FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:
-Get a brief overview on the latest email threat trends
-Learn about the must haves for email security solutions and the benefits of having one provider
-Find out about additional email security capabilities that can help you have an adaptable solution
-Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
RecordedMar 19 201949 mins
Your place is confirmed, we'll send you email reminders
Marco Riboli, Vice President, Southern Europe, FireEye e Gabriele Zanoni, Systems Engineer, Italia, FireEye
Verodin ha sviluppato una tecnologia di “Security Instrumentation” per valutare l’efficacia dei sistemi di sicurezza. Con Verodin, FireEye estende la propria capacità di aiutare i clienti ad adottare un approccio proattivo nell’identificazione e nella mitigazione dei rischi dovuti ad errate configurazioni, ad inefficienze nei prodotti o processi di sicurezza in azienda.
Verodin mette alla prova i sistemi di security come SIEM, FW,Proxy, Endpoint, Email, DLP, Cloud etc… e suggerisce le attività di Remediation; rimuove i presupposti e permette di valutare oggettivamente l’esposizione agli attacchi, grazie al monitoraggio ed al test dei prodotti e dei processi di sicurezza.
Registrati al webinar e scopri come FireEye grazie alle nuove funzionalità Verodin:
•Valuta la priorità sugli investimenti Security in relazione all’esposizione alle minacce.
•Fornisce uno strumento per massimizzare gli investimenti già fatti con indicazioni su come ottimizzare i prodotti sia On-Premise sia in Cloud.
•Fornisce Allarmi su cambiamenti non tracciati o non voluti che potrebbero comportare un aumento del rischio di attacchi sia On-Premise sia in Cloud.
•Estende il perimetro ai sistemi Scada e ICS, verificando le comunicazioni fra le reti OT ed IT e dando prova delle effettive restrizioni.
•Permette di verificare le Golden Image aziendali e gli Endpoint rispetto ad attacchi distruttivi come quelli Ransomware.
•Permette di verificare la bontà dei sistemi DLP e di effettuare test automatizzati e replicabili di Data Exfiltration.
Il risultato è di estremo interesse per i SOC Manager, i CISO e il Board.
Все някога може да се случи някой от вашата организация по невнимание да стане брънка във веригата от събития, водещи до кибератака. Някой може да отвори злонамерен имейл, 90% от кибератаките започват с ЕДИН ИМЕЙЛ! Заплахите могат да влизат и през крайните точки и да се движат през Вашата мрежа, повишавайки неправомерно правата на потребителите, провеждайки разузнаване и крадейки данни.
Само технологията сама по себе си не е достатъчна за борба с киберзаплахите. FireEye използват уникален иновационен цикъл, който комбинира технологии с доказано световно качество, безпрецедентна техническа и разследваща експертиза, придобити директно от „фронтовата линия“, включително услуги от световен клас, както и информация за новите заплахи, която никой друг не успява да събере!
Екосистемата FireEye съчетава пълен набор от възможности за откриване, защита и разследване чрез Network, Endpoint, and Email Security Solutions!
Присъединете се към този уебинар, по време на който системният инженер от КОМПЮТЪР 2000 България Златомир Миланов ще разкаже и демонстрира как заплахите в дадена организация могат да бъдат открити с помощта на технологията FireEye за мрежи, крайни точки и електронна поща, показвайки сценарии за атаки от различни гледни точки, както и как разузнаването допълва технологията.
Kevin Taylor - Senior VP EMEA; Mike Trevett - Director, Professional Services, UKI; Simon Moor, VP, NEUR
There is a very prevalent human factor to the success of cyber security; behind the technology lies a team of professionals with a range of technical and specialist skills used to implement defense and proactive hunting strategies. While technology has a big part to play in the war against cyber attacks, it is the human element which is both the catalyst for attack and defense.
There are an estimated 3.5 million unfilled cyber security positions forecasted for 2021 and research suggests it’s only getting worse. Security leaders must spend far too much time finding, hiring and retaining staff. When leaders cannot find appropriately skilled talent, they are often forced to hire junior employees. Less experienced and untested staff can dramatically increase the risk of a cyber breach.
Join this webinar as our executives discuss the cyber security skills crisis in line with the evolving threat landscape and near- and longer-term options to mitigate the risk of a security breach.
David Grout, CTO, Emea, FireEye et Arnaud Garnier, Systems Engineer, FireEye, France
La migration des infrastructures dans le cloud pose de nouveaux enjeux sur la sécurisation des données. Les attaques comportent de moins en moins de malware et les entreprises doivent pour cela s’adapter et trouver des outils adéquates pour combler le vide laissé par les équipements de sécurité traditionnels.
FireEye Helix permet de:
gagner de la visibilité sur les infrastructures cloud ;
confronter tous les évènements anormaux à l’expertise FireEye héritée de FireEye Mandiant et de FireEye Threat Intelligence.
Fort de cette expérience terrain, la solution FireEye Helix apparaît comme la solution la mieux adaptée pour répondre à ces nouveaux enjeux.
Durant ce webinaire de 45 minutes, David Grout, CTO EMEA, et Arnaud Garnier, Systems Engineer, France, reviendrons sur la nécessité de gagner en visibilité sur les infrastructures cloud afin de pouvoir détecter les nouvelles méthodes d’attaques et ainsi les contrecarrer.
Luke McNamara, Principal Intelligence Analyst, FireEye & Lauren T. Winchester, Breach Response Services Manager, Beazley
For some time, the healthcare sector has faced a wide range of threat actors and adversary motivations. Today, data held by healthcare organizations—patient records, medical research, and more—remains at risk from cyber criminals and espionage groups. More disruptive cyber attacks can even hamper operations within healthcare providers.
Join us on September 17 at 9 a.m. PT/12 p.m. ET, as FireEye and Beazley present a webinar that discusses the latest breach and threat landscape trends for this sector.
Jacqueline O'Leary,Principal Analyst; Raymond Leong, Principal Threat Analyst; Dan Perez, Principal Threat Analyst
Defending the frontlines of cybersecurity is a never-ending battle, with new advanced persistent threat (APT) groups lurking to steal data, compromise infrastructure, and interfere with victim business operations. FireEye’s newly named threat group, APT41 is no exception. Their aggressive and consistent mode of operation, and highly sophisticated tactics, distinguishes them from other adversaries making them a double threat to contend with.
APT41 uniquely balances espionage activity concurrently with financially motivated activity driven by personal gain. Since 2012 FireEye has observed APT41 conduct in a wide range of operations including data theft, innovative supply-chain attacks, and the use of unique tools and targeting techniques.
Join this webinar to hear FireEye Threat Intelligence experts, Jacqueline O’Leary, Raymond Leong and Dan Perez, provide:
•Insights into attribution and shared tactics between espionage and financially motivated operations
•Supply chain compromises attributed to APT41 activity
•Unique malware capabilities and techniques
•Details on connections to identified personas
Vasu Jakkal, EVP & CMO, Colin Carmichael, SVP & CIO and Jason Martin, EVP
Front and Center with Colin Carmichael and Jason Martin on the Cyber Security Skills Shortage
FireEye Chat, our quarterly talk show, brings guest experts front and center to cover today’s most important cyber security topics.
In this episode, we address the growing cyber security skills gap, which is expected to reach 3.5 million by 2021.
The rise of technology, combined with more complex cyber security products and cyber threats, have gradually increased the demand for experienced, trained experts to fill a growing number of critical security roles in industry and government worldwide.
Join us as our FireEye Chat panel discusses:
• An overview of the cyber skills gap
• Current proposed solutions
• A breakdown of how FireEye thinks about the challenge, as both a technology company and a security provider
Matt Shelton, Director, Technology Risk & Threat Intelligence, FireEye
FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.
In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:
•Uses threat intelligence to proactively protect the organization
•Detects threats using FireEye Network Security products
•Responds to incidents with FireEye Endpoint Security
•Leverages Helix as its security operations platform
•Hunts for known and unknown threats within its environment.
A Breach Investigation Scenario Leveraging FireEye Endpoint Security
FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.
Join FireEye’s Vinoo Thomas as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
Rob van der Ende, VP APJ, FireEye Mandiant & Naureen Rasul, Head of Cyber Practice Asia, Marsh Pacific
Rapidly evolving threats and infiltration techniques have rendered traditional cyber defense strategies insufficient and ineffective. The emerging threat vectors and speed of change amplified by the digital transformation cannot be addressed by traditional means. Globally, laws are also changing to keep pace as cybercrime evolves, knowing no boundaries. Therefore, organizations must be nimble and agile to keep pace with policy changes, especially when expanding across different jurisdictions
Join us as we discuss three strategic imperatives to strengthen cyber resilience:
• Understand (know your threats) – Identify organization- and industry-specific cyber threats and regulations calls for robust strategies that include cross-disciplinary considerations.
• Measure (know yourself) – Quantify the potential financial impact of cyber exposures to compare against the level of risk appetite acceptable to the board. This will determine the amount of investment necessary to mitigate and transfer any residual risk.
• Manage (know what you can do) – Proactively manage cyber risks by having clear action plans based on your capabilities and capacities to protect against cyber criminals.
While cyber-attacks are inevitable, proper preparation is the essential element that sets resilient organizations apart from the rest in managing risk, minimizing damage, and recovering quickly from any incidents.
Stanley Parret, Principal Consultant, FireEye Managed Defense
The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.
Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:
-The impact of staffing shortages on security practitioners
-How they’re being required to protect more with less
-The options available to security teams who need to extend their capacity
Ben Forster, Sr. Product Marketing Manager, FireEye
Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.
In this webinar:
- Understand the benefits of technology consolidation
- Learn about what a single platform can do for your people and processes
- Discover the untapped potential of your security investments
The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.
Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
- The state of the cyber landscape, specific to email security.
- How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
- Why is FireEye better at catching evolving attacks and how this can benefit you.
Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant
Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite
Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.
C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.
Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:
• Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
• Ensure that the board’s security investment decisions support your organization’s appetite for risk
• Establish a framework that ensures the alignment of strategic priorities with security spending
• Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
• Apply these lessons to a sample business scenario.
Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
Like most cyber criminals, advanced persistent threat (APT) groups try to steal data, disrupt operations, and destroy infrastructure. But unlike other attackers, APT attackers pursue their objectives over months or even years, adapting to defenses and frequently retargeting the same victim.
Join this webinar to hear David Grout, FireEye EMEA Chief Technology Officer explain how effective cyber threat intelligence (CTI) helps you understand APT groups’ intents and tactics so you can stay ahead of attacks, instead of just reacting to them. He’ll also provide:
•A high-level overview of the nation-state interests driving APT activity
•Insight into the most recent APT attacks investigated by FireEye
•A deep dive into the workings of APT40, a Chinese cyber espionage group that typically targets countries and organizations strategically important to the country’s “Belt and Road Initiative.”
Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEye
Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,700 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.
The Email Security Goal: ONE Single SolutionKen Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]48 mins