Hi [[ session.user.profile.firstName ]]

Is your organisation the new target for cyber attacks?

Financial, geopolitical and economical changes made 2015 a very busy year for the Europe, Middle East and Africa (EMEA) region, particularly in the cyber realm. FireEye has been monitoring these shifting cyber trends and has identified considerable evolutions to the EMEA threat landscape when comparing the second half of the year to the first half.

Register for this webinar with Yogi Chandiramani, EMEA SE Director and Jens Monrad, Global Threat Intel Liaison who will present the findings from FireEye’s Regional Advanced Threat Report for EMEA 2H2015, a follow on report from our mid-2015 publication. This report provides an overview of the advanced persistent threats (APT) targeting computer networks in EMEA during the second half of 2015, and also contains various other key observations
Recorded May 19 2016 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Yogi Chandiramani, EMEA SE Director; Jens Monrad, Global Threat Intel Liaison
Presentation preview: Is your organisation the new target for cyber attacks?
  • Channel
  • Channel profile
  • Building a secure future for women in Cyber Security Mar 6 2018 4:00 pm UTC 60 mins
    Zeina Zakhour, Denise Bedell, Vasu Jakkal, Roxy Dee, Emma Hunwick
    Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.

    Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.

    Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:

    -How did they make their first break?
    -Why does the industry have such a hard time retaining talent?
    -What are some of their favourite parts about their job?
    -Their advice to women in the industry
    -Their advice to cyber security execs looking to create more diverse teams

    Moderator: Denise Bedell (Content Innovo)
    Panelists:
    Zeina Zakhour (Atos Cyber Security), Vasu Jakkal (FireEye), Roxy Dee (Hurricane Labs), Emma Hunwick (PwC)
  • Cyber Security Predictions 2018: panoramica sulla regione EMEA Recorded: Jan 31 2018 49 mins
    Marco Rottigni, Senior Manager, Product Marketing, FireEye
    Il 2017 è stato un anno ricco di eventi sul fronte cyber, soprattutto in Europa.
    Abbiamo assistito ad attacchi motivati da spionaggio industriale con finalità politiche, cambiamenti nella regolamentazione del mondo cyber, un ecosistema criminale mirare a vari settori e mercati in Emea – e questo non è che l’inizio.

    Parliamone insieme nel webinar del 31 gennaio, in cui Marco Rottigni, Sr Product Marketing Manager EMEA di FireEye, affronterà vari aspetti del panorama delle minacce cyber in EMEA per il 2018, tra cui:

    •Tensioni politiche persistenti nella regione
    •Prossime elezioni
    •Diversi livelli di maturità in ambito security
    •L’impatto delle nuove normative relative sulla compliance e la protezione dei dati

    Registrati subito, per sapere cosa ci riserva il futuro e per rimanere un passo avanti rispetto alle minacce di cyber security.
  • Prédictions 2018: A quoi s’attendre en Europe en 2018 ? Recorded: Jan 30 2018 63 mins
    David Grout, Pre-sales Director, Southern Europe, FireEye
    2017 a été riche en évènement cyber cette année, et particulièrement en Europe et au Moyen Orient. Nous avons vu des actes motivés politiquement visant les milieux industriels, de grandes opérations d’espionnage, des changements législatifs forts, et une capacité continue des attaquants à s’adapter et à évoluer vers de nouvelles cibles et techniques.
    Rejoignez-nous pour un Webinaire le 30 Janvier. David GROUT, Directeur Technique Europe Du Sud chez FireEye, vous présentera les différents aspects de la menace et les perspectives pour 2018 en Europe. Nous traiterons à cette occasion des sujets incluant :
    1.Les tensions géopolitiques dans la région et les impacts cyber
    2.Les élections
    3.La maturité de la sécurité en Europe
    4.Les impacts des nouvelles législations sur la sécurisation des données et des personnes

    Enregistrez-vous dès aujourd’hui pour anticiper le risque de demain.
  • Cyber Security Predictions: What is in store for the EMEA region Recorded: Jan 30 2018 62 mins
    David Grout, Pre-sales Director, Southern Europe, FireEye
    [Additional Insights for Turkish Audience]

    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for a live webinar, as David Grout, Southern Europe Systems Engineering Director with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • APT34 - New Targeted Attack in the Middle East Recorded: Dec 19 2017 64 mins
    STUART DAVIS | DIRECTOR EUROPE, MIDDLE EAST & AFRICA; DAN CABAN | PRINCIPAL CONSULTANT, MIDDLE EAST & AFRICA
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.

    APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.

    Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.

    Register today to gain deeper insights into this threat group!
  • [ARABIC] 2017 - How FireEye can help MEA organisations to protect against APTs Recorded: Dec 19 2017 45 mins
    Yazan Hammoudah, Director of System Engineers, Middle East and Africa
    From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyberattacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organisation. 2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyberattacks across EMEA and more specifically in the Middle East. How can FireEye help your organisations protect against these persistent threats?

    Join this live webinar in Arabic as we will discuss the following topics:
    - FireEye Adaptive Defense
    - Technology
    - Intelligence
    - Expertise

    https://www.fireeye.com/
  • Cyber Security Predictions: What is in store for the EMEA region Recorded: Dec 14 2017 37 mins
    Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence
    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Cyber Crime, Data Breaches e GDPR Recorded: Dec 6 2017 65 mins
    Marco Rottigni, Sr Manager Prod. Marketing, FireEye; Davide Gabrini, Laboratorio di Informatica Forense, University of Pavia
    Indicazioni pratiche su come far evolvere la gestione del cyber risk
    Il ripetersi di attacchi ransomware (WannaCry, Petya) che hanno colpito ultimamente anche i computer di importanti aziende italiane, mette in luce la necessità impellente di rivedere i programmi di ICT Security, comprendere meglio l’esposizione al Cyber Risk, impostare monitoraggi, intelligence e capacità di risposta immediata.

    Anche il nuovo regolamento europeo per la Data Protection (GDPR) concorre a elevare la soglia di attenzione sul tema della protezione dei dati. Tradurre in pratica questo intento (come richiesto dagli articoli 33-34 e 84 del GDPR) significa agire valutando la propria postura di sicurezza, ma soprattutto sviluppando capacità di visibilità, analisi e risposta nei confronti degli attaccanti.

    Il webinar CYBER CRIME, DATA BREACHES E GDPR organizzato da The Innovation Group in collaborazione con FireEye, il prossimo 19 settembre, partendo dalla presentazione dello stato dell’arte dell’evoluzione del cyber crime, la nuova generazione di ransomware, l’importanza di disporre di “prove digitali” propone alcune soluzioni pratiche per raggiungere una maturità operativa nella resilienza agli attacchi avanzati, in linea con gli standard più elevati.
  • Protection des Endpoint, dotez-vous de l'expertise nécessaire Recorded: Nov 30 2017 47 mins
    Lluis Coma, Systems Engineer, FireEye
    La protection Antivirus a été l’une des fondations de la sécurité des Endpoints depuis des années, on sait aujourd’hui que celle-ci est nécessaire mais non suffisante.
    L’évolution de la menace oblige à repenser la sécurisation des Endpoints en mettant en place différents moteurs de protections capables de répondre à différents types de menaces.
    Cette évolution force aussi le constat « que 100% de sécurité n’existe pas » et qu’il faut donc se doter de solution d’investigations et de réponses à incidents aux niveaux des Endpoints en support de ces moteurs de protections.

    Jeudi 30 Novembre, Lluis Coma, Ingénieur FireEye, détaillera :

    - Les enjeux sur les Endpoints aujourd’hui
    - Les fonctionnalités de protections nécessaires pour une améioration de sa posture de sécurité
    - Les fonctionnalités d’investigations et d’analyses permettant une réaction rapide et une limitation des impacts
    - Les modifications de processus et d’organisations pour mettre en place une approche de « Hunting » proactive.

    Un webinar vous permettant de béneficier de l’experience FireEye appliquée au Endpoint.
  • Webinar in italiano - The Next Level of Smarter Endpoint Protection Recorded: Nov 29 2017 45 mins
    Marco Rottigni, Senior Manager, Product Marketing, FireEye
    Per decenni, la protezione antivirus (AV) è stata la base per la sicurezza degli endpoint, nonostante tutti i suoi limiti. Per affrontare le minacce sempre piu evolute, le organizzazioni devono dotarsi di una soluzione integrata di endpoint che possa migliorare le loro difese.
     
    Il 29 novembre, Marco Rottigni, Senior Manager, Product Marketing di FireEye, offrirà una panoramica di dettaglio sui seguenti punti:
    • Perché i prodotti per la sicurezza degli endpoint non sono sufficienti a fornire una protezione efficace
    • Le funzionalità necessarie per dotarsi di una soluzione completa per la protezione degli endpoint:
    -AV con Threat Intelligence
    -Detection e Response
    -Behaviour e Exploit
    -Visibilità e automazione
    • Come la soluzione FireEye Endpoint Security consente di passare rapidamente dall'individuazione all'indagine e alla remediation, tutto con un solo agente
     
    Partecipa a questo webinar come primo passo verso un approccio più intelligente e flessibile alla sicurezza degli endpoint.
  • APTs - Cómo funcionan y cómo protegerse Recorded: Nov 23 2017 49 mins
    Ferran Orosola, Solutions Architect FireEye; Alvaro Culebras Sanchez & Noa Blanco Fernandez, Cybersecurity Engineers, Minsait
    Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse

    Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.

    En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
  • [Panel] Defending Against the Evolving Cyber Threat Landscape in 2018 Recorded: Nov 15 2017 60 mins
    Amar Singh, Cyber Management Alliance | Stuart Davis, Mandiant | Ed Tucker, DPG | Dharminder Debisarun, Palo Alto Networks
    2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.

    This interactive Q&A panel will discuss:
    - The trends shaping the cyber threat landscape in 2018
    - Lessons from the biggest cyber events of the year
    - Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
    - The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams

    Speakers:
    - Amar Singh, Cyber Management Alliance
    - Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
    - Edward Tucker, CIO, DP Governance
    - Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
  • 2017 - An active year for APT groups Recorded: Nov 14 2017 49 mins
    David Grout, Director, Southern Europe Systems Engineering, FireEye
    From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyber attacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organization.
    2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyber attacks.

    Join us for a live webinar as we discuss:
    - The most severe cybercriminal activities of 2017
    - The motivations, approaches and TTPs of the threat groups behind these attacks
    - Insights into APT10, APT32 & APT33
  • 2017- Une année déjà active pour les groupes APT Recorded: Oct 26 2017 49 mins
    David Grout, Director, Southern Europe Systems Engineering, FireEye
    2017 est d’ores et déjà une des années les plus prolifiques en ce qui concerne l’activité des groupes APT. On a en effet depuis le début de l’année plusieurs exemples d’attaques majeures, d’extorsions ou de tentatives d’influences relayées dans la presse.

    Prenons une pause et regardons plus attentivement les TTPs de ces groupes, les techniques Outils et procédures qu’ils utilisent.

    Pendant 45mn nous regarderons dans le détails leurs motivations, leurs approches et nous en définirons les moyens possibles à mettre en place pour limiter voire éviter leur attaques.

    Nous couvrirons plusieurs domaines incluant les groupes sponsorisés par des états avec des volontés de prises d’avantages économiques voir de destructions de l’adversaire comme APT32 ou 33. Nous étudierons aussi les groupe jouant d’influence géopolitique et de fake news comme APT28 ou 29 et nous finirons sur le cyber espionnage (APT10) et les cybers criminels spécialisés dans l’extorsions de fond.
  • Simplify Threat Response Through Integration & Automation Recorded: Oct 25 2017 39 mins
    Anthony Leigh, Systems Engineer, FireEye
    FireEye Security Orchestrator helps you improve response times, reduce risk exposure, and maintain process consistency across your security program. It unifies disparate technologies and incident handling processes into a single console that codifies experiences from the frontlines to deliver real-time guided responses.

    In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.
  • Endpoint Security: No longer taking a back seat! Recorded: Oct 25 2017 57 mins
    Remon Verkerk, Systems Engineer, FireEye
    Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:

    - Is there command and control activity?
    - Did lateral movement occur?
    - What other systems were accessed?
    - Et cetera…

    This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.

    After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.



    -----------------------------------------------------------------------------------------------------------
    Keywords/tags: protection, prevention, detection, hunting, exploit prevention, AV
  • The Security Paradigm: "From the Cloud, To the Cloud, In the Cloud" Recorded: Oct 24 2017 49 mins
    David Grout, Director, Southern Europe Systems Engineering, FireEye
    Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

    Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

    During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.  
  • Best Practices for Enterprise Cyber Intelligence Operations Recorded: Oct 24 2017 48 mins
    Igors Konovalovs, Director, FireEye iSIGHT Intelligence
    Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.

    This webinar explains:

    · Why do organisations require Cyber threat intelligence?
    o To aid technical and business decision making
    o To identify and manage risks
    o To efficiently deploy capital against the threats that matter to enterprise

    · The key requirements for establishing a cyber threat intelligence function
    · Basic cyber threat intelligence workflows
    · Resource and training requirements to support a Cyber Threat intelligence function
  • The Cost of Building a Threat Hunting Team in Your SOC Recorded: Oct 24 2017 60 mins
    Stuart Davis, Director, Mandiant
    At this point your SOC is effectively covering SIEM, IDP, Vulnerability Management and a number of other areas.
    However, the next phase of maturity is to build the APT Threat Hunting capability.

    Join us for a short webinar to discuss the costs of building a hunting team versus buying it.
  • APT33: Panoramica FireEye sulle attività cyber iraniane Recorded: Oct 11 2017 49 mins
    Gabriele Zanoni, Systems Engineer, FireEye
    Le recenti investigazioni condotte da Mandiant, la divisione di Incident Response di FireEye, combinate con le analisi del nostro servizio di Threat Intelligence iSIGHT, hanno fornito una panoramica completa sulle attività di un gruppo di Cyber attaccanti iraniani operante dal 2013.
    Durante il webinar, spiegheremo come questo gruppo di attaccanti sia stato coinvolto in attività di cyber spionaggio al fine di raccogliere informazioni strategiche di intelligence da aziende nel settore dell’aviazione e dell’energia, con il fine ultimo di mettere le informazioni trafugate a disposizione di uno sponsor statale o militare.
    Registrati al webinar per saperne di più!
Security Re-Imagined
FireEye is the leader in stopping today’s advanced cyber attacks by combining the world most advanced technology, intelligence, and expertise. FireEye has over 2,200 customers across more than 60 countries, including over 130 of the Fortune 500.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is your organisation the new target for cyber attacks?
  • Live at: May 19 2016 12:00 pm
  • Presented by: Yogi Chandiramani, EMEA SE Director; Jens Monrad, Global Threat Intel Liaison
  • From:
Your email has been sent.
or close