Hi [[ session.user.profile.firstName ]]

Security Without Barriers: How to Adopt, Implement, and Measure Cyber Resilience

Adoption of cloud computing, an increasingly remote workforce and more reliance on mobile devices to access enterprise applications has radically changed how technology is deployed and used. Organizations need to protect their digital assets with strategies that evolve to support changing conditions.
Attend this session to learn how a cyber resilience strategy can help protect your organization, as well as how you can explain the new cyber security landscape to your stakeholders.
Topics include:
• How cyber resilience can better protect your assets whenever and wherever your users require access
• How to maintain an open and collaborative environment while still meeting security needs
• How you can explain your security program goals to stakeholders
Live online Jun 10 5:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Schreiber, Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
Presentation preview: Security Without Barriers: How to Adopt, Implement, and Measure Cyber Resilience
  • Channel
  • Channel profile
  • Validate Security Performance to Rationalize Investments Jun 11 2020 8:00 pm UTC 60 mins
    General Earl Matthews, VP of Strategy for Mandiant Security Validation
    Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

    In this session, led by General Earl Matthews, VP of Strategy for Mandiant Security Validation, you can learn:

    - Best practices for investment prioritization when it comes to hiring, training and security solution procurement
    - How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
    - Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
  • A Red Teaming Case Study Jun 11 2020 6:00 am UTC 60 mins
    Vivek Chudgar, Sr. Director - Mandiant Consulting
    Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
    This session reviews a red team case study in which an objective-based assessment involved emulating the activities of an advanced, nation state attacker across the entire attack lifecycle. Come learn valuable insights from how one organization dealt with genuine attack conditions.
  • FireEye Endpoint Security War Story Jun 11 2020 2:00 am UTC 60 mins
    Anthony Ng, Vice President of Systems Engineering, APAC
    When Mandiant respond to a breach they need equally elite weapons to facilitate their response. This war story will look at how Mandiant Incident Responders fought off APT38 using some of the more sophisticated functions of FireEye Endpoint Security.
  • Proactive Cyber Crime Defense Through Public-Private Partnerships Jun 10 2020 9:00 pm UTC 60 mins
    Tim Wellsmore, head of Mandiant government programs across Asia Pacific and Japan
    Cyber crime has redefined security operations for governments and the private sector. A continually evolving threat environment means cyber crime is growing in both scale and diversity. Public and private organizations must shed any pre-disposed focus on cyber espionage to adopt a proactive, intelligence led mission.

    Tim Wellsmore, head of Mandiant government programs across Asia Pacific and Japan, helps Australia manage national efforts on financially motivated cyber security threats and related cyber intelligence collection. In this session, he’ll:

    - Examine an intelligence led model for uplifting government cyber defense operations to counter cyber crime threat activity.
    - Show you how the private sector can uniquely support governments as they implement a proactive intelligence-led cyber mission.-
    - Deliver insights on the tactics and methods cyber criminals use against both public and private sector organizations.
  • Leveraging Security Validation to Operationalize Threat Intelligence Jun 10 2020 8:00 pm UTC 60 mins
    Henry Peltokangas, Director of Product, Mandiant Security Validation & Jeffrey Berg, Sr. Director​, Mandiant Threat Intel
    When optimizing security defenses, organizations need to know as much as possible about today’s attacks and threat actors to protect critical systems, data and users against likely attack scenarios.   Cyber threat intelligence can give organizations rich context on the threat landscape to bolster security effectiveness testing that can identify gaps in security controls before incidents occur.

    In this session, Mandiant security experts discuss the use of threat intelligence and security validation to understand who might attack, where organizations are most vulnerable, and how to respond. You’ll hear about:

    - The value of cyber threat intelligence to proactively identify the latest and most sophisticated threats and support strategic decisions
    - The importance of automatic and routine controls testing against the latest attack behaviors
    - How security effectiveness validation and cyber threat intelligence can help rationalize security investments, align business and security programs and best equip security teams to defend against adversaries.
  • Modern Cyber Risk Management for Better Decision Making Jun 10 2020 6:00 pm UTC 60 mins
    Matt Keane, Principal Consultant at FireEye Mandiant, & Jennifer Guzzetta, Product Marketing Manager at FireEye Mandiant
    Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk models, which leaves gaps between attacker and defender behaviors.

    Transformation of your risk management processes, plus the people behind them, can solve for this.

    Aligning your organization’s security efforts with the risk appetite of data owners and business leaders must become a priority.

    This webinar spotlights a transformational model that operationalizes security risk management to improve and optimize decision making by:

    •Identifying challenges in your current cyber risk management program
    •Establishing a modern cyber risk management strategy
    •Shifting the players and processes involved in your cybersecurity decision support
    •Integrating risk management priorities across the entire security function
    •Monitoring progress with the right kind of security metrics

    Join Matt Keane, Principal Consultant at FireEye Mandiant, for his expertise on transforming your security risk management approach by bridging the gap between vital security teams and improving their decision making.
  • Security Without Barriers: How to Adopt, Implement, and Measure Cyber Resilience Jun 10 2020 5:00 pm UTC 60 mins
    Chris Schreiber, Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
    Adoption of cloud computing, an increasingly remote workforce and more reliance on mobile devices to access enterprise applications has radically changed how technology is deployed and used. Organizations need to protect their digital assets with strategies that evolve to support changing conditions.
    Attend this session to learn how a cyber resilience strategy can help protect your organization, as well as how you can explain the new cyber security landscape to your stakeholders.
    Topics include:
    • How cyber resilience can better protect your assets whenever and wherever your users require access
    • How to maintain an open and collaborative environment while still meeting security needs
    • How you can explain your security program goals to stakeholders
  • Held Hostage by Ransomware: One City’s Story Jun 10 2020 4:00 pm UTC 60 mins
    Stephen Schommer, CISO, City of Sammamish & Shelly Tzoumas, Sr. Product Marketing Manager, Mandiant
    In the security community, stories are how we warn, educate and inform one another, if only so others will learn from and avoid the same mistakes. Because ransomware has seen such a resurgence in recent years, almost everyone has a ransomware story to tell, but very few are willing to share details about their trials so that others might be more fortunate.

    Join Stephen Schommer from the City of Sammamish, Washington as he recounts past ransomware experiences, and provides insights and advice to better prepare for and navigate this all-too-common cyber security horror story. Attendees can ask questions after the presentation.
  • Election Protection: Real World Guidance and Best Practices Jun 10 2020 3:00 pm UTC 60 mins
    Ron Bushar, Sr. Vice President & CTO - Government Solutions, FireEye, Ben Woolsey, Manager, Mandiant Services
    Election security is a top concern for national and local governments across the world. With real-world experience from the frontlines of cyber attacks, our experts share hard-won guidance on strategies to reinforce elections infrastructure against malicious cyber activity.
    Join us to learn best practices and get frontline insights into how officials at all levels should address the threats to election security. We will share the current threat landscape and best practices to address the challenges.
  • Get Your Data Protection Ahead of Impending Threats Jun 10 2020 2:00 pm UTC 60 mins
    Vinoo Thomas, Product Line Manager, FireEye
    With new attack vectors and application exploits being discovered, legacy endpoint protection products cannot keep up. They leave your data, information and intellectual property at risk. Endpoint protection (EPP) and detection and response (EDR) needs to evolve with the emerging threats and threat vectors.

    Join Vinoo Thomas, Product Line Manager, for Endpoint, at FireEye, as he shares how a new model for an endpoint defense agent can keep up keep pace and match wits with the evolving threats using the knowledge of the industry-leading incident response teams.

    Register Now.
  • Ransomware Trends with A Focus on MAZE Jun 10 2020 2:30 am UTC 60 mins
    Steve Ledzian VP, CTO - APAC, FireEye
    Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and more importantly, what you can do about it. Come learn how to can gain some control your next ransomware experience.
  • Considerations for Evolving to Intelligence-Led Security Jun 9 2020 8:00 pm UTC 60 mins
    Gina Hill, Principle Consultant, Mandiant & Duke McDonald, Consultant, Mandiant
    An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. Ultimately, organizations need to be able to understand the return on their threat intelligence investments.

    Mandiant Threat Intelligence experts Gina Hill and Duke McDonald present an in-depth explanation of what it means to be intelligence-led, how organizations should seek to increase intelligence maturity and capability, and how to get started on this journey.

    Join this session to learn:
    • The definition, characteristics and caveats of an intelligence-led security approach
    • Things to consider when assessing and evolving intelligence maturity
    • The importance of frameworks when assessing, measuring and executing on your strategy

    Register Now
  • Proactive Solutions to Stop Modern Ransomware in its Tracks Jun 9 2020 7:00 pm UTC 60 mins
    Nader Zaveri, Incident Response Mgr; Matt Bromiley, Principal Consultant; Kimberly Goody, Threat Intelligence Sr. Mgr.
    Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require organizations to apply a holistic security risk mitigation strategy from the C-suite to practitioners.

    This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:

    • Learn modern ransomware trends and attacker behaviors observed on the frontlines
    • Realize why proactive assessment is critical when preparing for and preventing ransomware
    • Understand how threat intelligence, hunting, and response provides the decision support and detection needed to outmaneuver ransomware actors
    • Implement effective mitigation strategies to stop ransomware attackers in their tracks

    Register today to join Nader Zaveri – Incident Response Manager, Matt Bromiley – Managed Defense Principal Consultant, and Kimberly Goody – Threat Intelligence Senior Manager, as they provide expert insights on modern-day ransomware attacks and how best to mitigate them.
  • Tips for Securing Your Cloud Environments Jun 9 2020 5:00 pm UTC 60 mins
    Chris Romano, Mandiant Senior Consultant and Greg Blaum, Mandiant Principal Consultant
    For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye Mandiant experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.

    In this session, Mandiant consultants Greg Blaum and Chris Romano share lessons learned from real-world incident response experiences, identify some common pitfalls and provide best practices for organizations to harden their cloud environments and reduce the risk of compromise. They also discuss the pitfalls and best practices presented in M-Trends 2020.
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness Jun 9 2020 4:00 pm UTC 60 mins
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    -MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    -Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    -Impact of environmental drift on your security posture and how to plan for it
    -Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>
  • Take Control of Your Cloud Environments Jun 9 2020 3:00 pm UTC 60 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • Intelligence-Driven Security Validation: Why Cyber Security needs Validation. Jun 9 2020 2:00 am UTC 60 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lacked the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high cost of their defenses.
    Security validation helps organizations validate and consolidate their existing security investments before throwing more tools at the problem. And by integrating and operationalizing threat intelligence, organizations can develop an effective, highly scalable security posture. During this session, you can learn how to achieve a more efficient, effective and future-proof security program through security validation.
  • Navigating MAZE: Analysis of a Rising Ransomware Threat Recorded: May 21 2020 58 mins
    Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence & Jeremy Kennelly, Manager, Mandiant Threat Intelligence
    The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.

    Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.

    In this exclusive webinar, attendees will learn about:
    •Common intrusion vectors across MAZE ransomware incidents
    •Actors’ reliance upon open-source and commercially available attack tools
    •Data exfiltration techniques present across most MAZE ransomware incidents
  • Security without Barriers: Enabling Secure Remote Access for Your Campus Recorded: May 19 2020 61 mins
    Randy MarchanyUniversity IT Security Officer, Virginia Tech Christian Schreiber, Higher Education Cybersecurity Lead, FireEye
    The sudden shift to remote working and online learning has radically changed how technology is deployed and used. Institutions must continue protecting their digital assets, but their strategies must evolve to support this new reality. This means reevaluating goals and standards of success when it comes to cybersecurity.

    Attend this webinar with an IT security leader from Virginia Tech and a higher ed cybersecurity expert from FireEye for a discussion on how to adapt a college or university cybersecurity strategy to this new environment, and how to explain the new cybersecurity landscape to your stakeholders.

    Topics will include:
    •How implementing cyber resilience and a Zero Trust framework can better protect your assets whenever and wherever they are
    •Key considerations before implementing and adopting a mobile ID credential
    •New ways to explain your security program goals to stakeholders

    Featured speakers:
    Randy MarchanyUniversity IT Security Officer, Virginia Tech
    Christian Schreiber, Higher Education Cybersecurity Lead, FireEye

    This event is sponsored by FireEye & hosted by University Business
  • Part 2: Security and Visibility for a Multi-Cloud World Recorded: May 15 2020 58 mins
    JR Wikes, FireEye Principal Systems Engineer, and Christopher Glidden, FireEye Solutions Architect
    Join us for part two of our security and visibility for a multi-cloud world webinar series, as we demonstrate Cloudvisory's capability to ensure visibility, compliance, and governance across multiple cloud environments.

    Cloudvisory solution is designed to provide:

    •Visibility into network data traffic for workloads, applications, and microservices
    •Ability to detect and remediate misconfigurations and malicious activities across multiple cloud providers
    •Compliance assurance standard benchmarks for CIS, PCI, HIPAA, GDPR, and compliance requirements
    •Ability to detect, alert, block, and quarantine attacks using cloud-native microsegmentation

    Save your seat today!

    Best Regards,

    The FireEye Team
FireEye Private Channel for Partners and Customers
FireEye Channel for Partners and Customers

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Without Barriers: How to Adopt, Implement, and Measure Cyber Resilience
  • Live at: Jun 10 2020 5:00 pm
  • Presented by: Chris Schreiber, Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
  • From:
Your email has been sent.
or close