Hi [[ session.user.profile.firstName ]]

Security Predictions for 2016

In the constantly evolving world of cyber security, many of the 2016 predictions are already beginning to come true. Our experts at FireEye are able to very accurately predict the trends and ultimately stay ahead of the curve due to far-reaching visibility, as well as access to vast amounts of valuable intelligence. It is primarily for these reasons that we are able to bring you a very educated analysis of the security outlook for 2016.
Recorded Dec 15 2015 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jens Christian Høy Monrad, Global Intelligence Liaison - EMEA, FireEye
Presentation preview: Security Predictions for 2016
  • Channel
  • Channel profile
  • M-Trends 2018: un report per capire l'evoluzione degli attacchi cyber nell'ultim May 15 2018 12:30 pm UTC 60 mins
    Marco Rottigni, Sr Product Marketing Manager, EMEA
    Ogni anno i consulenti di Mandiant, una società FireEye, rispondono ad un gran numero di
    attacchi informatici sferrati da gruppi di hacker provenienti da tutto il mondo.
    Questi episodi sono sintetizzati nel rapporto annuale M-Trends, che analizza i cambiamenti nel panorama delle minacce informatiche.

    Durante il webinar, Marco Rottigni, Sr Product Marketing Manager, EMEA interverrà sui seguenti temi:

    -L'evoluzione del panorama attuale delle minacce
    -L'insorgenza di gruppi APT sempre più sofisticati e pericolosi
    -Quali organizzazioni hanno più probabilità di essere colpite dai pirati informatici
    -La carenza di personale qualificato e quanto questa influisca sulla sicurezza delle aziende
    -La correlazione tra sistemi di sicurezza deboli ed una maggiore esposizione al rischio
    -Le migliori prassi del Red Team per una protezione più efficace
  • M-Trends 2018 - Understanding Today's Cyber Attack Trends May 2 2018 10:00 am UTC 45 mins
    Stuart McKenzie, VP, Mandiant Consulting
    Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarised in the annual M-Trends report, which explores changes in the cyber threat landscape.

    During this webinar, our Vice President Stuart McKenzie will discuss:

    - Longer-term trends in today's threat landscape
    - Sophisticated and harmful APT groups to look out for
    - Which organisations are most likely to be retargeted by attackers
    - The difficulty of finding skilled personnel and how it affects the security function
    - How weaknesses in security fundamentals contributed to successful compromises
    - Best practice red teaming tactics for improved security defense
  • [Panel] Building Effective Cyber Defense Apr 25 2018 12:00 pm UTC 60 mins
    Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall)
    With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Why breach prevention matters
    - True costs of breaches
    - Technological solutions to consider for a more cyber resilient enterprise
    - How AI/machine learning and human talent can work together
    - Top threats to look out for in 2018

    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Simon Moor, VP for Northern Europe, FireEye
    - Bob Honour, EMEA Marketing Director, SonicWall
  • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority Apr 24 2018 2:00 pm UTC 75 mins
    FireEye EMEA
    Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

    Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

    Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

    "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."


    "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
    - PWC Global State of Info Security Survey, 2015
  • [Arabic] How FireEye Helix can deliver advanced capabilities to your org Recorded: Apr 3 2018 58 mins
    Yazan Hammoudah, SE Manager, MEA, FireEye

    Most organizations have invested lots of money and resources into various security tools. The end result is an array of point products from different vendors that often don't work well together. FireEye Helix can help unify these existing investments while providing customers the ability to analyze and respond to alerts through a single centralized platform.
    With Helix, you get FireEye's top of the line MVX detection capabilities paired with industry leading iSight intelligence. The result is high fidelity, contextual alerts, and the ability to shift from detection to remediation immediately-both on the network and on the endpoint. You will be able to resolve attacks quickly and effectively and minimize any impact. At the end, you will see a demo of how Helix identifies and responds to an alert.
  • How to Cope with GDPR Strict Breach Reporting Rules Recorded: Mar 22 2018 38 mins
    Stuart McKenzie, VP, Mandiant Consulting
    Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.

    GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.

    With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.

    Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
    · How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
    · How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
  • GDPR: durante e dopo le 72 ore Recorded: Mar 22 2018 61 mins
    Marco Rottigni, Senior Manager, Product Marketing, FireEye
    Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
    L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
    Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
    In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.

    Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
    "aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
    "ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
  • Security Operation Platform: Une nouvelle réponse avec FireEye Helix Recorded: Mar 22 2018 41 mins
    Jerome Delaville, System Engineer, FireEye France
    Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
    FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.

    Lors de ce webinaire nous couvrirons les points suivants :
    Comment HELIX centralise les opérations de sécurité :
    - Améliore la visibilité de bout en bout
    - Aide à la Priorisation et la contextualisation des alertes
    - Accompagne à la prise Prise de décisions et à la levée de doutes

    Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
  • Hitting the Jackpot: Cybercriminals' Persistent Interest in ATM Exploitation Ops Recorded: Mar 14 2018 31 mins
    Kimberly Goody, Senior Analyst; Jaideep Natu, Analyst - FireEye
    Recent trends suggest a continued increase in popularity of ATM “jackpotting” operations leveraging various tactics, techniques and procedures (TTPs). While we have observed an increase in the use of ATM malware in underground communities since 2011, highly publicized events demonstrating the potential for lucrative profits from ATM jackpotting operations have undoubtedly sparked more interest in this attack vector. Join this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.
  • Building a secure future for women in Cyber Security Recorded: Mar 6 2018 62 mins
    Zeina Zakhour, Denise Bedell, Vasu Jakkal, Roxy Dee, Emma Hunwick
    Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.

    Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.

    Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:

    -How did they make their first break?
    -Why does the industry have such a hard time retaining talent?
    -What are some of their favourite parts about their job?
    -Their advice to women in the industry
    -Their advice to cyber security execs looking to create more diverse teams

    Moderator: Denise Bedell (Content Innovo)
    Zeina Zakhour (Atos), Vasu Jakkal (FireEye), Roxy Dee (Hurricane Labs), Emma Hunwick (PwC)
  • APT37: The Overlooked North Korean Threat Recorded: Feb 28 2018 59 mins
    Ben Read, Senior Manager Cyber Espionage, FireEye
    Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.

    APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

    FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. On Thursday, February 28, join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:

    • A history of APT37 support for North Korean interests
    • Details on the malware suite employed by APT37
    • How APT37 has been influencing the world beyond the Korean peninsula
  • Cyber Security Predictions 2018: panoramica sulla regione EMEA Recorded: Jan 31 2018 49 mins
    Marco Rottigni, Senior Manager, Product Marketing, FireEye
    Il 2017 è stato un anno ricco di eventi sul fronte cyber, soprattutto in Europa.
    Abbiamo assistito ad attacchi motivati da spionaggio industriale con finalità politiche, cambiamenti nella regolamentazione del mondo cyber, un ecosistema criminale mirare a vari settori e mercati in Emea – e questo non è che l’inizio.

    Parliamone insieme nel webinar del 31 gennaio, in cui Marco Rottigni, Sr Product Marketing Manager EMEA di FireEye, affronterà vari aspetti del panorama delle minacce cyber in EMEA per il 2018, tra cui:

    •Tensioni politiche persistenti nella regione
    •Prossime elezioni
    •Diversi livelli di maturità in ambito security
    •L’impatto delle nuove normative relative sulla compliance e la protezione dei dati

    Registrati subito, per sapere cosa ci riserva il futuro e per rimanere un passo avanti rispetto alle minacce di cyber security.
  • Prédictions 2018: A quoi s’attendre en Europe en 2018 ? Recorded: Jan 30 2018 63 mins
    David Grout, Pre-sales Director, Southern Europe, FireEye
    2017 a été riche en évènement cyber cette année, et particulièrement en Europe et au Moyen Orient. Nous avons vu des actes motivés politiquement visant les milieux industriels, de grandes opérations d’espionnage, des changements législatifs forts, et une capacité continue des attaquants à s’adapter et à évoluer vers de nouvelles cibles et techniques.
    Rejoignez-nous pour un Webinaire le 30 Janvier. David GROUT, Directeur Technique Europe Du Sud chez FireEye, vous présentera les différents aspects de la menace et les perspectives pour 2018 en Europe. Nous traiterons à cette occasion des sujets incluant :
    1.Les tensions géopolitiques dans la région et les impacts cyber
    2.Les élections
    3.La maturité de la sécurité en Europe
    4.Les impacts des nouvelles législations sur la sécurisation des données et des personnes

    Enregistrez-vous dès aujourd’hui pour anticiper le risque de demain.
  • Cyber Security Predictions: What is in store for the EMEA region Recorded: Jan 30 2018 62 mins
    David Grout, Pre-sales Director, Southern Europe, FireEye
    [Additional Insights for Turkish Audience]

    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for a live webinar, as David Grout, Southern Europe Systems Engineering Director with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • APT34 - New Targeted Attack in the Middle East Recorded: Dec 19 2017 64 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.

    APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.

    Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.

    Register today to gain deeper insights into this threat group!
  • [ARABIC] 2017 - How FireEye can help MEA organisations to protect against APTs Recorded: Dec 19 2017 45 mins
    Yazan Hammoudah, Director of System Engineers, Middle East and Africa
    From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyberattacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organisation. 2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyberattacks across EMEA and more specifically in the Middle East. How can FireEye help your organisations protect against these persistent threats?

    Join this live webinar in Arabic as we will discuss the following topics:
    - FireEye Adaptive Defense
    - Technology
    - Intelligence
    - Expertise

  • Cyber Security Predictions: What is in store for the EMEA region Recorded: Dec 14 2017 37 mins
    Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence
    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Cyber Crime, Data Breaches e GDPR Recorded: Dec 6 2017 65 mins
    Marco Rottigni, Sr Manager Prod. Marketing, FireEye; Davide Gabrini, Laboratorio di Informatica Forense, University of Pavia
    Indicazioni pratiche su come far evolvere la gestione del cyber risk
    Il ripetersi di attacchi ransomware (WannaCry, Petya) che hanno colpito ultimamente anche i computer di importanti aziende italiane, mette in luce la necessità impellente di rivedere i programmi di ICT Security, comprendere meglio l’esposizione al Cyber Risk, impostare monitoraggi, intelligence e capacità di risposta immediata.

    Anche il nuovo regolamento europeo per la Data Protection (GDPR) concorre a elevare la soglia di attenzione sul tema della protezione dei dati. Tradurre in pratica questo intento (come richiesto dagli articoli 33-34 e 84 del GDPR) significa agire valutando la propria postura di sicurezza, ma soprattutto sviluppando capacità di visibilità, analisi e risposta nei confronti degli attaccanti.

    Il webinar CYBER CRIME, DATA BREACHES E GDPR organizzato da The Innovation Group in collaborazione con FireEye, il prossimo 19 settembre, partendo dalla presentazione dello stato dell’arte dell’evoluzione del cyber crime, la nuova generazione di ransomware, l’importanza di disporre di “prove digitali” propone alcune soluzioni pratiche per raggiungere una maturità operativa nella resilienza agli attacchi avanzati, in linea con gli standard più elevati.
  • Protection des Endpoint, dotez-vous de l'expertise nécessaire Recorded: Nov 30 2017 47 mins
    Lluis Coma, Systems Engineer, FireEye
    La protection Antivirus a été l’une des fondations de la sécurité des Endpoints depuis des années, on sait aujourd’hui que celle-ci est nécessaire mais non suffisante.
    L’évolution de la menace oblige à repenser la sécurisation des Endpoints en mettant en place différents moteurs de protections capables de répondre à différents types de menaces.
    Cette évolution force aussi le constat « que 100% de sécurité n’existe pas » et qu’il faut donc se doter de solution d’investigations et de réponses à incidents aux niveaux des Endpoints en support de ces moteurs de protections.

    Jeudi 30 Novembre, Lluis Coma, Ingénieur FireEye, détaillera :

    - Les enjeux sur les Endpoints aujourd’hui
    - Les fonctionnalités de protections nécessaires pour une améioration de sa posture de sécurité
    - Les fonctionnalités d’investigations et d’analyses permettant une réaction rapide et une limitation des impacts
    - Les modifications de processus et d’organisations pour mettre en place une approche de « Hunting » proactive.

    Un webinar vous permettant de béneficier de l’experience FireEye appliquée au Endpoint.
  • Webinar in italiano - The Next Level of Smarter Endpoint Protection Recorded: Nov 29 2017 45 mins
    Marco Rottigni, Senior Manager, Product Marketing, FireEye
    Per decenni, la protezione antivirus (AV) è stata la base per la sicurezza degli endpoint, nonostante tutti i suoi limiti. Per affrontare le minacce sempre piu evolute, le organizzazioni devono dotarsi di una soluzione integrata di endpoint che possa migliorare le loro difese.
    Il 29 novembre, Marco Rottigni, Senior Manager, Product Marketing di FireEye, offrirà una panoramica di dettaglio sui seguenti punti:
    • Perché i prodotti per la sicurezza degli endpoint non sono sufficienti a fornire una protezione efficace
    • Le funzionalità necessarie per dotarsi di una soluzione completa per la protezione degli endpoint:
    -AV con Threat Intelligence
    -Detection e Response
    -Behaviour e Exploit
    -Visibilità e automazione
    • Come la soluzione FireEye Endpoint Security consente di passare rapidamente dall'individuazione all'indagine e alla remediation, tutto con un solo agente
    Partecipa a questo webinar come primo passo verso un approccio più intelligente e flessibile alla sicurezza degli endpoint.
Intelligence-led Security
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organisations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 6,000 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Predictions for 2016
  • Live at: Dec 15 2015 1:00 pm
  • Presented by: Jens Christian Høy Monrad, Global Intelligence Liaison - EMEA, FireEye
  • From:
Your email has been sent.
or close