Hi [[ session.user.profile.firstName ]]

Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH

Cyberkriminelle entwickeln ihre Taktiken, Techniken und Prozesse stets weiter und sind dabei häufig schneller als die Sicherheitsteams. Die Angreifer sind bestens organisiert und ihre Methoden werden von Jahr zu Jahr raffinierter – 2016 war da keine Ausnahme.

In diesem Live-Webinar stellt Sven Schriewer, Director, FireEye, die Beobachtungen und Schlussfolgerungen der Experten von Mandiant aus der Untersuchung einiger der schwerwiegendsten Cyberangriffe und Sicherheitsverletzungen des vergangenen Jahres vor.

Melden Sie sich noch heute an, um sich über die folgenden Themen zu informieren:
•Neue Trends bei Phishing-Angriffen auf Unternehmen
•Neue Entwicklungen in der Angriffstelemetrie und -methodologie
•Datengestützter Überblick über neue Bedrohungen weltweit
•Moderne Abwehrstrategien zum besseren Schutz von Unternehmen und Institutionen
•Auswirkungen der Datenschutz-Grundverordnung auf Unternehmen in EMEA
•Trends in EMEA, Nordamerika und APAC im Vergleich
Neben den Untersuchungsergebnissen in der Regionen EMEA mit Schwerpunkt auf Deutschland, Österreich und Schweiz, enthalten Sie in diesem Webinar auch Informationen wie Sie eine proaktive Strategie zur Stärkung Ihrer Sicherheitsinfrastruktur entwickeln.
Recorded May 10 2017 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sven Schriewer, Director, FireEye
Presentation preview: Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH
  • Channel
  • Channel profile
  • Cybersecurity: The Top 5 Cloud Mistakes (and how to avoid them) Dec 15 2021 5:00 pm UTC 45 mins
    Martin Holste, Cloud CTO, FireEye
    The cloud brings the promise of accelerating business, increasing access to data and enabling remote capabilities, but it comes with unique risks. At FireEye, we’ve responded to many cloud breaches and protect customers in very unique cloud configurations. We’ve seen that small mistakes can have a critical impact, and we’ve learned what it takes to build a secure cloud. There is a right and wrong way to defend cloud infrastructure, containers and software-as-a-service.

    Join the discussion to learn the five crucial differences between a secure, defensible and resilient cloud environment and one that my (already) be compromised. From ransomware and supply chain to zero days and zero trust, we will discuss how to secure the cloud you need for your specific environment.

    Presented by Martin Holste, Cloud CTO, FireEye
  • Tech Talk: FireEye Helix Detect paves the way for XDR Recorded: Nov 30 2021 44 mins
    Pierre Buijsman, Sales Engineer Director, EMEA West, FireEye; Steven Ditmore, Senior Systems Engineer, FireEye
    To protect against advanced threats, organizations need to integrate their security and apply the right expertise and processes. FireEye Helix - the FireEye XDR management and monitoring platform - is a SaaS security operations platform that allows organizations to take control of any incident from detection to response.

    Helix Detect is for customers who want superior detection and response, without the overhead of a full SIEM and SOAR.

    With an easy-to-use interface that helps reduce time between security threats and response, Helix Detect provides peace of mind to customers - protecting their business from the most advanced threats, including Ransomware, Phishing, and Targeted (APT), so they can focus on what matters most - running their business.

    Register now to discover all the new features!
  • Everything Is Connected: The Role We All Play in Stopping Zero-Day Attacks Recorded: Nov 29 2021 43 mins
    Marci McCarthy CEO T.E.N., Kevin Gowen CISOSynovus, Eric Meyers CISONY Power Auth, J.R. Wikes Cyber Principal Eng, FireEye
    Given their nature, zero-day attacks are inherently unpredictable to prepare for and defend against, offering the path of least resistance for threat actors. Because security teams are improving protections against threat actors, these actors are adapting to sneak attack, or engineered, methods, particularly targeting remote workers and OT environments. Now more than ever, everyone has an important role in strengthening the kill chain. Organizations are encouraged to support these efforts wherever possible. In addition to adopting new guidelines, they should look to partner with cybersecurity vendors that participate in industry alliances and work closely with government agencies and law enforcement, as these alliances allow them to further align cybersecurity forces to defeat adversaries. Shared data and collaboration can enable more effective responses and better predict future techniques to deter adversary efforts. Join our conversation to discuss how organizations can mitigate zero-day attacks by cultivating a culture of cybersecurity; building trusted partnerships with law enforcement, government agencies and solution providers; and taking a Zero Trust approach with automated detection and AI.
  • Expert’s Talk: Executive Security KPIs and Dashboarding Recorded: Nov 23 2021 49 mins
    Angelo Perniola, Senior Strategic Consultant, Mandiant
    During this session, a Mandiant Consultant will share his experiences while working on the development of security metrics plans with organizations of different size, region, and industry vertical.

    He will discuss typical scenarios affecting metrics requirements, and present a metrics framework to address the security needs of a sample organization.
  • Tech Talk: FireEye Detection On Demand helps you detect malicious threats Recorded: Nov 18 2021 56 mins
    Jerome Delaville, Consulting Sales Engineer EMEA
    To protect your cloud infrastructure, you need to be able to actively monitor files for the presence of malicious content. FireEye Detection On Demand is a threat detection service that uncovers harmful objects in the cloud. FireEye Detection On Demand delivers flexible file and content scanning capabilities to identify file-borne threats in your cloud, SOC, SIEM or files uploaded to web applications. The discussion will drive us around: - How does it work? - Why is it different? - What is the added value for your business? - A demo Register now!
  • The Evolution and Commoditisation of the Cybercriminal Ecosystem Recorded: Oct 27 2021 58 mins
    Dr Jamie Collier, Cyber Threat Intelligence Consultant, Mandiant, David Grout, CTO, EMEA, Mandiant
    The professionalisation and commoditisation of the cybercriminal ecosystem continues to evolve. This has amplified the threat posed by cybercrime and particularly ransomware operations. We explore the development of cybercriminal communities over time and what it means for organisations today. You will gain an understanding of not just how cybercrime has matured, but also what to do about it.

    · How ransomware operators are increasingly specialising in specific components of the attack lifecycle.
    · The difficulties of attribution in the context of an increasingly agile and dynamic cyber criminal ecosystem.
    · The challenges that today's ransomware operations pose for both security functions and threat intelligence teams.
    · Common attack vectors used by ransomware groups.
    · Lessons learned from FIN12 - Mandiant’s most recently graduated threat actor.
  • Part 3 | FireEye XDR: Moving Beyond the Limits of SIEM, SOAR, and EDR Recorded: Oct 26 2021 32 mins
    JR Wikes, Principal Systems Engineer and David Batty, Principal Systems Engineer, FIreEye Inc.
    In part three, the last part of our webinar series for "FireEye XDR: Bringing New Meaning to Extended Detection and Response", we discuss how to reduce the security complexity of modern corporate IT infrastructure.

    The strengths and limitations of SIEM, SOAR and EDR solutions are detailed to illustrate the need for and value of XDR in an organization’s cyber environment.

    Register to learn how FireEye XDR platform can improve your security posture.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "FireEye XDR: Bringing New Meaning to Extended Detection and Response".
  • Part 2 | FireEye XDR: Born from Frontline Intelligence Recorded: Oct 19 2021 31 mins
    Robert Kusters, Senior PMM Cloud Endpoint Security, and Veronica Carr, Sr Principal PM, Security Platforms at FireEye
    In part two of our webinar series for "FireEye XDR: Bringing New Meaning to Extended Detection and Response", we discuss how FireEye relentlessly protects its customers against major cyber threats. Our frontline human expertise and intelligence helps you prioritize risks, guide responses and accelerate security operations.

    Register to learn how FireEye XDR can simplify threat detection, investigation and incident response.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series " FireEye XDR: Bringing New Meaning to Extended Detection and Response".
  • ESG & FireEye - The future of XDR is Now! Recorded: Oct 13 2021 34 mins
    Robert Kusters, Senior Product Marketing Manager, FireEye & Jon Oltsik, Senior Principal Analyst & Fellow, ESG
    According to ESG research, many organizations plan to increase investments in threat detection and response this year. Unfortunately, this is because current threat detection and response strategies aren’t working well, so security operations center (SOC) teams need improvement across people, process, and technology.
    Recognizing the myriad of issues with threat detection and response, security technology providers are pushing new technology solutions dubbed eXtended Detection and Response or XDR. These tools are designed to address many of today’s technology issues with an integrated security architecture, advanced analytics, and simplified operations. Sounds great, but users remain confused about what XDR is and where to start.
    In this webinar, Jon Oltsik, Senior Principal Analyst and Fellow, at the Enterprise Strategy Group (ESG) and Robert Kusters, Senior Product Marketing manager at FireEye will discuss:
    • What is XDR?
    • Which are the most important attributes of XDR?
    • What your organization should be doing right now to start its XDR implementation

    Register today!
  • Part 1 | FireEye XDR: Understanding XDR Security Recorded: Oct 12 2021 31 mins
    Robert Kusters, PMM, Cloud Endpoint Security and Jim Waggoner, VP of Product Management, FireEye
    For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).

    FireEye XDR protects organizations though unmatched detection, protection and response technologies delivered through an extensible cloud-based platform. By simplifying and correlating incident data across the entire security stack, FireEye XDR applies frontline intelligence and analytics to help you find and resolve the threats that matter most.

    Join us for a webinar series on FireEye XDR, where we will cover how XDR security came about, why FireEye’s take on XDR is focused on security outcomes, and how we have been delivering on this for years.


    Register for all parts of this webinar series:

    Part 1| Understanding XDR Security
    August 25, 2021 at 10am PT | 1pm ET

    Part 2| FireEye XDR: Born from Frontline Intelligence
    September 1, 2021 at 10am PT | 1pm ET

    Part 3| FireEye XDR: Moving Beyond the Limits of SIEM, SOAR, and EDR
    September 8, 2021 at 10am PT | 1pm ET
  • Why Sandboxing is still relevant. Recorded: Sep 29 2021 39 mins
    Mike Harrington - Sales Engineer, Edwin A Betancourt - Solutions Architect, Chris Candaffio - Consulting Sales Engineer
    As the threat landscape continually evolves, security practitioners must advance their skills and tools to meet those new threats. Traditionally, Sandboxing was used primarily as a forensic analysis tool. Modern Sandboxing solutions can be used to detect today’s threats and protect your enterprise whether on-premise or in the cloud. Join this Webinar and learn how to protect applications like (O365, Slack, Teams, Box, Drobox, AWS S3, OneDrive…etc.) by integrating Sandboxing directly into the workflow.

    Join our engineering team as they answer the following questions during this technical workshop:
    - What does a modern Sandboxing solution look like?
    - Evolution of Sandboxing from static to dynamic (Automation, Workflow)
    - Use cases and demonstration

    Reserve your seat!
  • A Strategic Overview of the EMEA Cyber Threat Landscape Recorded: Sep 29 2021 59 mins
    Jamie Collier, Cyber Threat Intelligence Consultant, FireEye Mandiant
    The past 18 months has posed no shortage of cyber security headaches, whether emerging remote work risks, the targeting of vaccine research facilities, or the rampant growth in ransomware. Yet, making sense of the key strategic threat trends impacting the EMEA region will be vital as security leaders begin to cautiously look ahead.

    This talk will provide an overview of both current and future developments in the EMEA threat landscape. In doing so, it will arm participants with not just an understanding of key trends, but provide actionable advice on what to do about them.

    Attendees will learn:
    • The most common attack techniques targeting organisations today.
    • Key trends in cyber espionage, cyber crime, and information operations.
    • The drivers that fuel the growth of ransomware including multifaceted extortion, post-compromise intrusions, and an increasingly specialised cybercriminal ecosystem.
    • How to translate insight into the threat landscape into action items that improve security outcomes.
    • The long-term security implications posed by the pandemic.
  • FireEye XDR: Bringing New Meaning to Extended Detection and Response Recorded: Sep 23 2021 50 mins
    David Grout, CTO, EMEA, FireEye
    For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).

    FireEye XDR protects organizations though unmatched detection, protection and response technologies delivered through an extensible cloud-based platform. By simplifying and correlating incident data across the entire security stack, FireEye XDR applies frontline intelligence and analytics to help you find and resolve the threats that matter most.

    Join David Grout, CTO, EMEA for a webinar on FireEye XDR. He will cover:

    - How XDR security came about
    - Why FireEye’s take on XDR is focused on security outcomes
    - How we have been delivering on this for years
    - Why it will improve your security posture and simplify response against the most sophisticated threats
  • FireEye Helix Explained: Preview of New Features Recorded: Sep 21 2021 51 mins
    Sarah S. Cox, Prin. Instr Designer; Veronica Carr, Prin. Prod. Mgr.; Vignesh Balan R, Staff Prod. Mgr.; Todd Bane, Sr. Mgr.
    Helix works with FireEye and third-party sources, including cloud and SaaS applications.
    In this session we will be demonstrating new Helix features that enhance the security analyst experience. Current Helix customers will be invited to join a program with early access to these features, prior to their anticipated roll-out over the next few months.
    Join this installment in our webinar series, as our experts highlight:
    • Threat detection and enrichment
    • Alert correlation across data sources
    • Built-in automation for response action capabilities
    • Threat graph visualization

    The session includes a hands-on demonstration of these upcoming features that will show you how to take advantage of detection, correlation, and automated response action. Stay on after the session for an in-depth Q&A with our experts.
  • Ransomware and the Critical National Infrastructure: Targeting the Crown Jewels Recorded: Aug 18 2021 42 mins
    Moath Sakaji - Mandiant Lead ICS/OT Security, MEA, FireEye
    Since at least 2017, there has been a significant increase in public disclosures of ransomware incidents impacting industrial production and critical infrastructure organizations. Well-known ransomware families like WannaCry, LockerGoga, MegaCortex, Ryuk, Maze, SnakeHouse , and most recently Darkside, have cost victims across a variety of industry verticals many millions of dollars in ransom and collateral costs. These incidents have also resulted in significant disruptions and delays to the physical processes that enable organizations to produce and deliver goods and services. In this talk, we will discuss how adversaries are targeting the operational technology of the critical national infrastructure, and shine a light on the Darkside ransomware operations.
  • Obtenga una ventaja sobre las ciber-amenazas que están afectando a México Recorded: Aug 12 2021 67 mins
    Fidel Garcia; Consulting Sales Engineer MEXICO, Fireeye/Mandiant
    Las organizaciones están cambiando la forma en que administran sus operaciones de seguridad. En México, el riesgo de ciberataques, así como el fraude y robo de datos se han clasificado entre los 10 principales riesgos con mayor probabilidad de ocurrir. Las organizaciones necesitan todas las ventajas que puedan obtener para proteger a sus activos críticos y sus datos de las amenazas en constante evolución. El mejor punto de partida es comprender a los adversarios, los tipos de amenazas, aprender a usar toda la información disponible para medir la efectividad de la infraestructura de seguridad existente y aplicar automáticamente la inteligencia a la detección y respuesta.
    Acompáñenos este 12 de agosto de 2021 a las 10:00 am (GMT-5), donde nos enfocaremos en:

    - Tomar ventaja de la inteligencia ante los adversarios
    - Valide continuamente la eficacia de sus controles de seguridad.
    - Como tener una defensa automatizada en su entorno.
  • Tech Talk: FireEye Back to Basics - MVX Engine Explained Recorded: Jul 13 2021 37 mins
    Marco Van der Aar, Consulting Sales Engineer, FireEye & Dudu Akiva, Senior Sales Engineer, FireEye
    The MultiVector Execution (MVX) Engine has its roots firmly in FireEye’s beginnings. When FireEye’s ground breaking Network Security(NX) product hit the market in 2010 it was an instant success, capable of analysing network traffic in a closed virtualised environment and blocking C2 communications, out of the box, with minimum configuration required. In this webinar we will explore the history of the MVX engine, its various components and engines and how it can be architected in our enterprise environments today to provide unparalleled levels of visibility and protection.
  • Security Validation: The C-Suite Roundtable Recorded: Jun 23 2021 58 mins
    David Grout – EMEA CTO, FireEye & Jack Charlton – EMEA Technical Account Manager, Mandiant Security Validation
    How to prove the return on security investments.

    Companies today need a strong security posture and must be able to demonstrate its impact on the organization’s financial stability. CFOs and business leaders are looking to CIOs and CISOs to provide customers and key stakeholders with the confidence they need in the organization’s ability to reduce risk, improve its overall security posture and protect its assets.
    Join our live session where we will be discussing business outcomes that customers are seeing from this strategy.
  • Higher Education Under Siege: Cyber Attacks on the Rise Recorded: Jun 22 2021 28 mins
    Vernon Aldershoff, Enterprise Account Manager – education & Chris Candaffio, consulting sales engineer
    Universities, colleges and schools are seeing unprecedented cyber security attacks, breaches and extortion. Higher education institutions face unique threats – we must allow access to networks, face a constant churn of new users, have to accommodate thousands of devices, and are often resource constrained and face a skills shortage. Add compliance to federal regulations and mandates, and it’s an uphill battle to ensure we establish and validate our security posture to ensure we are prepared for ever evolving cyber attacks.
    Join the FireEye & Mandiant experts to learn how you can:
    • Improve your security posture
    • Automate manual tasks
    • Unify your data
    • Create a holistic, secure cloud strategy
    • Block the most dangerous email threats - malicious attachments, phishing sites and impersonation attacks
    • Provide comprehensive endpoint defense
  • Broken Clouds: The Top 5 Cloud Mistakes (and How to Avoid Them) Recorded: Jun 17 2021 44 mins
    Martin Holste, CTO Cloud, FireEye
    The cloud brings the promise of accelerating your business, but it comes with its own risks. At FireEye/Mandiant, we’ve responded to many kinds of cloud breaches and protected customers in many clouds. We’ve seen that small mistakes can have a critical impact on cloud environments, and we’ve learned what it takes to build a secure cloud. There is a right and wrong way to defend cloud infrastructure, containers, and software-as-a-service. Learn the five crucial differences between a secure, defensible, and resilient cloud environment and one that may (already) be compromised.
Built to Innovate.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, and nation-state grade threat intelligence.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Aktuelle Trends bei Sicherheitsverletzungen und Cyberangriffen in D/A/CH
  • Live at: May 10 2017 12:00 pm
  • Presented by: Sven Schriewer, Director, FireEye
  • From:
Your email has been sent.
or close