Hi [[ session.user.profile.firstName ]]

How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

-MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
-Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
-Impact of environmental drift on your security posture and how to plan for it
-Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

Register Now>>
Recorded Jun 9 2020 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
Presentation preview: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
  • Channel
  • Channel profile
  • Validate Security Performance to Rationalize Investments Sep 29 2020 9:00 am UTC 51 mins
    General Earl Matthews, VP of Strategy for Mandiant Security Validation
    Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

    In this session, led by General Earl Matthews, VP of Strategy for Mandiant Security Validation, you can learn:

    - Best practices for investment prioritization when it comes to hiring, training and security solution procurement
    - How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
    - Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
  • Threat Intelligence Drives Effective Vulnerability Management Sep 22 2020 9:00 am UTC 60 mins
    Jens Monrad, Head of Mandiant Threat Intelligence EMEA
    Organisations value cyber threat intelligence (CTI) because it helps their security teams stay focused on, and stay ahead of, the most impactful threats. One of the critical strategic and tactical roles that CTI plays is in the tracking, analysis, and prioritisation of software vulnerabilities that could potentially put an organisation’s data, employees and customers at risk.

    Join us to hear FireEye Threat Intelligence expert, Jens Monrad as he shares:

    • The importance of comprehensive CTI to drive better-informed vulnerability management decisions
    • Insight into how FireEye tracks, prioritises and categorises vulnerabilities to help organisations more effectively manage and mitigate the risks associated with these potential threats
    • The latest research findings around the speed and frequency of exploitationRegister for the webinar
  • A Red Teaming Case Study Sep 15 2020 9:00 am UTC 41 mins
    Vivek Chudgar, Sr. Director - Mandiant Consulting
    Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
    This session reviews a red team case study in which an objective-based assessment involved emulating the activities of an advanced, nation state attacker across the entire attack lifecycle. Come learn valuable insights from how one organization dealt with genuine attack conditions.
  • Threat Intel for Computer Network Defence, Focus on Iran Sep 8 2020 9:00 am UTC 60 mins
    Dan Caban, Manager Professional Services Consulting, Mandiant
    Operationalising Cyber Threat Intelligence (CTI) helps mitigate risk by focusing people, processes, and technology on the threat activity that matters. Above all, it allows organisations to take a more proactive, structured, and holistic approach to security that reduces dwell time and shortens the time frame from detection to remediation. In today's dynamic threat environment, CTI it is critical to ensure you have an understanding of the adversaries you are hunting for and responding to.

    Join us as we look specifically at how cyber threat intelligence can help improve computer network defence (CND) operations. Our experts will share:

    • A review of FireEye’s Iranian relevant threat intelligence
    • Case studies that:
    •will provide examples of how Mandiant incident response consultants operationalise threat intelligence when responding to intrusions
    • will examine how operators can pivot from intelligence reporting to high confidence alerting and targeted threat hunting
    • Along with the MITRE ATT&CK framework to help decision makers improve their overall network security posture by prioritising security investments based on adversary capabilities
    • How intelligence enhances your overall cyber security investment and places your operations ahead of the threat
  • Enhance Your Security Posture with Managed Defense Aug 25 2020 9:00 am UTC 60 mins
    Billy Glynn, Principle Consultant Managed Defence
    Organisations today remain reliant on reactive, technology based, security solutions to protect their most valuable assets. The problem is that technology alone does not fully protect against a determined attacker.Unfortunately, it's difficult and costly to find, hire, train and retain security experts to protect against threats 24x7x365.

    The shortage of cybersecurity workers continues to be a major concern. Unfilled cybersecurity jobs are expected to reach 1.8 million by 2022, up 20% from 1.5 million in 2015, according to the Center for Cyber Safety and Education.

    FireEye Managed Defence is an expert driven managed detection and response service that provides 24 x 7 protection against threats, combining front line experience with industry leading technology and intelligence to detect threats early and help prevent a security incident.In this webinar, you'll hear from Billy Glynn, Principle Consultant, Managed Defence, as he discusses:

    -The benefits of Managed Detection and Response (MDR)
    -How Managed Defence can augment your security team
    -A Day in the Life of a Managed Defence Consultant
    -Hear real world examples and stories from the trenches
  • Ransomware Trends with A Focus on MAZE Aug 18 2020 9:00 am UTC 55 mins
    Steve Ledzian VP, CTO - APAC, FireEye
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
  • Modern Cyber Risk Management for Better Decision Making Aug 11 2020 9:00 am UTC 42 mins
    Matt Keane, Principal Consultant at FireEye Mandiant, & Jennifer Guzzetta, Product Marketing Manager at FireEye Mandiant
    Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk models, which leaves gaps between attacker and defender behaviors.

    Transformation of your risk management processes, plus the people behind them, can solve for this.

    Aligning your organization’s security efforts with the risk appetite of data owners and business leaders must become a priority.

    This webinar spotlights a transformational model that operationalizes security risk management to improve and optimize decision making by:

    •Identifying challenges in your current cyber risk management program
    •Establishing a modern cyber risk management strategy
    •Shifting the players and processes involved in your cybersecurity decision support
    •Integrating risk management priorities across the entire security function
    •Monitoring progress with the right kind of security metrics

    Join Matt Keane, Principal Consultant at FireEye Mandiant, for his expertise on transforming your security risk management approach by bridging the gap between vital security teams and improving their decision making.
  • An Intelligence Driven Approach to Security Validation Aug 4 2020 9:00 am UTC 56 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • Cloud Threats from the Frontlines Jul 28 2020 9:00 am UTC 60 mins
    John Hurley, Solutions Architect EMEA, FireEye & Thomas Scriven, Senior Mandiant Consultant
    For the last several years, organisations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organisations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.

    In this session, FireEye, EMEA Solutions Architect John Hurley shares lessons learned from real-world incident response experiences, as well as identifying some common pitfalls, whilst also providing best practices for organisations to harden their cloud environments and reduce the risk of compromise.
  • iBoss Cloud + FireEye - Cloud Network Security as a Service Jul 21 2020 9:00 am UTC 60 mins
    Simon Eappariello, Senior Vice President, EMEIA & APJ, iBoss
    The network perimeter has eroded, making traditional network security appliances ineffective at securing users and devices that are no longer bound by network boundaries. Built on a proprietary containerized architecture designed 100% for the cloud, iboss cloud secures Internet access from anywhere, including in and out of your physical network perimeter.Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense and data loss at all times. Since iboss cloud lives in the cloud, network security goes where users go with elastic and instant scaling to meet the demands of the cloud-first future.
  • ‘They Come in the Night’ Emerging Ransomware Threat Trends Jul 14 2020 9:00 am UTC 60 mins
    Jens Monrad, Head of Mandiant Threat Intelligence EMEA & Jay Christiansen Senior Consultant, FireEye Mandiant
    Ransomware is remote digital extortion. Disruptive and costly to address, it affects all kinds of organizations, from space technology firms to global manufacturers and industrial environments.

    FireEye Threat Intelligence research has uncovered an increasing number of common characteristics in ransomware attacks, including new trends in intrusion vectors, dwell time, deployment time of day and the use of additional tactics to increase leverage against victims.

    Join Threat Intelligence experts Kelli Vanderlee and Kimberly Goody, on Tuesday, March 31, 2020 at 8 a.m. PT/11 a.m. ET, to learn about the latest research and ask them critical questions. During this presentation, attendees will hear about:

    • The latest ransomware threats
    • Threat actor tactics
    • Ways to use this intelligence to defend your organization

    Register for the webinar
  • 2020 Mandiant Security Effectiveness Report Findings Jul 7 2020 9:00 am UTC 60 mins
    Lluis Coma, EMEA Consulting Systems Manager, FireEye
    2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality

    Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

    The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.

    Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:

    - Do I have confidence in the effectiveness of my security controls?
    - Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
    - Am I stopping data leakage and protecting data integrity?
    - How can I simplify and standardize my security stack?
    - Do I have evidence to support communicating key metrics to executives?

    Register Now to Reserve Your Seat!
  • Behind the Cyber Battlefield with a Mandiant Threat Intelligence Analyst Recorded: Jul 2 2020 66 mins
    Sanaz Yashar, Principal Cyber Analyst, Mandiant Threat Intelligence & David Grout, EMEA CTO, FireEye
    Cyber threat intelligence (CTI), IOCs, reports and feeds all contribute to stronger cyber visibility. But CTI holds a unique position and can be consumed operationally to enhance your security posture.

    Join us as a Mandiant cyber threat analyst discusses her experiences from the cyber frontlines. She introduces real life examples of analyst personalities, their day-to-day activities and the value they add to customer interactions.
  • Cloud : Détectez et évaluez les menaces avec Keysight et FireEye Recorded: Jul 2 2020 53 mins
    Arnaud Garnier - Senior Sales Engineer, FireEye & Gustavo Amador Nieto - Master Sales Engineer, Keysight
    Participez au webinar FireEye/Keysight qui aura lieu le 2 juillet de 9h00 à 10h00.

    Comment détecter les menaces en temps réel ? Comment optimiser l’analyse Forensics ?

    Grâce à ce webinar, découvrez la puissance de la visibilité réseau avancée et apprenez comment grâce aux solutions FireEye et Keysight vous pouvez :

    •Détecter les menaces et agir plus rapidement
    •Obtenir une visibilité complète sur votre réseau, vos environnements
    Cloud hybrides et le fonctionnement de votre organisation
    •Fournir de meilleures données aux équipes Forensics

    Inscrivez-vous dès maintenant.
  • The Outcome of Well-Used Intelligence Recorded: Jul 1 2020 66 mins
    Jens Monrad, Head of Mandiant Threat Intelligence, EMEA & David Grout, EMEA CTO, FireEye
    Cyber Threat Intelligence is a vital component in understanding the current and future threat landscape. But how can organizations make better use of it? What are some of the common pitfalls and how can organizations expand usage across the entire organization?
  • Breach Response Series - Part 3: Reduce the impact of security incidents Recorded: Jun 30 2020 48 mins
    David Grout, CTO, EMEA, FireEye
    The ability to respond to cyber attacks remains the greatest strength. This webinar discusses ways you can evaluate your organisation’s ability to respond effectively to advanced attackers and business impacting malware, such as ransomware.
  • Sharpen your ICS Security Edge with Better Visibility Recorded: Jun 29 2020 57 mins
    Moath Sakaji - Mandiant Lead ICS/OT Security, MEA, FireEye & Jean Abbal - Technical Sales Lead, MENA, Nozomi Networks
    How is IT/OT cybersecurity convergence key in detecting APT activities?

    Join Moath Sakaji, Mandiant Lead ICS/OT Security Consultant MEA, FireEye and Jean Abbal, Technical Sales Lead, MENA, Nozomi Networks as they discuss how OT/IT convergence can be overlooked in security monitoring and visibility programs.

    Key takeaways from the session will include:

    - Understand the escalation of cyber-physical attack capabilities and the OT attack surface.
    - Ensure IT/OT convergence is not overlooked in your OT visibility capabilities.
    - Understand how Triton and Industroyer malwares had exploited an overlooked IT/OT-converging cybersecurity to compromise systems.
    - A comparison of IT and OT sample attacks key tactics, techniques and procedures.
    - Understand the role of OT monitoring visibility in security programs.

    Register today!
  • La Cyber Threat Intelligence per una gestione efficace delle vulnerabilità Recorded: Jun 25 2020 39 mins
    Gabriele Zanoni, Solution Architect, EMEA, FireEye, James Lee Hovious - Senior Analyst, FireEye Mandiant
    Il Webinar “La Cyber Threat Intelligence per una gestione efficace delle vulnerabilità” fa parte di una serie di incontri settimanali intitolati: #FireEyeCyberTalks. Si terranno ogni giovedì, dal 21 maggio al 18 giugno, e ti offriranno contenuti stimolanti e approfondimenti da parte dei nostri esperti.

    Le aziende si affidano alla Cyber Threat Intelligence (CTI) perché aiuta i team di sicurezza a restare focalizzati e aggiornati sulle minacce più pericolose. La CTI occupa un ruolo particolarmente strategico e tattico nel monitorare, analizzare e attribuire priorità alla gestione delle vulnerabilità del software che potrebbero potenzialmente mettere a rischio i dati, i dipendenti e i clienti di un'azienda.
    Unisciti a noi per ascoltare gli esperti di FireEye Threat Intelligence, James Lee Hovious e Gabriele Zanoni, i quali condivideranno:
    • l'importanza di una CTI per essere informati e prendere decisioni migliori nella gestione delle vulnerabilità;
    • informazioni utili su come FireEye tiene traccia, assegna le priorità e classifica le vulnerabilità per aiutare le organizzazioni a gestire e mitigare i rischi associati a queste potenziali minacce;
    • le ultime analisi in merito a velocità e frequenza degli exploit.

    Prenota il tuo posto oggi #FireEyeCyberTalks
  • Breach Response Series - Part 2: TIBER-EU - Increasing Cyber Resilience Recorded: Jun 23 2020 51 mins
    Nathan Martz, Principle Strategic Consultant FireEye Mandiant and Jay Christiansen, Principle Consultant, FireEye Mandiant
    The Framework for Threat Intelligence-based Ethical Red Teaming (TIBER-EU) enables European and national authorities to work with financial infrastructures and institutions to put in place a programme to test and improve their resilience against sophisticated cyber-attacks. Among the core objectives of TIBER-EU are improving the protection, detection and response capabilities of entities, enhancing the resilience of the financial sector; and providing assurance to the authorities about the cyber resilience capabilities of the entities under their responsibility.

    Join FireEye Mandiant Senior Consultant Angelo Perniola and Principal Consultant Jay Christiansen to:

    -Understand how the TIBER scheme aims to improve Financial Service organisations resilience to advanced persistent threats by conducting Red Team Operations leveraging cyber threat intelligence and targeted attack scenarios that focus on high value targets and assets.
    -Gain insight into how FireEye Mandiant leverages its world-leading Threat Intelligence and Incident Response capabilities to understand attackers and their modus operandi in order to identify the most relevant attack scenarios in line with threats such as ransomware, SWIFT frauds and Customer PII leaks.
    -See how the Mandiant Red Team uses the compiled intel, in the form of a Targeted Threat Intelligence Report, to create attack plans and risk management trackers for the engagement, as well as how they carry out the stealthy TIBER cyber-attacks using tools and techniques mapped against MITRE ATT&CK framework and each APT’s specific capabilities
    -Understand how all the pieces fit together to create and end-to-end test and what deliverables can be expected from Mandiant in terms of root cause analysis of issues, strategic recommendations, technical findings and analysis, as well as follow on opportunities for collaboration with the client tech teams in the Purple Team and Security Validation follow-ons.
  • Mandiant: resultados del Informe de Efectividad de Seguridad 2020 Recorded: Jun 18 2020 64 mins
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye
    Mandiant: resultados del Informe de Eficiencia de la Seguridad 2020,
    una visión completa de la situación actual

    En nuestro Webinar, le mostraremos como gran parte de los ataques consiguen comprometer la seguridad de las empresas, y por qué los sistemas de seguridad no consiguen detectarlos a tiempo.

    Los resultados del Informe confirman la preocupación creciente ya de que muchos controles de seguridad no son efectivos, dado que tras realizar miles de pruebas en diferentes compañías. El equipo de especialistas de Mandiant constata que, en el 53% de los entornos evaluados, los ataques no solo tuvieron éxito, si no que estos no fueron detectados a tiempo. Es por ello que la validación continua de la efectividad de los elementos de seguridad pasa a ser una tarea critica para un entorno de protección eficiente.

    Regístrese en el Webinar, que se realizará el próximo jueves 18 de junio a las 13:00h, para conocer cuales son los pilares de la validación continua de la seguridad, y como puede optimizar su entorno de protección.
    Esta sesión le ayudara a responder a las siguientes preguntas:

    ¿Confió plenamente en la efectividad de mi seguridad corporativa?
    ¿Puedo evaluar el estado de mi entorno ante las nuevas amenazas?
    ¿Esta mi plataforma preparada para evitar la pérdida de datos?
    ¿Puedo optimizar la comunicación entre los elementos de seguridad?
    ¿Dispongo de datos y métricas para justificar la eficiencia del entorno?

    ¡Inscríbete al Webinar!
Technology, Intelligence and Expertise
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,700 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness
  • Live at: Jun 9 2020 4:00 pm
  • Presented by: Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
  • From:
Your email has been sent.
or close