The new European Cybersecurity policy---the Network Information Security (NIS) Directive ----is about to become the new law that sets security standards for many organisations across Europe. Within this legislation, Organisations of all sizes need to adopt mitigation measures that will manage risk stemming from zero-day exploits and never-seen-before malware as these attacks constitute a majority of advanced attacks in today’s threat environment. The New European Community laws governing data protection are imminent and will have a fundamental impact on the way that most organisations in European Union member states implement security policies and report breaches.
However, research done by FireEye and IDG shows that organisations are not fully prepared for the implementation of the legislation, and it is critical these organisations begin preparing now to be in compliance and not be caught unprepared. In this webinar, Adam Palmer, Director of International Government Affairs, will answer key questions about:
- The legislation explained in business terms
- Practical advice on compliance and security standards to keep your company prepared.
- Next steps and time scales to prepare your organisation
- How to avoid costly penalties.
RecordedJun 14 201636 mins
Your place is confirmed, we'll send you email reminders
Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.
During this webinar, we will discuss:
- How to best remediate from such an event;
- The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
- Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers
Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
Second part of our 'Breach Response Preparedness Series’, a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Statistics (from M-Trends 2018) show that the median dwell time (time between initial intrusion, and detection) for EMEA organisations in 2017 was 175 days. A 175 days roaming free inside the victim’s infrastructure; a large portion of which likely would have been with administrator privileges, thereby having the keys to the kingdom. To be able to respond to such breaches effectively and efficiently, Mandiant applies a structured approach, relying on its scalable technology platform, and threat intelligence collected over the last 14 years.
Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to discuss the Mandiant incident response approach, and why it matters to your organisation if you are confronted with a serious compromise.
First part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.
Mandiant responds to hundreds of breaches on a yearly basis, across all industries and geographies, thereby gaining insights into the different threat actor groups and their TTPs. This also provides us with valuable insights into the how and why of the failing defences of the organisations we support in time of crisis.
Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to share our thoughts on what we experience on a daily basis while responding to the breaches that matter.
Mit FireEye Threat Analytics in kürzester Zeit das eigene SIEM realisieren.
Die Erfahrungen mit klassischen SIEM-Lösungen haben immer wieder gezeigt, dass durch deren Implementierung recht schnell große Datenmengen und gleichzeitig viele Alarme erzeugt werden. Damit werden noch lange nicht alle für die Cyber-Sicherheit relevanten Probleme gelöst
Wir zeigen Ihnen, wie Sie schnell zu einer SIEM-Lösung kommen, die einen entscheidenden Mehrwert aus dem Daten-Dschungel bietet um:
•Kostspielige und aufwändige Installation zu vermeiden
•Die hohe Anzahl an Alarmen und der damit verbundene Aufwand zu priorisieren
•Angriffe und Aktivitäten in Ihrem Netzwerk sofort zu erkennen
Ergänzen Sie Ihre bestehende SIEM-Lösung und steigern Sie damit deutlich das Cyber-Security-Niveau Ihrer Organisation.
Chaque année, les experts FireEye à travers les équipes Mandiant répondent à une grande variété d'incidents informatiques à travers le monde, ces attaques sont dans la plupart des cas orchestrées par des groupes d’attaquants avancés. Ce retour d’expérience, fruit d’heures d’analyses et d’investigations, est résumé dans le rapport annuel M-Trends qui d’années en années nous donne une visibilité sur le changement et l’évolution de la menace et des techniques utilisées lors des attaques mais aussi sur les progrès et les capacités que les entreprises mettent en place pour y répondre.
Au cours de ce webinaire, notre Directeur Technique, David Grout, discutera de plusieurs sujets incluant :
• Les tendances dans le paysage actuel des menaces et ces évolutions
• Les principaux groupes APT ayant fait parler d’eux en 2017
• Les risques de récurrence d’attaques
• Mais aussi de sujets plus ouverts comme la recherche de talents et la complexité de recruter, les architectures ciblées et leurs faiblesses ou encore la préparation possible à travers des exercices de type Red Teaming.
David Grout, Technical Director for Southern Europe, FireEye
Cyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. In recent years, criminals have gone beyond using cryptocurrencies as a payment method for illicit tools and services. Seeing their value and growing popularity, many actors are targeting cryptocurrency operations and exchanges with attacks such as malicious cryptocurrency mining, collection of cryptocurrency wallet credentials and extortion.
Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
Ruediger Weyrauch, Director, Central Europe System Engineering
Sicherheitsexperten in aller Welt stehen auch 2018 vor zahlreichen Herausforderungen. Viele Unwägbarkeiten, aber auch Chancen begleiten uns. Ein großes Thema dabei ist, dass es keine international verbindlichen Regeln für Operationen im Cyberspace gibt.
In diesem Live-Webinar stellt Rüdiger Weyrauch, Director Central & Eastern European System Engineering, die neuesten Trends vor, die unsere aktuelle Bedrohungslandschaft definieren. Die Erkenntnisse und Schlussfolgerungen basieren auf Untersuchungen von Mandiant zu den einflussreichsten Cyber-Angriffen im vergangenen Jahr.
Unsere Themen im Einzelnen:
-Neue Advanced Persistent Threat (APT) Gruppen, die 2017 aufgetaucht sind
-Der Anstieg von Cyber-Angriffen durch Bedrohungsakteure aus dem Iran
-Ein detaillierter Einblick auf die Risiken durch das Remote Desktop Protokoll (RDP)
-Incident Response Untersuchungen resultierend aus Sarbanes-Oxley (SOC) Audits
-Die wachsende Lücke zwischen Cyber-Sicherheitsanforderungen und Fachkräften
Marco Rottigni, Sr Product Marketing Manager, EMEA
Ogni anno i consulenti di Mandiant, una società FireEye, rispondono ad un gran numero di
attacchi informatici sferrati da gruppi di hacker provenienti da tutto il mondo.
Questi episodi sono sintetizzati nel rapporto annuale M-Trends, che analizza i cambiamenti nel panorama delle minacce informatiche.
Durante il webinar, Marco Rottigni, Sr Product Marketing Manager, EMEA interverrà sui seguenti temi:
-L'evoluzione del panorama attuale delle minacce
-L'insorgenza di gruppi APT sempre più sofisticati e pericolosi
-Quali organizzazioni hanno più probabilità di essere colpite dai pirati informatici
-La carenza di personale qualificato e quanto questa influisca sulla sicurezza delle aziende
-La correlazione tra sistemi di sicurezza deboli ed una maggiore esposizione al rischio
-Le migliori prassi del Red Team per una protezione più efficace
Yazan A. Hammoudah, Manager, Systems Engineering, Middle East & Africa
WEBINAR DELIVERED IN ARABIC
FireEye announced the release of its annual M-Trends report which found that in 2017 attackers were present in EMEA organisations' networks a median of 175 days before being detected. This is an increase of almost 40 percent from the same measurement the year before which stood at 106 days.
The report is based on information gathered during investigations conducted by FireEye's security analysts in 2017 and uncovers emerging trends and tactics that threat actors used to compromise organisations.
For more information, join us in the upcoming webinar.
Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarised in the annual M-Trends report, which explores changes in the cyber threat landscape.
During this webinar, our Vice President Stuart McKenzie will discuss:
- Longer-term trends in today's threat landscape
- Sophisticated and harmful APT groups to look out for
- Which organisations are most likely to be retargeted by attackers
- The difficulty of finding skilled personnel and how it affects the security function
- How weaknesses in security fundamentals contributed to successful compromises
- Best practice red teaming tactics for improved security defense
Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall)
With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.
Join this interactive Q&A panel to learn more about:
- Key factors for building a successful CISO strategy
- Why breach prevention matters
- True costs of breaches
- Technological solutions to consider for a more cyber resilient enterprise
- How AI/machine learning and human talent can work together
- Top threats to look out for in 2018
- Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
- Simon Moor, VP for Northern Europe, FireEye
- Bob Honour, EMEA Marketing Director, SonicWall
Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.
Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.
Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.
"Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."
- KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE
"Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
- PWC Global State of Info Security Survey, 2015
Most organizations have invested lots of money and resources into various security tools. The end result is an array of point products from different vendors that often don't work well together. FireEye Helix can help unify these existing investments while providing customers the ability to analyze and respond to alerts through a single centralized platform.
With Helix, you get FireEye's top of the line MVX detection capabilities paired with industry leading iSight intelligence. The result is high fidelity, contextual alerts, and the ability to shift from detection to remediation immediately-both on the network and on the endpoint. You will be able to resolve attacks quickly and effectively and minimize any impact. At the end, you will see a demo of how Helix identifies and responds to an alert.
Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.
GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.
With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.
Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
· How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
· How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
Marco Rottigni, Senior Manager, Product Marketing, FireEye
Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.
Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
"aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
"ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.
Lors de ce webinaire nous couvrirons les points suivants :
Comment HELIX centralise les opérations de sécurité :
- Améliore la visibilité de bout en bout
- Aide à la Priorisation et la contextualisation des alertes
- Accompagne à la prise Prise de décisions et à la levée de doutes
Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
Recent trends suggest a continued increase in popularity of ATM “jackpotting” operations leveraging various tactics, techniques and procedures (TTPs). While we have observed an increase in the use of ATM malware in underground communities since 2011, highly publicized events demonstrating the potential for lucrative profits from ATM jackpotting operations have undoubtedly sparked more interest in this attack vector. Join this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.
Zeina Zakhour, Denise Bedell, Vasu Jakkal, Roxy Dee, Emma Hunwick
Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.
Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.
Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:
-How did they make their first break?
-Why does the industry have such a hard time retaining talent?
-What are some of their favourite parts about their job?
-Their advice to women in the industry
-Their advice to cyber security execs looking to create more diverse teams
Moderator: Denise Bedell (Content Innovo)
Zeina Zakhour (Atos), Vasu Jakkal (FireEye), Roxy Dee (Hurricane Labs), Emma Hunwick (PwC)
Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.
APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.
FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. On Thursday, February 28, join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:
• A history of APT37 support for North Korean interests
• Details on the malware suite employed by APT37
• How APT37 has been influencing the world beyond the Korean peninsula
Marco Rottigni, Senior Manager, Product Marketing, FireEye
Il 2017 è stato un anno ricco di eventi sul fronte cyber, soprattutto in Europa.
Abbiamo assistito ad attacchi motivati da spionaggio industriale con finalità politiche, cambiamenti nella regolamentazione del mondo cyber, un ecosistema criminale mirare a vari settori e mercati in Emea – e questo non è che l’inizio.
Parliamone insieme nel webinar del 31 gennaio, in cui Marco Rottigni, Sr Product Marketing Manager EMEA di FireEye, affronterà vari aspetti del panorama delle minacce cyber in EMEA per il 2018, tra cui:
•Tensioni politiche persistenti nella regione
•Diversi livelli di maturità in ambito security
•L’impatto delle nuove normative relative sulla compliance e la protezione dei dati
Registrati subito, per sapere cosa ci riserva il futuro e per rimanere un passo avanti rispetto alle minacce di cyber security.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organisations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 6,000 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.