Hi [[ session.user.profile.firstName ]]

Defending your OT Network: The Anatomy of a Cyber Attack

You’ve checked all the standard cyber security boxes, giving you a sense of security and a plan in place. The problem is – what if it’s a false sense of security? All of your planning has secured the information technology (IT) side, while at the same time your operational technology (OT) is left wide open.

While consolidation is happening, it’s still a dangerous gap that begs the questions:
•Are we doing enough to anticipate threats and prevent, detect, and quickly respond to cyber attacks?
•Do we know our OT environment and have we implemented adequate security measures to protect our most critical assets?
•Are we developing an intelligence driven, risk-based plan, timeline, and budget?
•Have we done a recent risk assessment and developed a plan to address known risks?
•Will we have a good explanation to give our leadership and constituents when attacks do happen?

Register now for this complimentary webinar to learn more on FireEye’s analysis of a cyber attack and how you can better prepare to defend your organization.

Have Questions? Contact Kerry Best at kerry.best@fireeye.com with your questions or to get connected with your FireEye expert.
Recorded Jun 3 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Neal Gay, Sr. Manager - Managed Defense, FireEye Daniel Kapellmann Zafra, Technical Analysis Manager, FireEye
Presentation preview: Defending your OT Network: The Anatomy of a Cyber Attack
  • Channel
  • Channel profile
  • Enter the arena, live the experience and discover how you will react Jun 2 2021 5:00 pm UTC 88 mins
    David Grout, CTO EMEA, FireEye & Gareth Grindal, Principal Security Consultant, Mandiant Consulting
    Combining our experience in the field with our in-depth knowledge of attackers and their techniques, we have built a unique, immersive and interactive session which challenges you to make the necessary key decisions during a cyber attack.

    During our Cyber Attack Simulation, attendees will be guided through the stages of a ransomware attack, whilst also receiving guidance around the decisions you may need to make. Will you pay, delay or ignore? Are you ready to take the risks and look at the possible outcomes? If yes, you cannot miss this session!
  • Ransomware: What Emulating Ransomware Groups Shows About Your Defenses May 26 2021 5:00 pm UTC 61 mins
    David Grout, CTO EMEA, Jay Christiansen, Principal Consultant, Red Team Operations, Mandiant Consulting
    One of the hardest questions to answer for any organization is “Could we actually detect a ransomware attack before it’s too late?” With attacker sophistication increasing all the time, there is no guarantee that the policies and plans of yesteryear will still work, nor that the products and automated detections will get there in time.
    The only way to know for sure is to learn from the worst and carry out a sophisticated cyber-attack wearing the mask of a ransomware group attacker. Using the unmatched Threat Intel, the FireEye Mandiant Red Team have been able to conduct such engagements using the tools and techniques of the world’s leading ransomware threat actors and find those spaces between the defensive dream and risk-filled reality that could cost you dearly.

    In this session, our experts reveal some of the results from these engagements which can be adopted into your ongoing security program.
  • Ransomware: The Ongoing Scourge May 19 2021 5:00 pm UTC 61 mins
    David Grout, CTO, EMEA, FireEye & Jamie Collier, Cyber Threat Intelligence Consultant, FireEye Mandiant
    Ransomware is disruptive and costly. Threat actor innovations have increased the potential damage of ransomware infections in recent years, and this trend shows no sign of slowing down. Financially motivated actors will continue to evolve their tactics to maximize the profit generated from successful ransomware attacks.

    Keeping abreast of the ransomware threat landscape is essential to ensure your organization’s defenses are effective. As a practitioner, you have plenty of opportunities to detect and block ransomware operations throughout the entire attack lifecycle if equipped with relevant insight.
    Join this session to learn more about the key ransomware trends, the ways organizations can proactively start bolstering their defenses and the added value of an intelligence-led approach.
  • Ransomware: Attackers' top choice for cyber extortion May 12 2021 5:00 pm UTC 61 mins
    Stuart McKenzie – Senior Vice President of Mandiant Consulting, EMEA, David Grout – EMEA CTO, FireEye
    Ransomware is one of the most active and profound threats facing organizations today across all industries and sizes. Years after WannaCry attacks impacted businesses across the globe, stealthy ransomware infections continue to dominate headlines and board discussions. The impact of a successful ransomware deployment includes both technical and non-technical challenges and can be crippling to an organization’s operations.

    Join our live Panel session where Stuart McKenzie, Senior Vice President of Mandiant Consulting, EMEA and David Grout, EMEA CTO, will be discussing business imperatives including:
    •Board awareness of the impact of ransomware
    •Direct and indirect financial implications for organizations
    •How best to alert, inform and brief the board?
    •The role of senior IT leaders and how traditional Ransomware approaches are no longer effective
  • Peer Review - A Discussion about Today’s Evolving Security Landscape Recorded: Apr 14 2021 59 mins
    Abhi Agarwal - Fresenius Medical Care NA, Simon Jenner - National Grid, Jeffrey J. Julig - SWBC, Randy Regimbal - Mayo Clinic
    How do security leaders need to evolve to keep up with changing business conditions? How should security leaders be talking to the board of directors, and how should they leverage technology to drive positive business outcomes? Security leaders across industries are facing many of the same challenges and changes in today’s workplace. In this session we will discuss insights with a panel of security leaders in different industry segments. There will be an open Q&A discussion at the end.

    In this session, panelists will discuss:
    - Challenges security leaders face on a daily basis
    - New techniques or processes being deployed to secure a company network

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • Eliminate Uncertainty with Security Validation Recorded: Apr 14 2021 31 mins
    Hatem Ali, Global Services and Intelligence Lead MEA, FireEye Mandiant
    If you can measure it, you can improve it. One major challenge for cyber security teams is establishing a measurable process of validating their security operations to be able to identify gaps in detection coverage and areas of redundancy to provide specific areas of improvement including potential saving across your security controls.

    This webinar will discuss how to:
    • Operationalize Threat Intelligence: Ensure your security controls stand up to the latest tactics, techniques and procedures used by threat actors in your region and industry.
    • Plan security improvements: From both a technology and process perspective.
    • Establish evidence-based KPIs to improve security controls.
    • Report the organization’s ability to mitigate pertinent cyber risks to senior stakeholders

    Join this session to uncover how security validation proves the value of your efforts and ultimately reinforces your organization’s security posture.

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • Fireside Chat with the Head of Mandiant Intelligence: Sandra Joyce Recorded: Apr 13 2021 53 mins
    Sandra Joyce, Executive Vice President of Global Mandiant Intelligence & Moderated by Sarah Geary, Manager, Mandiant
    Join Sandra Joyce, FireEye’s Executive Vice President of Global Intelligence, for a lively discussion about today’s adversaries in an era consumed by a pandemic, geopolitical tensions, and rampant cybercrime.

    In this session, Sandra will discuss:

    - Real-world examples of today’s threats
    - Insight into how today’s threat actors are operating
    - Tactics and trends that are likely to play an integral role in the landscape of cybersecurity in the years to come

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • Hacking your Operational Technology for Defense Recorded: Apr 13 2021 57 mins
    Rob Caldwell, Director, Mandiant, Jeff Greene CISO, International Paper, Daniel Kapellmann, Tech Analysis Manager, Mandiant
    Ransomware, supply chain attacks and other threats don’t just affect IT networks. Operational Technology (OT), including Industrial Control Systems (ICS), are increasingly being targeted by attackers and nation state groups. With critical infrastructure and public services at stake, OT Security teams must increasingly adopt cyber security strategies from IT Security, such as red teaming and penetration testing, to prevent and respond to these threats. 

    Join Rob Caldwell, Director of ICS Consulting at Mandiant, Jeff Greene CISO at International Paper and Daniel Kapellmann, Tech Analysis Manager, Mandiant to learn: 

    -How Mandiant Offensive Security teams gained access to an electric utility 
    -The importance of OT cyber physical threat intelligence in protecting OT networks 
    -How IT network security plays a critical role in protecting the OT segment 
    -How International Paper leverages technology and expertise to improve their OT security posture

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • Malware Maelstrom: Guarding Against the Return of APT10 and its Subsets Recorded: Apr 13 2021 46 mins
    Adrien Bataille, Senior Consultant, FireEye Mandiant & Mitchell Clarke, Principal Consultant, FireEye Mandiant
    In 2020, during an incident response engagement, FireEye Mandiant stumbled upon APT10 for the first time since the U.S. indictments against the group in late 2018. Upon re-discovery and identification of the group’s new and evolved tooling, FireEye Mandiant determined that other previous incident response engagements that were largely unrecognized had likely featured APT10.

    This presentation will take a deep dive look into:
    ● How FireEye Mandiant re-discovered APT10 and the threat actor’s new malware and updated tools
    ● The difficulties in conducting malware-based attribution and possible subsets of APT10
    ● How organizations can spot this threat group and what defensive steps to take

    Be sure to check out all of the sessions in our FireEye Mandiant Virtual Summit 2021, Innovation Forward. A New Era of Resilience. - Live on April 13-15. https://virtualsummit.fireeye.com/
  • Cloud Security for Canadian Government: A Conversation with FireEye / rSolutions Recorded: Mar 3 2021 59 mins
    Lisun Kung, Senior Director and Blake Autry, Cloudvisory Senior Sales Strategist
    Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

    On March 3rd at 3:00 PM ET, FireEye subject matter experts will discuss how government IT and Security professionals can overcome these challenges and pave the way for a successful path forward.

    Our conversation will cover not only the state of cloud for government use, but also how to:

    •Gain greater visibility across hybrid, public, private, and multi-cloud environments
    •Achieve cloud compliance, enforcement, and control
    •Manage and mitigate risks in the cloud, from a CISO’s perspective
    •Secure the remote workforce
  • Security Effort ≠ Security Effectiveness Recorded: Nov 24 2020 63 mins
    Mandiant Security Validation and ISA Cybersecurity
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we believe that our security teams are well trained and practiced when everything goes wrong. These assumptions result in financial and operational inefficiencies, defensive regression and an inability to determine if we are investing in the right areas to communicate the state of our security effectiveness to stakeholders.

    Join FireEye and ISA Cybersecurity as we discuss how organizations can:

    - Utilize an Intelligence Driven Approach to Security Validation
    - Provide evidence of competency and business alignment of their cybersecurity programs
    - Align their security program to industry frameworks such as Mitre Att&ck and NIST
    - Realize full potential from security investments and expose overlapping controls

    Presented by Brian Contos, VP & CISO, Mandiant Security Validation | Bart Lenaerts-Bergmans, Senior Product Marketing Manager | Enza Alexander, Executive VP, ISA Cybersecurity
  • A Global Reset: Cyber Security Predictions 2021 | Expert Roundtable Recorded: Nov 9 2020 45 mins
    FireEye Mandiant Expert Panel
    A Global Reset: Predictions for the Future of Cyber Security | Roundtable Discussion

    The year 2020 has been an unprecedented time of change and has shaped up in a way that nobody could have expected. This year’s activities continue to alter the future course of cyber security, making it even more important to ensure that we better prepare ourselves for what’s to come.

    On Monday, November 9th at 12 p.m./3 p.m. ET, join our expert panel as they share cyber trends and challenges in 2021. During the webinar, our experts will touch on various topics discussed in our upcoming report, A Global Reset: Predictions for the Future Cyber Security, including:
    • How remote work will evolve and affect organizations operationally
    • Insights into how threat actors will leverage the pandemic in their attacks
    • The growing need for intelligence-led security validation
    • The future state of cloud security
    • Nation-state activity and changing TTPs
    • How ransomware has pivoted from business risk to a national security risk

    Expert Panel:
    • Dave Baumgartner, CIO, FireEye (Moderator)
    • Maj. Gen. Earl Matthews, VP of Strategy, Mandiant Security Validation
    • Martin Holste, Cloud CTO, FireEye
    • John Hultquist, Sr. Director, Mandiant Threat Intelligence

    Please also check out our FireEye Cyber Summit 2020 for more interesting sessions: https://www.fireeye.com/company/events/cyber-summit-2020.html

    Register Now!
  • Cyber Summit 2020 | Spotlight on Financial Services Recorded: Nov 9 2020 91 mins
    Mandiant Solution Experts
    Session Agenda:

    - 10:30 a.m. PT - Intro to Financial Services Spotlight

    - 10:31 a.m. - 11:02 a.m. PT - Navigating Today's Cyber Challenges- David Wong, VP, Mandiant Consulting joined by expert panelist, Holly Ridgeway - EVP, Chief Security Officer, Citizens Bank and Tim Hillyard - AVP, Cyber Security Threat and Response, Voya Financial

    - 11:02 a.m. - 11:27 a.m. PT -Key Threats to Financial Services Today - John Miller, Director, Mandiant Threat Intelligence

    - 11:27 a.m. - 11:46 a.m. PT - Improve Your Cybersecurity to Protect Against FIN11 - Ursula Cowen, Threat Research Analyst, Mandiant Security Validation and Andy Moore, Sr. Technical Analyst, Mandiant Threat Intelligence

    - 11:46 a.m. - 12:01 p.m. PT - Spotlight on Financial Services: Live Q&A

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Cyber Summit 2020 | Cloud and Enterprise Security Recorded: Nov 9 2020 72 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Phil Montgomery, SVP, FireEye; Steve Ledzian, CTO, APAC, FireEye
    Session Agenda:

    -9:15 a.m. - 9:40 a.m. - Take Control of Your Cloud Environments - Martin Holste, Cloud CTO, FireEye and Lisun Kung, Sr. Director, Cloudvisory, FireEye

    -9:40 a.m. - 10:01 a.m. - FireEye Products: A Complete Solution Working Together - Phil Montgomery, Sr. VP, Product Marketing, FireEye

    -10:01 a.m. - 10:24 a.m. - Detection and Response: Pioneered by FireEye - Steve Ledzian, CTO, APAC, FireEye

    To check out the full event program, please visit https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Cyber Summit 2020 | From the Front Lines Recorded: Nov 9 2020 70 mins
    Sandra Joyce, EVP, Mandiant Threat Intel; Charles Carmakal SVP and CTO, Mandiant; Chris Key, EVP, Mandiant Solutions
    Session agenda:

    - 8:00 a.m. PT. - Welcome and intro

    - 8:02 a.m. -8:22 a.m. PT - New Ransomware Trends: A Threat Evolves - Sandra Joyce, EVP and Head of Mandiant Threat Intelligence

    - 8:22 a.m. - 8:49 a.m. PT - Preparing for Disruptive Intrusions: Mitigating the Risk of Data Theft, Ransomware, Public Shaming and Extortion - Charles Carmakal, Sr. VP and Mandiant Strategic Services CTO

    - 8:49 a.m. - 9:07 a.m. PT - Mandiant Advantage: Achieving Focused Business Outcomes through Threat Intelligence and Validation - Chris Key, EVP of Products, Mandiant Solutions

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Augment and Automate Threat Intelligence Into Your Environment Recorded: Nov 9 2020 18 mins
    Joshua Bass, Senior Manager Product Management, Mandiant Security Validation
    The need to improve how companies prove security effectiveness in today’s business climate is clear: attacks are on the rise, targets are expanding, adversaries are more motivated, and their tactics are increasingly insidious.

    Now, more than ever, organizations need access to emerging threat data as it happens. Security leaders need to be able to provide proof to their organization that these threats cannot and will not breach their defenses by being able to prioritize the threats that matter to them now and take action.

    This session will show how relevant and emerging threat data combined with controls validation technology provides insight into what is most important to test against and what to prioritize based on the knowledge of who and what might be targeting an organization or industry. Through this approach to security validation, security leaders can provide evidence to C-level leadership and give them confidence that controls are working as they should against threats and adversaries delivering expected value and maintaining the organization’s accepted level of risk.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Improve Program Effectiveness through Security Transformation Recorded: Nov 9 2020 20 mins
    Nicholas Bennett, Managing Director, Mandiant Consulting; John M. DeLozier, Sr. Technical Director, Mandiant Consulting
    With the chance of an attacker affecting more organizations today—notably around ransomware progression and the shift to remote work—your security function is continually challenged to keep pace with incident prevention, detection and response.

    Transformation timelines often occur in two ways: proactive action to mitigate future threats, or reactive measures to remediate an existing incident—the latter can be detrimental. It’s imperative for security teams to develop and mature their security posture through capability improvement across four key areas: security architecture, cyber defense, governance and risk management.

    In this session, you'll learn how Mandiant helps organizations conduct transformational changes of critical security functions and staff readiness through hands-on support across these critical areas. We’ll also share a roadmap of our new transformation services on the horizon.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Covering Your Bases With FireEye Network Security and Forensics Recorded: Nov 9 2020 16 mins
    Rob Ayoub, Sr. Product Marketing Manager, Cloud Detection and Forensics
    Today's security professionals have more network security challenges than ever before. With infrastructure located on-premise, as well as in private, hybrid and multi-cloud environments, managing and securing the network has become increasingly complex.

    In this session, we’ll discuss the opportunities and challenges our customers face across a growing variety of use cases, how customers can integrate FireEye detection directly into their custom application, and how they can leverage FireEye’s full portfolio of solutions to address infrastructure security wherever they need it.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • Halt Advanced Attackers: Endpoint Security with Protection Modules Recorded: Nov 9 2020 21 mins
    Vinoo Thomas, Sr. Product Line Manager, Endpoint Security, FireEye
    Advanced attackers fly under the radar of prevention or detection technologies, living off the land, leveraging features and tools found in the operating system. From an attacker’s perspective, using legitimate or existing tools and features makes the defender’s job inherently more difficult. Picking out the malicious use of built-in OS tools is like looking for a needle in a haystack.

    With FireEye Endpoint Security and our protection modules, these living off the land based attacks are made visible to FireEye and can be stopped. See how you can quickly implement Endpoint Security modules to disrupt attackers.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
  • All the Knowledge of FireEye at Your Fingertips Recorded: Nov 9 2020 14 mins
    Henrik Olsson, Product Line Manager, Endpoint Security, FireEye
    All the Knowledge of FireEye at Your Fingertips | Endpoint Security with Process Tracker, Enricher and Detection on Demand

    When an attack occurs, it may take a while to understand who is attacking, what methods are they using and what are they typically after. This information can very useful to understand how to detect all aspects of the attack, how to best remediate, and how to prevent it from happening again.

    Join us to hear how Endpoint Security with detection modules can arm you with the context you need to respond effectively, mitigate damage, and prevent the next attack from occurring.

    For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html
FireEye Private Channel for Partners and Customers
FireEye Channel for Partners and Customers

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defending your OT Network: The Anatomy of a Cyber Attack
  • Live at: Jun 3 2020 8:00 pm
  • Presented by: Neal Gay, Sr. Manager - Managed Defense, FireEye Daniel Kapellmann Zafra, Technical Analysis Manager, FireEye
  • From:
Your email has been sent.
or close