Cyber Security Predictions: What is in store for the EMEA region
[Additional Insights for Turkish Audience]
2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.
Join us for a live webinar, as David Grout, Southern Europe Systems Engineering Director with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:
•Continued political tension in the region
•Mixed security maturity
•The effect of new compliance and data protection laws
Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
RecordedJan 30 201862 mins
Your place is confirmed, we'll send you email reminders
Jens Monrad, Head of Mandiant Threat Intelligence, EMEA
Join Jens Monrad, Head of Mandiant Threat Intelligence – EMEA, for ‘Cyber Threat Intelligence as a Business Enabler’.
This session will cover how accurate and relevant Cyber Threat Intelligence can help organisations make smarter decisions around cyber defence, alert & event prioritisation. Jens will also discuss how cyber threat intelligence enables businesses to make decisions based upon the cyber threat landscape and their risk appetite.
Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
Gina Hill, Principle Consultant, Mandiant & Duke McDonald, Consultant, Mandiant
An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. Ultimately, organizations need to be able to understand the return on their threat intelligence investments.
Mandiant Threat Intelligence experts Gina Hill and Duke McDonald present an in-depth explanation of what it means to be intelligence-led, how organizations should seek to increase intelligence maturity and capability, and how to get started on this journey.
Join this session to learn:
• The definition, characteristics and caveats of an intelligence-led security approach
• Things to consider when assessing and evolving intelligence maturity
• The importance of frameworks when assessing, measuring and executing on your strategy
Nader Zaveri, Incident Response Mgr; Matt Bromiley, Principal Consultant; Kimberly Goody, Threat Intelligence Sr. Mgr.
Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require organizations to apply a holistic security risk mitigation strategy from the C-suite to practitioners.
This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:
• Learn modern ransomware trends and attacker behaviors observed on the frontlines
• Realize why proactive assessment is critical when preparing for and preventing ransomware
• Understand how threat intelligence, hunting, and response provides the decision support and detection needed to outmaneuver ransomware actors
• Implement effective mitigation strategies to stop ransomware attackers in their tracks
Register today to join Nader Zaveri – Incident Response Manager, Matt Bromiley – Managed Defense Principal Consultant, and Kimberly Goody – Threat Intelligence Senior Manager, as they provide expert insights on modern-day ransomware attacks and how best to mitigate them.
Peter Watts, former Director for Cybersecurity Policy, National Security Council
Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces.
In this session, Peter Watts, threat intelligence veteran and former Director for Cybersecurity Policy, National Security Council lays out:
• A modern definition of threat intelligence with important milestones
• How to recognize and develop critical success factors for producing or consuming threat intelligence
• The impact of actionable threat intelligence on security risk leaders and their organizations
• Future use cases that may reshape how we think about cyber defense and business value
Chris Romano, Mandiant Senior Consultant and Greg Blaum, Mandiant Principal Consultant
For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye Mandiant experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.
In this session, Mandiant consultants Greg Blaum and Chris Romano share lessons learned from real-world incident response experiences, identify some common pitfalls and provide best practices for organizations to harden their cloud environments and reduce the risk of compromise. They also discuss the pitfalls and best practices presented in M-Trends 2020.
Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.
Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:
-MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
-Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
-Impact of environmental drift on your security posture and how to plan for it
-Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure
Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director
Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.
This Virtual Summit session covers:
-Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
-Expectations of the shared responsibility model
-Pitfalls when approaching a move to the cloud
-Best practices based on real-world use cases
Michael Trevett, UKI Mandiant Director, FireEye with external panellists Mark Deem, Partner, Cooley LLP
Did you know that 90% of successful cyber-attacks rely on human error by any one member of staff?
It is common to assume that cyber security is the sole responsibility of your IT or security team. However, in many cases all it takes is one click on an email or a visit to a website which has been successfully attacked for you to cause a security breach in your organisation.
So how do you know what to look out for and how do you mitigate the risks of a breach when it does occur?
Join the FireEye Mandiant Consultants along with external panel of experts in our Cyber Attack Simulation as we experience a successful breach first hand;
•See the impact of the attack on an organization
•the level of resource needed to resolve an attack, and
•the overall potential impact an attack might have on your business
In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
-Who are the attackers that target my industry and what techniques do they use?
-Which alerts matter most and how do I respond?
-Are my tools, controls, processes working as expected?
-Where should I focus improvement efforts?
Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:
-Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
-Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
-Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
-View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises
A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lacked the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high cost of their defenses.
Security validation helps organizations validate and consolidate their existing security investments before throwing more tools at the problem. And by integrating and operationalizing threat intelligence, organizations can develop an effective, highly scalable security posture. During this session, you can learn how to achieve a more efficient, effective and future-proof security program through security validation.
Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze. NEW Report Security Effectiveness.
Il Webinar “Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.
Mandiant Security Validation è una tecnologia di “Security Instrumentation” che fornisce evidenze per verificare gli investimenti effettuati in Security.
La security è spesso basata su presupposti come:
•si ritiene che le tecnologie funzionino come descritte in fase di acquisizione;
•si ritiene che i prodotti siano installati, configurati e mantenuti nel tempo in modo corretto;
•si ritiene che le persone o i partner gestiscano allarmi e processi come stabilito;
•si ritiene che i cambiamenti nell’infrastruttura e nella security siano compresi, comunicati e implementati in modo corretto.
Come nel settore della availabilty si fanno test per verificare backup e restore, così Mandiant Security Validation mette alla prova i sistemi disicurezza (SIEM, FW,Proxy, Endpoint, Email, DLP, Cloud etc..) e ne suggerisce l’eventuale remediation.
Questa tecnologia permette di dimostrare la bontà degli investimenti fatti in sicurezza e di massimizzare il risultato degli investimenti.
Il risultato è di estremo interesse per i SOC Manager, i CISO e per il Board.
Inoltre, in anteprima, forniremo i risultati del Report “Mandiant Security Effectiveness Report 2020”. Scopri come continuare a migliorare i tuoi processi e la tua tecnologia; stai al passo con lo scenario delle minacce cyber in costante evoluzione.
Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité : une plongée dans la réalité
Participez à notre webinaire pour comprendre pourquoi la plupart des attaques testées continuent d’infiltrer les environnements d'entreprise sans être détectées et pourquoi la validation de la sécurité est si critique.
Les résultats du Rapport sont préoccupants : les contrôles de sécurité ne fonctionnent pas comme prévu.
Le constat qui en ressort et ce à travers des milliers de tests effectués par des experts de l'équipe Mandiant Security Validation (anciennement Verodin) est que pour 53% des environnements testés, les attaques ont réussi à contourner les contrôles en place. C'est pourquoi la validation continue de la sécurité devient aujourd’hui une tâche critique pour une protection efficace des environnements IT et OT.
Rejoignez David Grout, CTO, EMEA, FireEye, pour notre prochain webinaire afin de découvrir les fondements de la validation de la sécurité et d’acquérir des connaissances pour répondre à des questions telles que :
- Ai-je confiance dans l'efficacité de mes contrôles de sécurité ?
- Puis-je évaluer rapidement la pertinence des informations sur les menaces ou l'exposition à la dernière attaque ?
- Suis-je capable d'arrêter la perte de données et de protéger l'intégrité des données sur mon réseau ?
- Comment simplifier et standardiser mon architecture de sécurité ?
- Ai-je les bonnes éléments quantifiables pour communiquer les chiffres clés aux dirigeants de mon entreprise ?
In today's ever-changing threat landscape, it is more important than ever to use a cyber hygiene routine to help prevent hackers, intelligent malware, and advanced viruses from accessing and corrupting your company's data.
How do validate that your cyber strategy is as watertight as it could be. In this webinar you will learn about FireEye Mandiant solutions to efficiently help you maintain an on-going process to combat configuration drift, effective control, rationalisation and optimisation.
FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione. Scopri la tecnologia premiata dai test del MITRE.
Il Webinar “FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.
Avere la possibilità di individuare i movimenti di un aggressore nel minor tempo possibile è la chiave per minimizzare gli impatti di un possibile incidente informatico. Le soluzioni di FireEye Endpoint & Network security integrano nativamente un sistema di condivisione degli Indicatori di Compromissione che permette di massimizzare la visibilità degli attacchi.
Ad esempio, i Movimenti Laterali spesso compiuti tramite programmi di “Shadow IT” possono essere una delle ragioni a causa delle quali il tempo di identificazione di un attacco - il così detto Dwell Time - risulti particolarmente elevato: FireEye permette di ottenere una piena visibilità di tutte le fasi di un attacco, compresa appunto la fase dei Movimenti Laterali - sicuramente una delle più complesse da identificare. Inoltre, le informazioni di Threat Intelligence, integrate nelle soluzioni FireEye, permettono di capire rapidamente quali sono quegli incidenti a cui è assolutamente necessario dare seguito in tempi brevi. I test del MITRE, condotti simulando una compromissione Nation-State con le Tecniche Tattiche e Procedure (TTP) del gruppo APT29, hanno recentemente assegnato a FireEye il livello di punteggio più alto in termini di identificazione rispetto a tutti i gli atri competitor.
In questo Webinar vedremo come i sistemi Endpoint e Network di FireEye possano mettere in sicurezza le più diverse architetture e sistemi.
James Graham, Sr. PMM, FireEye ; Jeff Guilfoyle, CISSP, Solution Architect, FireEye; Finian Mackin, Sr. PM, Anomali
Anomali and FireEye Mandiant Threat Intelligence: Integrating Better Intelligence for Better Security
As attackers grow more resourceful and effective in their efforts to expose and compromise users and their data, it is becoming more important than ever to integrate effective cyber threat intelligence to drive better detection and apply added context to potential threats. Anomali’s addition of FireEye Mandiant Threat Intelligence to its App Store presents a scalable way to integrate industry-leading threat intelligence into your security systems and program.
Join experts from FireEye and Anomali for a panel discussion surrounding the value of cyber threat intelligence, the need for increased integration of intelligence to drive better security, and the added value that a combined Anomali-FireEye solution can provide.
The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.
Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.
In this exclusive webinar, attendees will learn about:
•Common intrusion vectors across MAZE ransomware incidents
•Actors’ reliance upon open-source and commercially available attack tools
•Data exfiltration techniques present across most MAZE ransomware incidents
Il Webinar “Gestire la cybersecurity durante il lockdown: lo scenario delle minacce nel contesto del COVID-19” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.
Gabriele Zanoni ci parlerà del New Normal: cosa vuol dire oggi lavorare direttamente sul campo. A supporto fornirà esempi e trend di mercato.
Quali sono le sfide che oggi stiamo affrontando lavorando da casa, da un punto di vista sia individuale sia aziendale. Come possiamo relazionarci meglio con i nostri team e unire gli sforzi per lottare contro le sfide informatiche. Dobbiamo alzare il livello di attenzione al rischio, dobbiamo adattarci alle nuove minacce emergenti?
Durante questo webinar, Gabriele Zanoni condividerà quali sono le sfide attuali dovute ai continui attacchi phishing, come ottenere una prospettiva generale sullo stato della sicurezza cyber della propria organizzazione, anche lavorando da casa, cosa cercare in modo specifico e, infine, come gestire gli incidenti una volta che rilevati.
Matt Hartley SVP Mandiant Strategy for FireEye Mandiant & Devon Goforth Sr Dir Security Instrumentation for FireEye Mandiant
2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality
Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.
The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.
Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:
- Do I have confidence in the effectiveness of my security controls?
- Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
- Am I stopping data leakage and protecting data integrity?
- How can I simplify and standardize my security stack?
- Do I have evidence to support communicating key metrics to executives?
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,700 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.