Hi [[ session.user.profile.firstName ]]

[EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority

Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

----------------------------
"Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."

- KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE

"Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
- PWC Global State of Info Security Survey, 2015
Recorded Apr 24 2018 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
FireEye EMEA
Presentation preview: [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
  • Channel
  • Channel profile
  • Cyber Threat Intelligence as a Business Enabler Jun 10 2020 7:00 am UTC 60 mins
    Jens Monrad, Head of Mandiant Threat Intelligence, EMEA
    Join Jens Monrad, Head of Mandiant Threat Intelligence – EMEA, for ‘Cyber Threat Intelligence as a Business Enabler’.
    This session will cover how accurate and relevant Cyber Threat Intelligence can help organisations make smarter decisions around cyber defence, alert & event prioritisation. Jens will also discuss how cyber threat intelligence enables businesses to make decisions based upon the cyber threat landscape and their risk appetite.
  • Ransomware Trends with A Focus on MAZE Jun 10 2020 2:30 am UTC 60 mins
    Steve Ledzian VP, CTO - APAC, FireEye
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
  • Considerations for Evolving to Intelligence-Led Security Jun 9 2020 8:00 pm UTC 60 mins
    Gina Hill, Principle Consultant, Mandiant & Duke McDonald, Consultant, Mandiant
    An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. Ultimately, organizations need to be able to understand the return on their threat intelligence investments.

    Mandiant Threat Intelligence experts Gina Hill and Duke McDonald present an in-depth explanation of what it means to be intelligence-led, how organizations should seek to increase intelligence maturity and capability, and how to get started on this journey.

    Join this session to learn:
    • The definition, characteristics and caveats of an intelligence-led security approach
    • Things to consider when assessing and evolving intelligence maturity
    • The importance of frameworks when assessing, measuring and executing on your strategy

    Register Now
  • Proactive Solutions to Stop Modern Ransomware in its Tracks Jun 9 2020 7:00 pm UTC 60 mins
    Nader Zaveri, Incident Response Mgr; Matt Bromiley, Principal Consultant; Kimberly Goody, Threat Intelligence Sr. Mgr.
    Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require organizations to apply a holistic security risk mitigation strategy from the C-suite to practitioners.

    This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:

    • Learn modern ransomware trends and attacker behaviors observed on the frontlines
    • Realize why proactive assessment is critical when preparing for and preventing ransomware
    • Understand how threat intelligence, hunting, and response provides the decision support and detection needed to outmaneuver ransomware actors
    • Implement effective mitigation strategies to stop ransomware attackers in their tracks

    Register today to join Nader Zaveri – Incident Response Manager, Matt Bromiley – Managed Defense Principal Consultant, and Kimberly Goody – Threat Intelligence Senior Manager, as they provide expert insights on modern-day ransomware attacks and how best to mitigate them.
  • Rethink Cyber Defense Strategies Starting with Threats Jun 9 2020 6:00 pm UTC 60 mins
    Peter Watts, former Director for Cybersecurity Policy, National Security Council
    Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
    Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces.
    In this session, Peter Watts, threat intelligence veteran and former Director for Cybersecurity Policy, National Security Council lays out:

    • A modern definition of threat intelligence with important milestones
    • How to recognize and develop critical success factors for producing or consuming threat intelligence
    • The impact of actionable threat intelligence on security risk leaders and their organizations
    • Future use cases that may reshape how we think about cyber defense and business value
  • Tips for Securing Your Cloud Environments Jun 9 2020 5:00 pm UTC 60 mins
    Chris Romano, Mandiant Senior Consultant and Greg Blaum, Mandiant Principal Consultant
    For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye Mandiant experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.

    In this session, Mandiant consultants Greg Blaum and Chris Romano share lessons learned from real-world incident response experiences, identify some common pitfalls and provide best practices for organizations to harden their cloud environments and reduce the risk of compromise. They also discuss the pitfalls and best practices presented in M-Trends 2020.
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness Jun 9 2020 4:00 pm UTC 60 mins
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    -MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    -Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    -Impact of environmental drift on your security posture and how to plan for it
    -Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>
  • Take Control of Your Cloud Environments Jun 9 2020 3:00 pm UTC 60 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • Virtual Cyber Attack Simulation Jun 9 2020 9:00 am UTC 90 mins
    Michael Trevett, UKI Mandiant Director, FireEye with external panellists Mark Deem, Partner, Cooley LLP
    Did you know that 90% of successful cyber-attacks rely on human error by any one member of staff?
    It is common to assume that cyber security is the sole responsibility of your IT or security team. However, in many cases all it takes is one click on an email or a visit to a website which has been successfully attacked for you to cause a security breach in your organisation.
    So how do you know what to look out for and how do you mitigate the risks of a breach when it does occur?
    Join the FireEye Mandiant Consultants along with external panel of experts in our Cyber Attack Simulation as we experience a successful breach first hand;
    •See the impact of the attack on an organization
    •the level of resource needed to resolve an attack, and
    •the overall potential impact an attack might have on your business
  • Security Validation - what is it and how can it improve security effectiveness? Jun 9 2020 9:00 am UTC 60 mins
    Mike Batten - VP Sales Engineering EMEA, FireEye
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • Intelligence-Driven Security Validation: Why Cyber Security needs Validation. Jun 9 2020 2:00 am UTC 60 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lacked the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high cost of their defenses.
    Security validation helps organizations validate and consolidate their existing security investments before throwing more tools at the problem. And by integrating and operationalizing threat intelligence, organizations can develop an effective, highly scalable security posture. During this session, you can learn how to achieve a more efficient, effective and future-proof security program through security validation.
  • Mandiant Security Validation: verifica la tua sicurezza, niente presupposti Jun 4 2020 12:30 pm UTC 60 mins
    Gabriele Zanoni, Solution Architect, EMEA, FireEye
    Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze. NEW Report Security Effectiveness.

    Il Webinar “Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Mandiant Security Validation è una tecnologia di “Security Instrumentation” che fornisce evidenze per verificare gli investimenti effettuati in Security.
    La security è spesso basata su presupposti come:
    •si ritiene che le tecnologie funzionino come descritte in fase di acquisizione;
    •si ritiene che i prodotti siano installati, configurati e mantenuti nel tempo in modo corretto;
    •si ritiene che le persone o i partner gestiscano allarmi e processi come stabilito;
    •si ritiene che i cambiamenti nell’infrastruttura e nella security siano compresi, comunicati e implementati in modo corretto.
    Come nel settore della availabilty si fanno test per verificare backup e restore, così Mandiant Security Validation mette alla prova i sistemi disicurezza (SIEM, FW,Proxy, Endpoint, Email, DLP, Cloud etc..) e ne suggerisce l’eventuale remediation.
    Questa tecnologia permette di dimostrare la bontà degli investimenti fatti in sicurezza e di massimizzare il risultato degli investimenti.
    Il risultato è di estremo interesse per i SOC Manager, i CISO e per il Board.
    Inoltre, in anteprima, forniremo i risultati del Report “Mandiant Security Effectiveness Report 2020”. Scopri come continuare a migliorare i tuoi processi e la tua tecnologia; stai al passo con lo scenario delle minacce cyber in costante evoluzione.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité Jun 3 2020 12:30 pm UTC 60 mins
    David Grout, CTO, EMEA, FireEye
    Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité : une plongée dans la réalité

    Participez à notre webinaire pour comprendre pourquoi la plupart des attaques testées continuent d’infiltrer les environnements d'entreprise sans être détectées et pourquoi la validation de la sécurité est si critique.
    Les résultats du Rapport sont préoccupants : les contrôles de sécurité ne fonctionnent pas comme prévu.
    Le constat qui en ressort et ce à travers des milliers de tests effectués par des experts de l'équipe Mandiant Security Validation (anciennement Verodin) est que pour 53% des environnements testés, les attaques ont réussi à contourner les contrôles en place. C'est pourquoi la validation continue de la sécurité devient aujourd’hui une tâche critique pour une protection efficace des environnements IT et OT.

    Rejoignez David Grout, CTO, EMEA, FireEye, pour notre prochain webinaire afin de découvrir les fondements de la validation de la sécurité et d’acquérir des connaissances pour répondre à des questions telles que :

    - Ai-je confiance dans l'efficacité de mes contrôles de sécurité ?
    - Puis-je évaluer rapidement la pertinence des informations sur les menaces ou l'exposition à la dernière attaque ?
    - Suis-je capable d'arrêter la perte de données et de protéger l'intégrité des données sur mon réseau ?
    - Comment simplifier et standardiser mon architecture de sécurité ?
    - Ai-je les bonnes éléments quantifiables pour communiquer les chiffres clés aux dirigeants de mon entreprise ?

    S’inscrire maintenant!
  • How to maintain cyber hygiene - from root cause to solution Jun 2 2020 9:00 am UTC 45 mins
    David Grout, CTO, EMEA, FireEye
    In today's ever-changing threat landscape, it is more important than ever to use a cyber hygiene routine to help prevent hackers, intelligent malware, and advanced viruses from accessing and corrupting your company's data.

    How do validate that your cyber strategy is as watertight as it could be. In this webinar you will learn about FireEye Mandiant solutions to efficiently help you maintain an on-going process to combat configuration drift, effective control, rationalisation and optimisation.
  • Endpoint & Network: una visibilità completa in continua evoluzione Recorded: May 28 2020 64 mins
    Gabriele Zanoni, Solution Architect, EMEA, FireEye
    FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione. Scopri la tecnologia premiata dai test del MITRE.

    Il Webinar “FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Avere la possibilità di individuare i movimenti di un aggressore nel minor tempo possibile è la chiave per minimizzare gli impatti di un possibile incidente informatico. Le soluzioni di FireEye Endpoint & Network security integrano nativamente un sistema di condivisione degli Indicatori di Compromissione che permette di massimizzare la visibilità degli attacchi.
    Ad esempio, i Movimenti Laterali spesso compiuti tramite programmi di “Shadow IT” possono essere una delle ragioni a causa delle quali il tempo di identificazione di un attacco - il così detto Dwell Time - risulti particolarmente elevato: FireEye permette di ottenere una piena visibilità di tutte le fasi di un attacco, compresa appunto la fase dei Movimenti Laterali - sicuramente una delle più complesse da identificare. Inoltre, le informazioni di Threat Intelligence, integrate nelle soluzioni FireEye, permettono di capire rapidamente quali sono quegli incidenti a cui è assolutamente necessario dare seguito in tempi brevi. I test del MITRE, condotti simulando una compromissione Nation-State con le Tecniche Tattiche e Procedure (TTP) del gruppo APT29, hanno recentemente assegnato a FireEye il livello di punteggio più alto in termini di identificazione rispetto a tutti i gli atri competitor.
    In questo Webinar vedremo come i sistemi Endpoint e Network di FireEye possano mettere in sicurezza le più diverse architetture e sistemi.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • Integrating Better Intelligence for Better Security Recorded: May 27 2020 50 mins
    James Graham, Sr. PMM, FireEye ; Jeff Guilfoyle, CISSP, Solution Architect, FireEye; Finian Mackin, Sr. PM, Anomali
    Anomali and FireEye Mandiant Threat Intelligence: Integrating Better Intelligence for Better Security

    As attackers grow more resourceful and effective in their efforts to expose and compromise users and their data, it is becoming more important than ever to integrate effective cyber threat intelligence to drive better detection and apply added context to potential threats. Anomali’s addition of FireEye Mandiant Threat Intelligence to its App Store presents a scalable way to integrate industry-leading threat intelligence into your security systems and program.

    Join experts from FireEye and Anomali for a panel discussion surrounding the value of cyber threat intelligence, the need for increased integration of intelligence to drive better security, and the added value that a combined Anomali-FireEye solution can provide.​

    Register Now!
  • How do you gain cyber assurance? Recorded: May 26 2020 41 mins
    Katherine Demidecka, Strategic Mandiant Consultant, FireEye
    This webinar will discuss how an organisation can gain assurance that it is prepared to defend against and respond to a cyber incident. The following key topics will be covered:

    •Securing your environment proportionate to the risk
    •Readiness to identify and respond to an attacker's presence quickly
    •Testing your defences and response plans through simulated attacks
  • Navigating MAZE: Analysis of a Rising Ransomware Threat Recorded: May 21 2020 58 mins
    Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence & Jeremy Kennelly, Manager, Mandiant Threat Intelligence
    The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.

    Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.

    In this exclusive webinar, attendees will learn about:
    •Common intrusion vectors across MAZE ransomware incidents
    •Actors’ reliance upon open-source and commercially available attack tools
    •Data exfiltration techniques present across most MAZE ransomware incidents
  • Gestire la cybersecurity durante il lockdown: lo scenario delle minacce Recorded: May 21 2020 58 mins
    Gabriele Zanoni, EMEA Solutions Architect, FireEye
    Il Webinar “Gestire la cybersecurity durante il lockdown: lo scenario delle minacce nel contesto del COVID-19” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Gabriele Zanoni ci parlerà del New Normal: cosa vuol dire oggi lavorare direttamente sul campo. A supporto fornirà esempi e trend di mercato.
    Quali sono le sfide che oggi stiamo affrontando lavorando da casa, da un punto di vista sia individuale sia aziendale. Come possiamo relazionarci meglio con i nostri team e unire gli sforzi per lottare contro le sfide informatiche. Dobbiamo alzare il livello di attenzione al rischio, dobbiamo adattarci alle nuove minacce emergenti?
    Durante questo webinar, Gabriele Zanoni condividerà quali sono le sfide attuali dovute ai continui attacchi phishing, come ottenere una prospettiva generale sullo stato della sicurezza cyber della propria organizzazione, anche lavorando da casa, cosa cercare in modo specifico e, infine, come gestire gli incidenti una volta che rilevati.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • 2020 Mandiant Security Effectiveness Report Findings Recorded: May 19 2020 60 mins
    Matt Hartley SVP Mandiant Strategy for FireEye Mandiant & Devon Goforth Sr Dir Security Instrumentation for FireEye Mandiant
    2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality

    Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

    The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.

    Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:

    - Do I have confidence in the effectiveness of my security controls?
    - Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
    - Am I stopping data leakage and protecting data integrity?
    - How can I simplify and standardize my security stack?
    - Do I have evidence to support communicating key metrics to executives?

    Register Now to Reserve Your Seat!
Technology, Intelligence and Expertise
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,700 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
  • Live at: Apr 24 2018 2:00 pm
  • Presented by: FireEye EMEA
  • From:
Your email has been sent.
or close