Hi [[ session.user.profile.firstName ]]

The Cyber Skills Gap: A Practitioner’s Perspective

The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.

Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:

-The impact of staffing shortages on security practitioners
-How they’re being required to protect more with less
-The options available to security teams who need to extend their capacity

Register now for the webinar
Recorded Jun 19 2019 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stanley Parret, Principal Consultant, FireEye Managed Defense
Presentation preview: The Cyber Skills Gap: A Practitioner’s Perspective
  • Channel
  • Channel profile
  • Mandiant Security Validation: verifica la tua sicurezza, niente presupposti Recorded: Jun 4 2020 59 mins
    Gabriele Zanoni, Solutions Architect, EMEA, FireEye
    Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze. NEW Report Security Effectiveness.

    Il Webinar “Mandiant Security Validation: verifica la tua sicurezza, niente presupposti, solo evidenze” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Mandiant Security Validation è una tecnologia di “Security Instrumentation” che fornisce evidenze per verificare gli investimenti effettuati in Security.
    La security è spesso basata su presupposti come:
    •si ritiene che le tecnologie funzionino come descritte in fase di acquisizione;
    •si ritiene che i prodotti siano installati, configurati e mantenuti nel tempo in modo corretto;
    •si ritiene che le persone o i partner gestiscano allarmi e processi come stabilito;
    •si ritiene che i cambiamenti nell’infrastruttura e nella security siano compresi, comunicati e implementati in modo corretto.
    Come nel settore della availabilty si fanno test per verificare backup e restore, così Mandiant Security Validation mette alla prova i sistemi di sicurezza (SIEM, FW,Proxy, Endpoint, Email, DLP, Cloud etc..) e ne suggerisce l’eventuale remediation.
    Questa tecnologia permette di dimostrare la bontà degli investimenti fatti in sicurezza e di massimizzare il risultato degli investimenti.
    Il risultato è di estremo interesse per i SOC Manager, i CISO e per il Board.
    Inoltre, in anteprima, forniremo i risultati del Report “Mandiant Security Effectiveness Report 2020”. Scopri come continuare a migliorare i tuoi processi e la tua tecnologia; stai al passo con lo scenario delle minacce cyber in costante evoluzione.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité Recorded: Jun 3 2020 52 mins
    David Grout, CTO, EMEA, FireEye
    Résultats du rapport Mandiant 2020 sur l'efficacité de la sécurité : une plongée dans la réalité

    Participez à notre webinaire pour comprendre pourquoi la plupart des attaques testées continuent d’infiltrer les environnements d'entreprise sans être détectées et pourquoi la validation de la sécurité est si critique.
    Les résultats du Rapport sont préoccupants : les contrôles de sécurité ne fonctionnent pas comme prévu.
    Le constat qui en ressort et ce à travers des milliers de tests effectués par des experts de l'équipe Mandiant Security Validation (anciennement Verodin) est que pour 53% des environnements testés, les attaques ont réussi à contourner les contrôles en place. C'est pourquoi la validation continue de la sécurité devient aujourd’hui une tâche critique pour une protection efficace des environnements IT et OT.

    Rejoignez David Grout, CTO, EMEA, FireEye, pour notre prochain webinaire afin de découvrir les fondements de la validation de la sécurité et d’acquérir des connaissances pour répondre à des questions telles que :

    - Ai-je confiance dans l'efficacité de mes contrôles de sécurité ?
    - Puis-je évaluer rapidement la pertinence des informations sur les menaces ou l'exposition à la dernière attaque ?
    - Suis-je capable d'arrêter la perte de données et de protéger l'intégrité des données sur mon réseau ?
    - Comment simplifier et standardiser mon architecture de sécurité ?
    - Ai-je les bonnes éléments quantifiables pour communiquer les chiffres clés aux dirigeants de mon entreprise ?

    S’inscrire maintenant!
  • How to maintain cyber hygiene - from root cause to solution Recorded: Jun 2 2020 47 mins
    David Grout, CTO, EMEA, FireEye
    In today's ever-changing threat landscape, it is more important than ever to use a cyber hygiene routine to help prevent hackers, intelligent malware, and advanced viruses from accessing and corrupting your company's data.

    How do validate that your cyber strategy is as watertight as it could be. In this webinar you will learn about FireEye Mandiant solutions to efficiently help you maintain an on-going process to combat configuration drift, effective control, rationalisation and optimisation.
  • Endpoint & Network: una visibilità completa in continua evoluzione Recorded: May 28 2020 64 mins
    Gabriele Zanoni, Solution Architect, EMEA, FireEye
    FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione. Scopri la tecnologia premiata dai test del MITRE.

    Il Webinar “FireEye Endpoint & Network: una visibilità completa per architetture in continua evoluzione” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Avere la possibilità di individuare i movimenti di un aggressore nel minor tempo possibile è la chiave per minimizzare gli impatti di un possibile incidente informatico. Le soluzioni di FireEye Endpoint & Network security integrano nativamente un sistema di condivisione degli Indicatori di Compromissione che permette di massimizzare la visibilità degli attacchi.
    Ad esempio, i Movimenti Laterali spesso compiuti tramite programmi di “Shadow IT” possono essere una delle ragioni a causa delle quali il tempo di identificazione di un attacco - il così detto Dwell Time - risulti particolarmente elevato: FireEye permette di ottenere una piena visibilità di tutte le fasi di un attacco, compresa appunto la fase dei Movimenti Laterali - sicuramente una delle più complesse da identificare. Inoltre, le informazioni di Threat Intelligence, integrate nelle soluzioni FireEye, permettono di capire rapidamente quali sono quegli incidenti a cui è assolutamente necessario dare seguito in tempi brevi. I test del MITRE, condotti simulando una compromissione Nation-State con le Tecniche Tattiche e Procedure (TTP) del gruppo APT29, hanno recentemente assegnato a FireEye il livello di punteggio più alto in termini di identificazione rispetto a tutti i gli atri competitor.
    In questo Webinar vedremo come i sistemi Endpoint e Network di FireEye possano mettere in sicurezza le più diverse architetture e sistemi.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • Integrating Better Intelligence for Better Security Recorded: May 27 2020 50 mins
    James Graham, Sr. PMM, FireEye ; Jeff Guilfoyle, CISSP, Solution Architect, FireEye; Finian Mackin, Sr. PM, Anomali
    Anomali and FireEye Mandiant Threat Intelligence: Integrating Better Intelligence for Better Security

    As attackers grow more resourceful and effective in their efforts to expose and compromise users and their data, it is becoming more important than ever to integrate effective cyber threat intelligence to drive better detection and apply added context to potential threats. Anomali’s addition of FireEye Mandiant Threat Intelligence to its App Store presents a scalable way to integrate industry-leading threat intelligence into your security systems and program.

    Join experts from FireEye and Anomali for a panel discussion surrounding the value of cyber threat intelligence, the need for increased integration of intelligence to drive better security, and the added value that a combined Anomali-FireEye solution can provide.​

    Register Now!
  • How do you gain cyber assurance? Recorded: May 26 2020 41 mins
    Katherine Demidecka, Strategic Mandiant Consultant, FireEye
    This webinar will discuss how an organisation can gain assurance that it is prepared to defend against and respond to a cyber incident. The following key topics will be covered:

    •Securing your environment proportionate to the risk
    •Readiness to identify and respond to an attacker's presence quickly
    •Testing your defences and response plans through simulated attacks
  • Navigating MAZE: Analysis of a Rising Ransomware Threat Recorded: May 21 2020 58 mins
    Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence & Jeremy Kennelly, Manager, Mandiant Threat Intelligence
    The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.

    Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.

    In this exclusive webinar, attendees will learn about:
    •Common intrusion vectors across MAZE ransomware incidents
    •Actors’ reliance upon open-source and commercially available attack tools
    •Data exfiltration techniques present across most MAZE ransomware incidents
  • Gestire la cybersecurity durante il lockdown: lo scenario delle minacce Recorded: May 21 2020 58 mins
    Gabriele Zanoni, EMEA Solutions Architect, FireEye
    Il Webinar “Gestire la cybersecurity durante il lockdown: lo scenario delle minacce nel contesto del COVID-19” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Gabriele Zanoni ci parlerà del New Normal: cosa vuol dire oggi lavorare direttamente sul campo. A supporto fornirà esempi e trend di mercato.
    Quali sono le sfide che oggi stiamo affrontando lavorando da casa, da un punto di vista sia individuale sia aziendale. Come possiamo relazionarci meglio con i nostri team e unire gli sforzi per lottare contro le sfide informatiche. Dobbiamo alzare il livello di attenzione al rischio, dobbiamo adattarci alle nuove minacce emergenti?
    Durante questo webinar, Gabriele Zanoni condividerà quali sono le sfide attuali dovute ai continui attacchi phishing, come ottenere una prospettiva generale sullo stato della sicurezza cyber della propria organizzazione, anche lavorando da casa, cosa cercare in modo specifico e, infine, come gestire gli incidenti una volta che rilevati.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • 2020 Mandiant Security Effectiveness Report Findings Recorded: May 19 2020 60 mins
    Matt Hartley SVP Mandiant Strategy for FireEye Mandiant & Devon Goforth Sr Dir Security Instrumentation for FireEye Mandiant
    2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality

    Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

    The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.

    Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:

    - Do I have confidence in the effectiveness of my security controls?
    - Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
    - Am I stopping data leakage and protecting data integrity?
    - How can I simplify and standardize my security stack?
    - Do I have evidence to support communicating key metrics to executives?

    Register Now to Reserve Your Seat!
  • Security Effectiveness Strategies: Validate and Improve Your Security Posture Recorded: May 19 2020 61 mins
    Mike Batten - VP Sales Engineering EMEA, FireEye
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    - view the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now
  • Security Effectiveness Strategies Recorded: May 13 2020 59 mins
    General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Intel Consulting
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

    Register Now
  • FireEye Virtual Briefing - Afternoon Track Recorded: May 12 2020 95 mins
    Various
    CYBER RISK AND SECURITY EFFECTIVENESS IN THE DIGITAL AGE

    M-TRENDS 2020: INSIGHTS INTO TODAY'S MOST IMPACTFUL CYBER ATTACKS
    Time: 15:00 - 15:30 (CET) - 14:00 - 14:30 (BST)
    Speaker: Ron Bushar, SVP and Government CTO

    In this session you will get all the highlights from our M-Trends Report, including all the data collected from Mandiant’s investigation and Managed Defense customers in 2019. It will give you a clear understanding of the trends and risks we are confronted with and the mitigation techniques and plans you can put in place in your organization.

    COMPREHENSIVE CLOUD MONITORING AND THREAT DETECTION FOR CLOUD
    Time: 15:30 - 16:00 (CET) - 14:30 - 15:00 (BST)
    Speaker: Martin Holste, CTO Cloud Security

    Centralise security & visibility management across cloud, hybrid-cloud, and multi-cloud environments is the new challenge for the entire industry. Discover how FireEye built a platform approach to help customers to reduce their cloud security risks.

    ALIGNING RISK MANAGEMENT WITH INCIDENT RESPONSE
    Time: 16:00 - 16:30 (CET) - 15:00 - 15:30 (BST)
    Speakers: Karen Kukoda, Senior Director, Strategic Alliances
    Ron Bushar, SVP and Government CTO

    FireEye Incident Response advise clients on incident-related communications — including executive communications, public relations and disclosure requirements. In this session learn how you can build a retainer into your risk strategy.
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation Recorded: May 12 2020 51 mins
    Lluis Coma, EMEA Consulting Systems Engineer, FireEye
    FireEye has developed a platform that allows you to accurately assess a company's security posture. With Mandiant Validation Solution, FireEye expands its capabilities by helping its clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Validation Solution enables you to:
    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT & CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The result can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • FireEye Briefing Virtuel - Sessions de l'après-midi Recorded: May 11 2020 108 mins
    Various
    LE CYBER-RISQUE ET L'EFFICIENCE DE LA SECURITÉ INFORMATIQUE À L'HEURE DU DIGITAL

    LA PERSPECTIVE DE MANDIANT SUR LES ACTEURS MAJEURS EN EUROPE
    15:00 - 15:40 (CET) - 14:00 - 14:40 (BST)
    Adrien Bataille, Senior Consultant, Mandiant Consulting

    Dans cette session, découvrez le retour d’expérience de l’un de nos consultants Mandiant, présent en première ligne chez le client pour la gestion de problèmes techniques ou encore la gestion de crise. FireEye enquête sur les brèches informatiques les plus élaborées et les plus complexes et partage ces investigations sur les groupes d’attaque, leurs techniques et outillages toujours en constante adaptation.

    SURVEILLANCE ET PROTECTION DES INFRASTRUCTURES HYBRIDES
    15:40 - 16:10 (CET) - 14:40 - 15:10 (BST)
    Martin Holste, CTO Cloud Security

    Les environnements Cloud deviennent un défi pour l’industrie toute entière. Découvrez comment FireEye a conçu une plateforme pour aider les clients à reduire les risques liés aux environnements cloud.

    LA GESTION DU RISQUE PENDANT UN INCIDENT
    16:10 - 16:40 (CET) - 15:10 - 15:40 (BST)
    Karen Kukoda, Senior Director, Strategic Alliances
    Ron Bushar, SVP and Government CTO

    Les équipes de répones à Incidents de FireEye accompagnent les clients pour la communication de crise comprenant la communication institutionelle, les relations publiques et le suivi des obligations de reporting (RGPD, CNIL …). Dans cette session, découvrez comment FireEye peut vous accompagner lors d’un incidents cyber dans la gestion de votre stratégie de gestion du risque.
  • FireEye Briefing Virtuel - Sessions du Matin Recorded: May 11 2020 96 mins
    Various
    LE CYBER-RISQUE ET L'EFFICIENCE DE LA SECURITÉ INFORMATIQUE À L'HEURE DU DIGITAL

    M-TRENDS 2020: INVESTIGATIONS AUTOUR DE CYBER ATTAQUES LES PLUS IMPACTANTES DE L'ANNÉE
    11:00 - 11:30 (CET) - 10:00 - 10:30 (BST)
    David Grout, CTO EMEA, FireEye

    Durant cette session, vous découvrirez les dernières études et investigations de notre rapport M-Trends, réalisées par nos consultants Mandiant et basées sur les retours d’expériences de nos clients en 2019. Vous aurez ainsi une meilleure compréhension des tendances d’attaque et des risques auxquels vous pourriez être confrontés ainsi que des techniques pour y faire face au mieux.

    COMPRENDRE ET COMMUNIQUER LA SÉCURITÉ INFORMATIQUE AVEC DES DONNÉES QUANTIFIABLES ET VÉRIFIABLES
    11:30 - 12:00 (CET) - 10:30 - 11:00 (BST)
    Lluis Coma, EMEA Consulting Sales Engineer

    Les attaques les plus spectaculaires de 2020 sont presque derrière nous ! Celles de 2021, quant à elles, sont en cours de préparation ! Comment savoir si nous sommes à risque ou en sécurité ? Découvrez comment mesurer et évaluer votre sécurité informatique grâce à une approche basée sur l’intelligence.

    COMMENT L'INTELLIGENCE VOUS PERMET DE PRIORITISER LE PATCHING DE VULNÉRABILITÉS
    12:00 - 12:30 (CET) - 11:00 - 11:30 (BST)
    Alexis Bourbion, Sales Consultant, Southern Europe

    Toute entreprise compte des centaines voire des milliers d’applications au service de ses clients. Comment être certains d’éviter tout risque d’attaques cyber ? Dans cette session, découvrez comment la Threat Intelligence vous aide à comprendre, à anticiper et à prioriser vos efforts face aux risques d’exploitation de failles par des attaquants.
  • Intelligence Led Threat Protection For SaaS-Mobile Environments Recorded: May 6 2020 60 mins
    Rob Ayoub, Sr. Product Marketing Manager, FireEye; Salah Nassar, VP of Marketing, CipherCloud, Inc.
    The continued migration to the cloud and the unprecedented rise in the number of employees working from home has created challenging security implications, leaving many organizations scrambling to gain needed visibility and control into their SaaS/Cloud usage. With employees working remotely, SOC teams need to see threats wherever their companies do business and the ability to reduce those threats as quickly as possible.

    In this webinar, we will discuss how FireEye’s detection capabilities can be combined with CipherCloud to stop malicious content from being shared.

    Register Now!
  • Top 5 Cloud Security Myths Debunked Recorded: May 5 2020 55 mins
    Martin Holste, CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Threat Intelligence Drives Effective Vulnerability Management Recorded: Apr 30 2020 57 mins
    Jared Semrau, Sr. Mgr.,Vulnerability and Exploitation, Mandiant; Kathleen Metrick, Analyst, Strategic Intelligence, Mandiant
    Organizations value cyber threat intelligence (CTI) because it helps their security teams stay focused on, and stay ahead of, the most impactful threats. One of the critical strategic and tactical roles that CTI plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk.

    Join us to hear FireEye Threat Intelligence experts, Jared Semrau and Kathleen Metrick share:
    • The importance of comprehensive CTI to drive better-informed vulnerability management decisions
    • Insight into how FireEye tracks, prioritizes and categorizes vulnerabilities to help organizations more effectively manage and mitigate the risks associated with these potential threats
    • The latest research findings around the speed and frequency of exploitation

    Register for the webinar
  • Defensive Security Techniques You Can Use Now Recorded: Apr 28 2020 59 mins
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennett and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • M-Trends 2020: Información sobre los últimos ciberataques Recorded: Apr 21 2020 56 mins
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye & Jonathan Rendal – Consulting Sales Engineer, Iberia, FireEye
    Proteja a su organización contra los ataques más peligrosos. Acompañe a nuestros expertos de FireEye Mandiant, en el análisis de las ultimas técnicas y las motivaciones de estos grupos de ciberdelincuentes, asi como el impacto que han tenido los ataques mas relevantes durante el ultimo año.

    Regístrese en el Webinar que se realizara el próximo martes 21 de abril a las 12:30, en el cual los expertos de FireEye Mandiant presentaran los ciberataques mas destacados, que aparecen en nuestro ultimo informe M-Trends 2020:

    - Perspectivas globales sobre los ataques frecuentes y cómo combatirlos;
    - Detalles sobre los grupos de ciberdelincuentes más activos en 2019;
    - Tendencias de la evolucion del malware;
    - El auge de “malicious insiders”;
    - Conocimientos de las investigaciones en la nube, junto con debilidades comunes y mejores prácticas para evitar ser la próxima víctima;
    - Casos prácticos con lecciones de seguridad prácticas.

    ¡INSCRÍBETE AL WEBINAR!
Technology, Intelligence and Expertise
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,700 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Cyber Skills Gap: A Practitioner’s Perspective
  • Live at: Jun 19 2019 6:00 pm
  • Presented by: Stanley Parret, Principal Consultant, FireEye Managed Defense
  • From:
Your email has been sent.
or close