Hi [[ session.user.profile.firstName ]]

Enterprise Incident Response Through a Lens

Join Stuart Davis – Director, Mandiant Consulting a FireEye company in this webinar to see how a real life organisation responded to a recent cyber breach involving an advanced cyber threat group (APT). Stuart will explain what happens when an organisation does not have the resources or skills to respond to cyber threat activity and will address how a third party incident response team can extend the internal CSIRT capabilities. He will walk through the stages of Mandiant Consultings enterprise incident response, show how cyber threat intelligence can enrich the information at hand to help these cyber investigators and finally discuss how remediation plans can be put in place to help contain an incident and bring the organisation back to normal business operations.
Recorded Sep 20 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stuart Davis, Director, Mandiant
Presentation preview: Enterprise Incident Response Through a Lens
  • Channel
  • Channel profile
  • Incident Remediation: Could this have been prevented? Jul 17 2018 1:00 pm UTC 30 mins
    Manfred Erjak, Consultant, Professional Services
    Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.

    During this webinar, we will discuss:
    - How to best remediate from such an event;
    - The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
    - Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers

    Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
  • You're compromised: How do you respond? Jul 10 2018 1:00 pm UTC 30 mins
    Jeroen Herlaar, Regional Director, Mandiant
    Second part of our 'Breach Response Preparedness Series’, a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Statistics (from M-Trends 2018) show that the median dwell time (time between initial intrusion, and detection) for EMEA organisations in 2017 was 175 days. A 175 days roaming free inside the victim’s infrastructure; a large portion of which likely would have been with administrator privileges, thereby having the keys to the kingdom. To be able to respond to such breaches effectively and efficiently, Mandiant applies a structured approach, relying on its scalable technology platform, and threat intelligence collected over the last 14 years.

    Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to discuss the Mandiant incident response approach, and why it matters to your organisation if you are confronted with a serious compromise.
  • It’s inevitable: Am I ready for a breach? Jul 3 2018 1:00 pm UTC 30 mins
    Jeroen Herlaar, Regional Director, Mandiant
    First part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Mandiant responds to hundreds of breaches on a yearly basis, across all industries and geographies, thereby gaining insights into the different threat actor groups and their TTPs. This also provides us with valuable insights into the how and why of the failing defences of the organisations we support in time of crisis.

    Join your host Jeroen Herlaar, Mandiant Regional Director, for a 25-minute webinar to share our thoughts on what we experience on a daily basis while responding to the breaches that matter.
  • Ein Ausweg aus dem Daten-Dschungel Recorded: Jun 20 2018 33 mins
    Marco Rossi, Consulting Systems Engineer
    Mit FireEye Threat Analytics in kürzester Zeit das eigene SIEM realisieren.

    Die Erfahrungen mit klassischen SIEM-Lösungen haben immer wieder gezeigt, dass durch deren Implementierung recht schnell große Datenmengen und gleichzeitig viele Alarme erzeugt werden. Damit werden noch lange nicht alle für die Cyber-Sicherheit relevanten Probleme gelöst
    Wir zeigen Ihnen, wie Sie schnell zu einer SIEM-Lösung kommen, die einen entscheidenden Mehrwert aus dem Daten-Dschungel bietet um:
    •Kostspielige und aufwändige Installation zu vermeiden
    •Die hohe Anzahl an Alarmen und der damit verbundene Aufwand zu priorisieren
    •Angriffe und Aktivitäten in Ihrem Netzwerk sofort zu erkennen

    Ergänzen Sie Ihre bestehende SIEM-Lösung und steigern Sie damit deutlich das Cyber-Security-Niveau Ihrer Organisation.
  • M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs Recorded: May 24 2018 60 mins
    David Grout, Directeur Technique, South EMEA
    Chaque année, les experts FireEye à travers les équipes Mandiant répondent à une grande variété d'incidents informatiques à travers le monde, ces attaques sont dans la plupart des cas orchestrées par des groupes d’attaquants avancés. Ce retour d’expérience, fruit d’heures d’analyses et d’investigations, est résumé dans le rapport annuel M-Trends qui d’années en années nous donne une visibilité sur le changement et l’évolution de la menace et des techniques utilisées lors des attaques mais aussi sur les progrès et les capacités que les entreprises mettent en place pour y répondre.

    Au cours de ce webinaire, notre Directeur Technique, David Grout, discutera de plusieurs sujets incluant :

    • Les tendances dans le paysage actuel des menaces et ces évolutions
    • Les principaux groupes APT ayant fait parler d’eux en 2017
    • Les risques de récurrence d’attaques
    • Mais aussi de sujets plus ouverts comme la recherche de talents et la complexité de recruter, les architectures ciblées et leurs faiblesses ou encore la préparation possible à travers des exercices de type Red Teaming.
  • Cryptocurrencies: Trends and Threats Recorded: May 23 2018 41 mins
    David Grout, Technical Director for Southern Europe, FireEye
    Cyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. In recent years, criminals have gone beyond using cryptocurrencies as a payment method for illicit tools and services. Seeing their value and growing popularity, many actors are targeting cryptocurrency operations and exchanges with attacks such as malicious cryptocurrency mining, collection of cryptocurrency wallet credentials and extortion.

    Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
  • M-Trends 2018 Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen Recorded: May 16 2018 59 mins
    Ruediger Weyrauch, Director, Central Europe System Engineering
    Sicherheitsexperten in aller Welt stehen auch 2018 vor zahlreichen Herausforderungen. Viele Unwägbarkeiten, aber auch Chancen begleiten uns. Ein großes Thema dabei ist, dass es keine international verbindlichen Regeln für Operationen im Cyberspace gibt.
    In diesem Live-Webinar stellt Rüdiger Weyrauch, Director Central & Eastern European System Engineering, die neuesten Trends vor, die unsere aktuelle Bedrohungslandschaft definieren. Die Erkenntnisse und Schlussfolgerungen basieren auf Untersuchungen von Mandiant zu den einflussreichsten Cyber-Angriffen im vergangenen Jahr.

    Unsere Themen im Einzelnen:
    -Neue Advanced Persistent Threat (APT) Gruppen, die 2017 aufgetaucht sind
    -Der Anstieg von Cyber-Angriffen durch Bedrohungsakteure aus dem Iran
    -Ein detaillierter Einblick auf die Risiken durch das Remote Desktop Protokoll (RDP)
    -Incident Response Untersuchungen resultierend aus Sarbanes-Oxley (SOC) Audits
    -Die wachsende Lücke zwischen Cyber-Sicherheitsanforderungen und Fachkräften

    Melden Sie sich jetzt an. Wir freuen uns auf Sie!
  • M-Trends 2018: un report per capire l’evoluzione degli attacchi cyber Recorded: May 15 2018 48 mins
    Marco Rottigni, Sr Product Marketing Manager, EMEA
    Ogni anno i consulenti di Mandiant, una società FireEye, rispondono ad un gran numero di
    attacchi informatici sferrati da gruppi di hacker provenienti da tutto il mondo.
    Questi episodi sono sintetizzati nel rapporto annuale M-Trends, che analizza i cambiamenti nel panorama delle minacce informatiche.

    Durante il webinar, Marco Rottigni, Sr Product Marketing Manager, EMEA interverrà sui seguenti temi:

    -L'evoluzione del panorama attuale delle minacce
    -L'insorgenza di gruppi APT sempre più sofisticati e pericolosi
    -Quali organizzazioni hanno più probabilità di essere colpite dai pirati informatici
    -La carenza di personale qualificato e quanto questa influisca sulla sicurezza delle aziende
    -La correlazione tra sistemi di sicurezza deboli ed una maggiore esposizione al rischio
    -Le migliori prassi del Red Team per una protezione più efficace
  • [ARABIC] Understanding today's cyber attack trends in the MEA region Recorded: May 9 2018 47 mins
    Yazan A. Hammoudah, Manager, Systems Engineering, Middle East & Africa

    FireEye announced the release of its annual M-Trends report which found that in 2017 attackers were present in EMEA organisations' networks a median of 175 days before being detected. This is an increase of almost 40 percent from the same measurement the year before which stood at 106 days.
    The report is based on information gathered during investigations conducted by FireEye's security analysts in 2017 and uncovers emerging trends and tactics that threat actors used to compromise organisations.
    For more information, join us in the upcoming webinar.
  • M-Trends 2018 - Understanding Today's Cyber Attack Trends Recorded: May 2 2018 45 mins
    Stuart McKenzie, VP, Mandiant Consulting
    Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarised in the annual M-Trends report, which explores changes in the cyber threat landscape.

    During this webinar, our Vice President Stuart McKenzie will discuss:

    - Longer-term trends in today's threat landscape
    - Sophisticated and harmful APT groups to look out for
    - Which organisations are most likely to be retargeted by attackers
    - The difficulty of finding skilled personnel and how it affects the security function
    - How weaknesses in security fundamentals contributed to successful compromises
    - Best practice red teaming tactics for improved security defense
  • [Panel] Building Effective Cyber Defense Recorded: Apr 25 2018 58 mins
    Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall)
    With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Why breach prevention matters
    - True costs of breaches
    - Technological solutions to consider for a more cyber resilient enterprise
    - How AI/machine learning and human talent can work together
    - Top threats to look out for in 2018

    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Simon Moor, VP for Northern Europe, FireEye
    - Bob Honour, EMEA Marketing Director, SonicWall
  • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority Recorded: Apr 24 2018 63 mins
    FireEye EMEA
    Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

    Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

    Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

    "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."


    "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
    - PWC Global State of Info Security Survey, 2015
  • [Arabic] How FireEye Helix can deliver advanced capabilities to your org Recorded: Apr 3 2018 58 mins
    Yazan Hammoudah, SE Manager, MEA, FireEye

    Most organizations have invested lots of money and resources into various security tools. The end result is an array of point products from different vendors that often don't work well together. FireEye Helix can help unify these existing investments while providing customers the ability to analyze and respond to alerts through a single centralized platform.
    With Helix, you get FireEye's top of the line MVX detection capabilities paired with industry leading iSight intelligence. The result is high fidelity, contextual alerts, and the ability to shift from detection to remediation immediately-both on the network and on the endpoint. You will be able to resolve attacks quickly and effectively and minimize any impact. At the end, you will see a demo of how Helix identifies and responds to an alert.
  • How to Cope with GDPR Strict Breach Reporting Rules Recorded: Mar 22 2018 38 mins
    Stuart McKenzie, VP, Mandiant Consulting
    Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.

    GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.

    With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.

    Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
    · How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
    · How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
  • GDPR: durante e dopo le 72 ore Recorded: Mar 22 2018 61 mins
    Marco Rottigni, Senior Manager, Product Marketing, FireEye
    Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
    L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
    Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
    In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.

    Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
    "aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
    "ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
  • Security Operation Platform: Une nouvelle réponse avec FireEye Helix Recorded: Mar 22 2018 41 mins
    Jerome Delaville, System Engineer, FireEye France
    Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
    FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.

    Lors de ce webinaire nous couvrirons les points suivants :
    Comment HELIX centralise les opérations de sécurité :
    - Améliore la visibilité de bout en bout
    - Aide à la Priorisation et la contextualisation des alertes
    - Accompagne à la prise Prise de décisions et à la levée de doutes

    Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
  • Hitting the Jackpot: Cybercriminals' Persistent Interest in ATM Exploitation Ops Recorded: Mar 14 2018 31 mins
    Kimberly Goody, Senior Analyst; Jaideep Natu, Analyst - FireEye
    Recent trends suggest a continued increase in popularity of ATM “jackpotting” operations leveraging various tactics, techniques and procedures (TTPs). While we have observed an increase in the use of ATM malware in underground communities since 2011, highly publicized events demonstrating the potential for lucrative profits from ATM jackpotting operations have undoubtedly sparked more interest in this attack vector. Join this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.
  • Building a secure future for women in Cyber Security Recorded: Mar 6 2018 62 mins
    Zeina Zakhour, Denise Bedell, Vasu Jakkal, Roxy Dee, Emma Hunwick
    Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.

    Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.

    Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:

    -How did they make their first break?
    -Why does the industry have such a hard time retaining talent?
    -What are some of their favourite parts about their job?
    -Their advice to women in the industry
    -Their advice to cyber security execs looking to create more diverse teams

    Moderator: Denise Bedell (Content Innovo)
    Zeina Zakhour (Atos), Vasu Jakkal (FireEye), Roxy Dee (Hurricane Labs), Emma Hunwick (PwC)
  • APT37: The Overlooked North Korean Threat Recorded: Feb 28 2018 59 mins
    Ben Read, Senior Manager Cyber Espionage, FireEye
    Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.

    APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

    FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. On Thursday, February 28, join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:

    • A history of APT37 support for North Korean interests
    • Details on the malware suite employed by APT37
    • How APT37 has been influencing the world beyond the Korean peninsula
  • Cyber Security Predictions 2018: panoramica sulla regione EMEA Recorded: Jan 31 2018 49 mins
    Marco Rottigni, Senior Manager, Product Marketing, FireEye
    Il 2017 è stato un anno ricco di eventi sul fronte cyber, soprattutto in Europa.
    Abbiamo assistito ad attacchi motivati da spionaggio industriale con finalità politiche, cambiamenti nella regolamentazione del mondo cyber, un ecosistema criminale mirare a vari settori e mercati in Emea – e questo non è che l’inizio.

    Parliamone insieme nel webinar del 31 gennaio, in cui Marco Rottigni, Sr Product Marketing Manager EMEA di FireEye, affronterà vari aspetti del panorama delle minacce cyber in EMEA per il 2018, tra cui:

    •Tensioni politiche persistenti nella regione
    •Prossime elezioni
    •Diversi livelli di maturità in ambito security
    •L’impatto delle nuove normative relative sulla compliance e la protezione dei dati

    Registrati subito, per sapere cosa ci riserva il futuro e per rimanere un passo avanti rispetto alle minacce di cyber security.
Intelligence-led Security
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organisations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 6,000 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Enterprise Incident Response Through a Lens
  • Live at: Sep 20 2016 11:00 am
  • Presented by: Stuart Davis, Director, Mandiant
  • From:
Your email has been sent.
or close