Hi [[ session.user.profile.firstName ]]

The BIG Cyber Security Skills Gap

Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.

During this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
Recorded Oct 11 2018 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alistair E. Macrae, Systems Engineer, FireEye
Presentation preview: The BIG Cyber Security Skills Gap
  • Channel
  • Channel profile
  • Connecting the Dots: the Importance of an Integrated Security Solution Oct 24 2018 3:00 pm UTC 60 mins
    Misha Sokolnikov, Director of Product Marketing, FireEye
    As cyber threats continue to proliferate and expand, so does the arsenal of tools organizations employ to protect against the attackers. With most security solutions equipping to solve only narrow problems, it has become the norm for organizations to deploy an unbearable amount of technologies. Join Misha Sokolnikov, Director of Product Marketing, FireEye as he provides:

    • An overview of why security solutions today are not integrated and cause complexity, inefficiencies and excessive alert noise
    • The tactics that threat actors use to take advantage of disjointed, complex security technologies
    • The most critical threat vectors and how the consolidation and integration of security tools can help you improve your security posture

    Register Now!
  • Executive Panel | Financial Services: Cyber Threats on the Horizon Oct 24 2018 2:00 pm UTC 25 mins
    Kevin Taylor, EMEA VP; Sandra Joyce, VP, Global Intel Operations; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP
    Cyber threats plague the financial services industry:
    • Advanced persistent threat (APT) actors seek to support economic reforms and reach state goals
    • Financial threat actors seek financial gain through the direct theft of funds or the sale of stolen information
    • Disruptive threat actors and hacktivists seek to gain publicity, divert banks' attentions, or demonstrate a political motive

    Any one of these threats would increase activity in an industry, but the presence of all three likely accounts for the large number of intrusions in financial services organizations.

    Join us for a live video panel and get executive insights for critical topics relevant to the financial services industry, including the:
    • Nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs)
    • Ripple effect consequences of geopolitics
    • Cost of a breach and importance of risk awareness in the boardroom
    • Need to keep GDPR a high priority
  • Autopsy of a real ICS case – TRITON Oct 24 2018 9:00 am UTC 45 mins
    David Grout, Director Technical, South EMEA, FireEye
    Mandiant responded to an incident in 2017 at a critical infrastructure organisation where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. This malware, called TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.

    Join David Grout, our Technical Director for South EMEA, for a live session and get insights into the technical framework details and the potential outcomes.
  • The Double-Edged Sword of Cloud Security Oct 24 2018 3:00 am UTC 60 mins
    Shashwath Hegde, Solutions Architect, APAC, FireEye
    In many ways, public cloud is more secure than a traditional data center. And yet, assets on the public cloud are still being compromised just as those stored in traditional data centers. Mandiant, the industry leader in incident response consulting, estimates that 15 percent of all of its incident response involves public cloud assets. So, if the cloud is more secure, why is it still getting hacked?

    In this session, we will discuss
    • the challenges in Cloud Security
    • how to design an effective strategy to tackle them
  • Cyber Security Risk Management –New Methods to Gain Control Recorded: Oct 23 2018 58 mins
    Matthew Keane, Sr. Director, FireEye, Travis Fry, Sr. Consultant, FireEye & Michelle Visser, Partner, Ropes & Gray
    Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.

    This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.

    Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:

    • Security risks across the complete cyber attack lifecycle, not only detection and response
    • A simple and proven method for approaching the risk reality facing all organizations
    • The rising cyber security insurance market and how it will affect risk management efforts
    • Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
    • Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
    • Best practice exercises to test your incident response plan based on real-world experiences
    • Techniques for effectively reporting risk and capability needs to a Board-level audience
  • How to Elevate Security as a Boardroom Priority Recorded: Oct 23 2018 61 mins
    Simon Moor, Director, Northern Europe, FireEye; Duncan Brown, Associate VP, European Infrastructure & Security, IDC EMEA
    Despite the continued focus on security and cyber-risk, most organisations demonstrate poor alignment between the business and security in the consideration of risk. This disconnect can start right at the beginning of a business process, where security is often not involved early enough (or at all) in strategic projects. Boardroom visibility of security threats is often weak, while the nature of security threats means that a continuous reassessment of risk is required, but rarely occurs.

    This webinar explores the gap between security and business risk, and examines the opportunities for alignment in Digital Trust, as a prerequisite for digital transformation.
  • Are you Ready to Handle a Cyber Crisis? Recorded: Oct 23 2018 59 mins
    Rob van der Ende, VP APJ, Mandiant, a FireEye company & Mimi Yang, Senior Foreign Legal Consultant Ropes & Gray
    How prepared are you and your organization to respond to a data breach?
    Executives and their teams in PR/Communications, Cybersecurity, IT, (external) Legal Counsel, and others, should all be intimately aware of the Breach Response Plan and practice their tasks regularly through a Cyber Breach Simulation, or Tabletop Exercise.

    Ropes & Gray and Mandiant have joined forces to help you evaluate your organization’s ability to respond effectively to a cyber incident before it occurs. The Tabletop Exercise uses gameplay techniques to assess your cyber crisis processes, tools and proficiency from legal, governance and technical perspectives. During the exercise, multiple scenarios based on real-world experience are simulated in a roundtable environment, allowing Ropes & Gray to provide concrete legal advice to your organization based on the results, including advice on potential enhancements to your organization’s cyber breach and incident response preparedness that Mandiant and Ropes & Gray identify through the exercise.

    About Ropes & Gray
    Ropes & Gray privacy & cybersecurity attorneys have advised and assisted clients in responding to cyberincidents of multiple shapes and sizes, including many of the largest incidents in history, and apply that extensive background to counsel clients on cybersecurity incident preparedness.

    About Mandiant
    Mandiant, a FireEye company, has over 14 years of near-daily interaction with organized, persistent attackers and threat groups around the world. Mandiant consultants spend hundreds of thousands of hours annually working with organizations of all sizes to remediate security breaches, identify vulnerabilities and provide guidance on closing security gaps.
  • Cyber Security in Today's IoT World Recorded: Oct 22 2018 41 mins
    Parnian Najafi Borazjani, Senior Analyst, FireEye
    IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.

    The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
    Moreover, device consumers such as corporations should be aware of their attack surface.

    Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
  • Your breach readiness master plan: take the sting out of a cyber attack Recorded: Oct 22 2018 61 mins
    Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant
    With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

    “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

    Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

    •How to identify security maturity improvement areas before, during and after a breach
    •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
    •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
    •Which key strategic communication tactics should be considered when reporting a breach
  • What Executives Should Know about Cyber AI Recorded: Oct 22 2018 54 mins
    Claudio Scarabello Director Product, APAC FireEye Inc
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • FireEye Global Threat Response – How we Protect the World Recorded: Oct 22 2018 57 mins
    Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • The BIG Cyber Security Skills Gap Recorded: Oct 11 2018 48 mins
    Alistair E. Macrae, Systems Engineer, FireEye
    Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organisations face in recruiting and retaining skilled cyber professionals.

    During this webinar we will be discussing the benefits and challenges of inhouse vs. outsourcing of cyber security operations and how this has been effected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
  • Privacy & Security in the Age of IoT Recorded: Oct 2 2018 61 mins
    Elena Elkina (Aleada Consulting ) | Parnian Najafi Borazjani (FireEye) | Ondrej Krehel (LIFARS) | John Bambenek (ThreatSTOP)
    This webinar is part of BrightTALK's Privacy Insights Series and National Cyber Security Awareness Month (NCSAM).

    With the proliferation of the Internet of Things into every sphere of our lives, it's now more important than ever to understand the security and privacy risks associated with connected devices. With smart home devices, office tools, children's toys, even medical devices being vulnerable to cyber attacks, becoming cyber aware should be a key priority for everyone.

    Join privacy and cyber security experts for an interactive panel roundtable discussion on:
    - The privacy and security vulnerabilities and risks stemming from IoT devices
    - The basic safety measures you can deploy to protect your home and workplace against cyber threats
    - Best practices for privacy and security safeguards
    - What to do in the event of a breach
    - What the future of privacy looks like

    Speakers:
    - Elena Elkina, Partner at Aleada Consulting
    - Parnian Najafi Borazjani, Senior Analyst, FireEye
    - Ondrej Krehel, Digital Forensics Lead, CEO & Founder, LIFARS
    - John Bambenek, VP Security Research & Intelligence, ThreatSTOP

    Audience members are encouraged to send questions to the speakers to be answered during the live session.
  • Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten Recorded: Sep 25 2018 35 mins
    Florian Siebert, Senior Systems Engineer, Global Services & Intelligence
    FireEye Managed Defense greift auf langjährige Erfahrung aus unseren Mandiant Incident Response Einsätzen zurück: wir nutzen die Daten und Erkenntnisse aus der Abwehr realer Angriffe, um Bedrohungen schneller zu erkennen und abzuwehren. Dadurch können wir Ihnen einen unternehmensweiten Überblick von Bedrohungen in Ihrem Netzwerk in Echtzeit geben und die Fähigkeit Ihres bestehendes CERT, Security Operation Center oder Sicherheitsteams ergänzen oder erweitern.
  • Trends in Data Breaches and Comprehensive Response Recorded: Sep 19 2018 63 mins
    Michelle Drolet (Towerwall) | Dave Klein (GuardiCore) | Matthias Maier (Splunk) | Mike Trevett (FireEye)
    Does your organization have a data breach response plan? Discover the best practices for breach response and how to strengthen your organization's cyber resilience.

    Join this interactive Q&A panel with top security experts as they discuss:
    - The latest trends in data breach protection
    - Who's most at risk
    - How to detect breaches faster
    - What to do and not to do when it comes to breach response
    - Recommendations for CISOs for improving security

    Speakers:
    - Michelle Drolet, CEO, Towerwall
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Matthias Maier, Technical Evangelist, Splunk
    - Mike Trevett, Director, UK&I, FireEye
  • Keeping Up with Advanced Attackers: Understanding Threats and Adapting Defences Recorded: Sep 18 2018 42 mins
    Alister Shepherd, Mandiant Director, EMEA
    An organization suffering a breach is no longer a question of "if," but "when" and "how big." Attackers are becoming more sophisticated in exploiting vulnerabilities, acquiring hacking tools on the dark web and leveraging automation, making traditional defense strategies antiquated and obsolete.

    Join Alister Shepherd, our Mandiant Director for EMEA, for insights into:
    - Recent APT intrusion activity from different regional threat actors,
    - Current attack techniques that have been successful during these intrusions,
    - Detections and investigations conducted by Mandiant,
    - Lessons learned for defenders.
  • Executive Panel | Financial Services: Cyber Threats on the Horizon Recorded: Aug 14 2018 25 mins
    Kevin Taylor, EMEA VP; Sandra Joyce, VP, Global Intel Operations; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP
    Cyber threats plague the financial services industry:
    • Advanced persistent threat (APT) actors seek to support economic reforms and reach state goals
    • Financial threat actors seek financial gain through the direct theft of funds or the sale of stolen information
    • Disruptive threat actors and hacktivists seek to gain publicity, divert banks' attentions, or demonstrate a political motive

    Any one of these threats would increase activity in an industry, but the presence of all three likely accounts for the large number of intrusions in financial services organizations.

    Join us for a live video panel and get executive insights for critical topics relevant to the financial services industry, including the:
    • Nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs)
    • Ripple effect consequences of geopolitics
    • Cost of a breach and importance of risk awareness in the boardroom
    • Need to keep GDPR a high priority
  • Video Interview | How to Build a Robust Threat Intel Function Recorded: Jul 25 2018 18 mins
    Sandra Joyce, VP, Global Intelligence; Igors Konovalovs, Director, iSIGHT Intelligence, EMEA
    Cyber threat intelligence is an essential weapon for detecting and preventing advanced attacks from well-funded attackers with specific agendas and targets.
    The adoption of Cyber Threat Intelligence (CTI) is increasing across organizations like yours—adding value to all segments of security operations and the business.

    CISOs often face serious challenges communicating information security issues to business managers, top executives and boards of directors. CTI provides information that can put a face on adversaries and translate cyber threats into business risks, using terms that are meaningful to non-technical executives.

    Watch this interview with Sandra Joyce, head of global threat intel, and Igors Konovalovs, Director for iSIGHT Intelligence EMEA, as they answer some of the most practical and pressing questions about cyber threat intelligence.
  • [VIDEO PANEL] Cyber Security in Europe: An Executive Perspective Recorded: Jul 18 2018 38 mins
    Kevin Taylor, EMEA VP; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP; Richard Weaver, Data Privacy Officer
    Cyber breaches are inevitable because attackers constantly change their tools, techniques and procedures (TTPs). Everyone is affected in different ways, whether from compromised systems or supply chains to the financial implications of non-compliance and breach notification.

    Join us for a live video panel on trending topics in cyber security:
    -Breach notification sources, dwell time and industries mostly likely to be compromised and retargeted by attackers
    -Importance of understanding cyber attackers and their motives
    -Red teaming to improve security effectiveness
    -Cyber security skills gap
    -Direct and indirect costs of a breach
    -Requirements, processes and policies to handle the GDPR
  • Incident Remediation: Could this have been prevented? Recorded: Jul 17 2018 31 mins
    Manfred Erjak, Consultant, Professional Services
    Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.

    During this webinar, we will discuss:
    - How to best remediate from such an event;
    - The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
    - Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers

    Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
Intelligence-led Security
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organisations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 6,000 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The BIG Cyber Security Skills Gap
  • Live at: Oct 11 2018 2:00 pm
  • Presented by: Alistair E. Macrae, Systems Engineer, FireEye
  • From:
Your email has been sent.
or close