d’un mode réactif à un mode proactif.
    Apporter de l’automatisation, de la contextualisation et de l’intelligence dans les process de détection et de réaction est clef pour gagner en vitesse et en précision et permettre ainsi une sécurité efficiente, capable d’anticiper et non plus de subir les cybermenaces.
  • [Live Panel] Threat Hunters in Action Recorded: Mar 16 2017 59 mins
    Josh Downs, BrightTALK (moderator), Jens Monrad, FireEye & Amar Singh, Cyber Management Alliance
    Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.

    This live panel will focus on the tools and techniques threat hunters use to patrol your networks, mitigate threats and remove unwanted presence.
  • Uncovering Northern Europe's Threat Landscape Recorded: Mar 9 2017 45 mins
    Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence
    The EMEA experiences of 2016 are a sobering reminder of the reach and capability of a determined and motivated cyber adversary. We will continue to see a rise in attacks from sophisticated financially motivated threat actors in 2017.

    Join Jens Monrad, Senior Intelligence Analyst, in a live webinar as he goes through some of the trends and takeways from 2016 and talk about what we can expect moving into 2017, with highlights on the risks we are seeing in the Northern Europe region.
  • Protecting Your Data with Effective Incident Response, Monitoring & Threat Intel Recorded: Feb 23 2017 49 mins
    Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye
    Protecting against data loss is a key focus of any organisation’s information security program. However it is not always that easy to put long term initiatives in place with consistent monitoring and response effectiveness to mitigate against advanced attacks where intellectual property may be the target.

    In this webinar Stuart and David will explain how effective incident response, long term monitoring and threat intelligence can help deal with data protection against advanced persistent threats (APTs) in this modern age of cyber warfare.
  • Panel Discussion - AI & Machine Learning in Cyber Security Recorded: Feb 22 2017 60 mins
    Josh Downs, BrightTALK; John Laliberte, FireEye; Natalino Busa, TeraData & Neill Gernon, AI.Dublin and Atrovate
    A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - John Laliberte, VP, Endpoint and ICE, FireEye

    - Natalino Busa, Head of Applied Data, TeraData

    - Neil Gernon, MD, Atrovate & Founder, Dublin.AI
  • Securing Industrial Control System (ICS) - What you need to know Recorded: Feb 6 2017 45 mins
    Rob Caldwell, Manager, Mandiant Consulting
    Our Mandiant Industrial Control Systems (ICS) practice will discuss findings which have been captured over recent ICS security engagements which highlight critical security areas for customers. The discussion will focus on the Mandiant methodology that is used in ICS related engagements and examples of findings which are relevant to ICS customers; with specific focus on the relevant security challenges facing these ICS customers. At the end of this discussion, the Mandiant practice will open up for Q&A on the topic.
  • 7 Questions To Consider When Looking For An Effective Endpoint Security Solution Recorded: Jan 25 2017 31 mins
    Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc.
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Financial Impact of Data Breaches Recorded: Jan 10 2017 49 mins
    Roger J. Francis, Senior Consultant at Mandiant, a FireEye company
    Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.

    In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
  • 2017 Cyber Security Predictions Recorded: Dec 15 2016 57 mins
    Stuart McKenzie, VP of EMEA, Mandiant. Gerasimos Stellatos, Director, Mandiant.
    Major events of 2016 have created great uncertainty about the future, but in cyber security one thing is certain: Some attacks and crimes will continue and new challenges will emerge.

    What new developments in cyber security should you expect in 2017?
    Join us to hear from some of FireEye top experts about our predictions for 2017 which draw from our executive team, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. These insights include:

    •What investments in security organizations will make in 2017
    •Which industry or type of organization might unexpectedly become a target of threat groups in 2017
    •How threat groups will continue to target industrial control systems (ICS) in the near future
    •What the future hold for less security-mature regions in Asia Pacific and EMEA

    Register today to understand what lies ahead, so you can prepare to stay one step ahead of cyber security threats.
  • Shamoon 2.0 – what you need to know now. Protecting against wiper malware Recorded: Dec 8 2016 48 mins
    Stuart Davis, Director, Mandiant
    Mandiant, a FireEye company, has recently discovered the use of Shamoon malware targeting GCC based organizations. The identified malware exhibits destructive behavior on Windows based Operating systems. The malware uses a signed RawDisk driver from EldoS. Mandiant suspects the objective of the malware is to render a disk unbootable.

    Join Stuart Davis as he details what you need to know to protect against this type of malware recently seen in the Middle East.
  • Make 2017 a Year of Countering the Evolving Threat Landscape Recorded: Dec 7 2016 37 mins
    Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc.
    Tis the season of predictions looking ahead to 2017 and paying lip service to the threat landscape. Not a fan of either of those? You’re not alone. Join FireEye in this BrightTalk webinar where we’ll discuss more than just the threats that may or may not be awaiting us in 2017. We’ll discuss real attacker tactics and techniques, along with how you can actually counter the risk they present.
  • Defining a Security Conscious Boardroom Recorded: Nov 22 2016 44 mins
    Adrian Taylor, Field CTO, EMEA Global Accounts, FireEye
    FireEye commissioned independent technology market research specialist Vanson Bourne to undertake a research in order to better understand the role security plays in the boardroom. The study was formed from interviewing 100 UK Chief Security Officers (CSOs) and details information about the security responsibilities of today’s members of the boardroom, as well as addressing the notion of what the ideal security conscious boardroom roles should look like.

    In this webinar, Adrian Taylor FireEye’s Field CTO for EMEA Global Accounts will discuss the results of this research project and answer the following questions:

    Is the risk register adequately prioritised and managed within the boardroom?
    Is the role of the CSO still fit for purpose?
    What could the secure boardroom of the future look like?
  • Cyber-Krisen Management in Twitter Geschwindigkeit Recorded: Nov 11 2016 45 mins
    Martin Krumboeck, Senior Consultant, Mandiant
    Stellen Sie sich folgendes vor: Sie sind in der Geschäftsführung und haben erfahren, das Cyber Kriminelle die Systeme Ihres Unternehmens komprimiert haben. Haben Sie einen Krisen-Kommunikationsplan bereit zur Sicherstellung, dass die richtigen Akteure zur richtigen Zeit informiert werden, um die Auswirkungen zu verringern?

    Kein Sorge, Sie sind nicht allein!
    Obwohl die meisten Unternehmen einen Krisen-Kommunikationsplan für andere Ereignisse haben, sind viele doch eher schlecht vorbereitet, wenn es um die Kommunikation, vor und nach einem Cyber Angriff, mit internen und externen Interessenvertretern geht.

    Nehmen Sie an diesem Webinar teil, wo Martin Krumboeck, Senior Consultant bei Mandiant, erörtert:
    -Wie man einen Krisen-Kommunikationsplan erstellt
    -Wann und Wie werden Kunden informiert
    -Wann und Wie sollte auf Medienanfragen reagiert werden
    -Wie kann sich das Senior Level vorbereiten
    -Wie der richtige Plan, die Auswirkungen eines Angriffs reduzieren kann
    -Reale Fallstudien, welche die Auswirkungen aufzeigen, wenn ein Cyber Krisen-Management-Plan vorhanden ist
  • Why Today’s Changing Threat Landscape Requires Agile Security Recorded: Nov 9 2016 60 mins
    Rajiv Raghunarayan, Sr. Director, Product Marketing, FireEye. Robert Westervelt, Research Manager, IDC.
    Advanced threats continue to grow in severity, complexity and reach as threat actors expand their attacks to hit soft targets. Adding to this, as business workloads move to the cloud, and as shadow IT continues to proliferate, unforeseen security gaps expose new vectors for exploit and abuse.

    Attacks are not just targeting the core of a network, nor are they limited to just large scale enterprises. More and more, threat actors are aiming at vulnerable endpoints, distributed network environments and porous perimeter defenses. To combat this, security solutions need to be as agile as today’s threat actors.

    In this webinar, we will discuss the changing threat landscape and how today’s threat actors and advanced malware are impacting businesses of all sizes and types. Additionally, we will examine new security solutions and deployment models that provide agility, flexibility and widespread protective reach that scales and grows with IT and security needs.
  • Data Protection: Going Beyond Encryption and Residency Recorded: Nov 9 2016 34 mins
    Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye & Roger Francis, Senior Consultant - Mandiant a FireEye Company
    When the majority of people think about data protection, they often focus on encryption. Whether the data is at rest, or in transit, the assumption is that cryptographic protocols alone will thwart any attackers attempts to gain access to sensitive data. Whilst there is no doubt that encryption is a core component of an effective data protection strategy, advanced attackers have come up with some creative techniques for circumventing controls.

    Join FireEye/Mandiant in this webinar to run through some real-world case studies, and discuss data exfiltration techniques.
  • Understanding the European NIS Directive Recorded: Oct 26 2016 25 mins
    Nathan Martz, Principal Strategic Consultant, Central Europe, Mandiant
    The European Cybersecurity policy - the Network Information Security (NIS) Directive - is about to become the new law that sets security standards for many organisations across Europe.

    Recent research carried out by FireEye shows that many organisations are not fully prepared to implement the legislation, which comes into effect in less than two years' time, and it is critical these organisations begin preparing now to be in compliance and not be caught unprepared.

    In this webinar, Mandiant’s Nathan Martz, Principal Strategic Consultant for Central Europe, will cover:
    -The basics of the European Cybersecurity policy - the Network Information Security (NIS) Directive
    -Timeline, key components and possible penalties for noncompliance
    -Practical recommendations on compliance and security standards to keep your company prepared

    We look forward to welcoming you to the webinar.
Security Re-Imagined
FireEye is the leader in stopping today’s advanced cyber attacks by combining the world most advanced technology, intelligence, and expertise. FireEye has over 2,200 customers across more than 60 countries, including over 130 of the Fortune 500.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ist Ihr Unternehmen auf Cyberangriffe vorbereitet?
  • Live at: Dec 4 2014 9:00 am
  • Presented by: Joerg Loehler, Systems Engineer, FireEye
  • From:
Your email has been sent.
or close