Hi [[ session.user.profile.firstName ]]

Detecting the Unknown Threats, First.

FireEye detected 11 zero day attacks in 2013 and have already detected 3 in 2014. Join Greg Day, CTO & VP of EMEA, and Jason Steer, Director of Technology Strategy EMEA to understand how these unknown threats targeted businesses just like yours.

FireEye has uncovered more zero day attacks than any other vendor and with 67% of all victims of advanced threats being notified by external entities in 2013; FireEye can help you take back control.
Recorded Jun 17 2014 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Greg Day, CTO, FireEye; Jason Steer, Director of Technology Strategy, FireEye
Presentation preview: Detecting the Unknown Threats, First.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Video Interview] Chris Pierson: Securing Vehicle-to-Vehicle Comms and More Recorded: Mar 30 2017 16 mins
    Josh Downs, Community Manager, BrightTALK & Chris Pierson, CSO, Viewpost
    BrightTALK caught up with Menlo Security's Jason Steer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - Regulation and security for new IoT networks

    - Secure DevOps and building defences in from the ground up

    - V2V (vehicle-to-vehicle) security and how we secure communications between vehicles as the technology kicks off

    - His view, in his role at Viewpost of the evolving threatscape

    - The influence of the supposed Russian hack of the US election and what it means for cyber warfare moving forwards
  • Detecting Network Threats: What Can Endpoint Data Tell You? Recorded: Mar 28 2017 60 mins
    Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black
    Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organise and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralise advanced threats.

    In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

    You’ll learn:

    • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
    • How LogRhythm SmartResponse can help orchestrate security operations
    • Threat hunting techniques using Carbon Black within LogRhythm

    Register now to discover how to use insights from endpoint data to best protect your organisation from advanced attacks.
  • BrightTALK at RSA 2017: Chenxi Wang on Diversity and the Future of Cyber Warfare Recorded: Mar 23 2017 11 mins
    Chenxi Wang, Founder of The Jane Bond Project & Josh Downs, Community Manager, BrightTALK
    BrightTALK caught up with Chenxi Wang, Founder of The Jane Project and Twistlock's Chief Strategy Officer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo Breach and some of her suspected reasons why
    - The influence of the supposed Russian US election hack and what it means for cyber warfare
    - Diversity in the cyber industry and how it can be improved
    - AI & Machine learning and use cases for security
    - The key vulnerabilities in IoT networks that we should be thinking about
  • BrightTALK at RSA 2017: Mark Weatherford on Ransomware, DDoS & Virtualization Recorded: Mar 21 2017 10 mins
    Mark Weatherford, Chief Cybersecurity Strategist at vArmour and Josh Downs, Community Manager at BrightTALK
    BrightTALK caught up with vArmour's Chief Strategist, Mark Weatherford for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The rise of Ransomware and where companies are more vulnerable
    - DDoS and why it's still a key threat to businesses
    - The increased vulnerability of the IoT
    - Challenges for Donald Trump and his new cyber team
    - How to boost equality and diversity in the information security industry
    - How cloud and virtualization are changing the security game

    About the Speaker:
    Mark Weatherford is Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He was formerly a Principal at the Chertoff Group, was Deputy Under Secretary for Cybersecurity at DHS, was Chief Security Officer at the North American Electric Reliability Corporation (NERC) and was the CISO for the states of California and Colorado. He also served as a cryptologic officer in the US Navy. Weatherford is a Director on the Boards of Coalfire, the Center for Cyber and Homeland Security (CCHS) at the George Washington University, and the National Cybersecurity Center (NCC) in Colorado Springs. He is also on the Advisory Board at both Cylance and AlertEnterprise.
  • GDPR: Ready or not, here it comes Recorded: Mar 16 2017 59 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    Europe’s General Data Protection Regulation (GDPR) will come into effect on 25th May 2018, leaving all organisations that process the data of EU residents with less than 18 months to meet the stringent requirements of the regulation. Organisations must implement a cloud security strategy that supports compliance and minimises their organisation’s exposure to the new breach notification requirements and financial penalties, as high as 20 million Euros or 4% of total annual turnover.

    Still figuring out how your organisation is going to comply? What actionable steps you should be taking today? Look no further. Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:

    - Cutting through the ambiguity and focusing on the key cloud security considerations
    - Data breach responsibilities and what that means to your organisation
    - What is the role and expectation of your cloud provider when it comes to GDPR
    - Insight into real-life case studies

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
  • Operationalizing Threat Intelligence Recorded: Mar 16 2017 45 mins
    Igors Konovalovs, Sales Director, EMEA, FireEye iSIGHT Intelligence
    Learn how intelligence-led organizations globally apply threat intelligence to prioritize vulnerability patching, accelerate incident response, reveal strategic risks and plan cyber security investments.

    Amongst other things this webinar will provide insight into:
    1. Importance of visibility over an entire attack lifecycle
    2. How NATO military doctrine for intelligence collection & analysis can be applied in a commercial environment
    3. Key Threat Hunting skills and requirements
  • Cyber Attack Trends 2017 & Beyond: Protecting your business from cyber criminals Recorded: Mar 16 2017 47 mins
    Steve Durbin, Managing Director, ISF Ltd
    As the scale and sophistication of cyber attacks increases, businesses need to manage risk in ways beyond those traditionally handled by the information security function.

    In this webinar, Steve Durbin, Managing Director, ISF will offer insights into how security and business teams across the organisation can work together to minimise the impact of cyber attacks on shareholder value and business reputation.
  • [Live Panel] Threat Hunters in Action Recorded: Mar 16 2017 59 mins
    Josh Downs, BrightTALK (moderator), Jens Monrad, FireEye & Amar Singh, Cyber Management Alliance
    Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.

    This live panel will focus on the tools and techniques threat hunters use to patrol your networks, mitigate threats and remove unwanted presence.
  • Jenny Radcliffe - Threat Hunters in Action - Social Engineering Inside Out Recorded: Mar 16 2017 44 mins
    Jenny Radcliffe, Director, Jenny Radcliffe Training
    For the Threat Hunters in Action series, this webinar presents a guide to how social engineering forms a large part of insider threats within organisations.

    Learn how insider threats are created and manipulated by external parties as well as how organisations help create their own insider threats through cultural and behavioural factors.

    The webinar will give advice on how to spot individuals "within the family" who may have malicious intentions towards the business, and gives advice on how to manage the problem within an organisation.
  • 7 Strategies for Dynamic Contract Management in the Cloud Recorded: Mar 15 2017 42 mins
    Jeffrey Ritter
    New threats and new defenses constantly challenge the rules for managing security across third party cloud services. In this webcast, you will learn 7 strategies for how to structure and adapt the complex commercial agreements to assure both vendors and customers new risks are being controlled.
  • What's Next on the Corporate GRC Agenda? Recorded: Mar 15 2017 42 mins
    Hassham Idris, Cyber Security GRC, ISMS and Program Delivery Expert
    The snowballing complexity of the business and technology risks, introduction of new regulations and ever increasing compliance requirements have made it vital for every enterprise to set up a proficient Governance, Risk and Compliance (GRC) framework.

    This webinar will emphasise on the essential GRC elements that organizations must adopt in order to protection business critical assets and exploit new opportunities with confidence.
  • Optimise your business in the cloud without compromising security Recorded: Mar 15 2017 46 mins
    David Hald, Chief Strategy Officer
    Data and security breaches related to cloud services and apps were much more widely reported in 2016. The increased use of cloud-based business applications has allowed organisations to maximize the productivity and efficiency benefits that are part and parcel of cloud architectures.

    With access to data no longer as restricted as it once was, risks naturally increase. Denial of access is not an option. Instead, the goal is to allow appropriate access and prevent bad outcomes (i.e. data breaches) from arising.

    In this session, find out how to mitigate the risks by:
    - Improving visibility of Shadow IT, without compromising productivity
    - Protecting your employees from inadvertently exposing your company to advanced threats
    - Securing your network and your employees anywhere, any time
  • The Victim’s Perspective: What Makes Me a Target? Recorded: Mar 14 2017 49 mins
    Chris Yule, Senior Security Researcher
    SecureWorks’ incident responders assist hundreds of organisations annually with the containment and remediation of threats during security incidents, including both targeted and opportunistic threats. Visibility of these incidents provides the SecureWorks Counter Threat Unit™ (CTU) research team with a unique and comprehensive view of emerging threats and developing trends.

    In this webcast Chris Yule, Senior Security Researcher with the CTU, will draw on recent research garnered from SecureWorks’ incident response engagements in Q1 and Q2 of 2016 to address some of the most prominent threats and security challenges organisations face today.

    Chris will be viewing and presenting this insight through the lens of the victim, and will answer the following questions which many organisations will be familiar with:

    - Am I likely to be a victim?
    - Should I care about targeted or opportunistic threats?
    - What makes me a victim of a targeted threat?
    - How can I protect myself against the most common threats?
  • Availability 101: How to Defend against Cyber Attacks Recorded: Mar 14 2017 31 mins
    Jay Coley, Sr. Director Security Strategy and Planning EMEA, Akamai Technologies
    With DDoS cyber attacks rapidly increasing in both size and speed, as well as attacks that are crafted for a specific application or service, it’s never been so critical to ensure your basic availability is sound. Mitigation services can no longer be ‘one size fits all’. Organisations now need a tailored platform for the specific application or service to ensure 100% availability. Without availability ensured then other security overlays are meaningless.

    This webinar will look at attack trends and case studies and provide top tips on how to stay ‘always on’ in the face of cyber attacks.
  • [Video Interview] Digital Shadows: GDPR, Cyber Security & Politics and more Recorded: Mar 14 2017 9 mins
    Josh Downs, Community Manager, BrightTALK & James Chappell, CTO & Co-Founder, Digital Shadows
    BrightTALK caught up with Digital Shadow's James Chappell for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - Equality in the security industry

    - The influence of the supposed Russian Hack of the US Election on the politics of cyber

    - The evolution of the threatscape; new threats and threat actors

    - The Yahoo breach revelations and what they mean for data protection

    - The influence of GDPR on the security industry

    - Financial Security and where the banks are most vulnerable
  • Hackers, Threats & Cyber Defence: Reporting from the front line Recorded: Mar 14 2017 48 mins
    Peter Wood
    Peter's presentation uses the latest research combined with experience from real-world client engagements to highlight current cyber threats. He describes how a threat-led approach works and how to change your defence and response posture to minimise your attack surface.
  • How to Prevent Major Data Breaches with Faster Detection and Response Recorded: Mar 14 2017 47 mins
    Martin Cook, LogRhythm & Tom McMuldroch, Fujitsu
    “By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches” according to Gartner Research.

    Many organisations are shifting to a more balanced strategy to improve detection and response capabilities. The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process, you can achieve faster detection and response in order to prevent high-impact security incidents, such as major data breaches.

    In this webinar, presenters from LogRhythm and Fujitsu will explore how you can implement an effective Threat Lifecycle Management process at a scale appropriate to your business through innovative technology such as:

    • Advanced machine analytics, which are key to discovering potential threats quickly.

    • Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery.

    Understand the process, Threat Lifecycle Management (TLM), which begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. Join this webinar to:

    • Determine if your spending is focused on the right areas

    • Understand five obstacles you can overcome to help prevent high-impact cyber incidents

    • Discover how can you lower your TCO and maximise the ROI of your security technology
  • Blockchain For Identity Authentication Infrastructure Recorded: Mar 14 2017 49 mins
    Professor Michael Mainelli, FCCA FCSI FBCS (Z/Yen Group Limited)
    Mutual distributed ledger (MDL) identity schemes could empower people with personal data storage and management, permission frameworks for access by third parties such as banks insurers or governments, and even distributed reputation ratings.

    Such applications could reduce financial fraud, costs, and crime, and increase returns, confidence, and security. MDLs are uniquely supportive of controlled distribution and sharing of digitally-signed documentation and could form the backbone to identity and authentication systems worldwide. In fact, some claim that identity authentication infrastructure is the ‘killer app’ for MDLs rather than payments.

    While anti-money-laundering/know-your-customer/ultimate-beneficial-ownership processes are arduous for high-net-worth individuals, about 2.4 billion poor people worldwide lack official identification, about 1.5 billion over the age of 14.

    This webinar will examine how MDLs might aid both rich and poor.
  • [Live panel] Cyber Attack Trends and Staying One-step-ahead Recorded: Mar 14 2017 60 mins
    Josh Downs, BrightTALK (moderator), Cristiano Cafferata, SonicWALL & Durgan Cooper, CETSAT Ltd
    Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.

    This is a live panel discussion focused on the cyber attack trends seen by SonicWALL and this panel of expert; where are cyber criminals improving? Are we seeing an evolution in their tactics? And how can businesses protect themselves more effectively?

    These questions and many more will be discussed by our panel of experts.
  • [Video Interview] Rami Mizrahi: Threat Detection, Nation-state Attacks and Yahoo Recorded: Mar 13 2017 9 mins
    Rami Mizrahi, VP R&D, TopSpin Security
    BrightTALK caught up with TopSpin Security's Rami Mizrahi for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo breach and who was to blame

    - Nation-state cyber warfare attacks

    - How to improve your endpoint detection

    - How to improve your network security stance

    - The evolution of the threatscape and threat actors

    - The role of regulation in financial security
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Detecting the Unknown Threats, First.
  • Live at: Jun 17 2014 12:00 pm
  • Presented by: Greg Day, CTO, FireEye; Jason Steer, Director of Technology Strategy, FireEye
  • From:
Your email has been sent.
or close