Hi [[ session.user.profile.firstName ]]

Protecting Government Assets in an Era of Cyber Warfare

FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

Join us for a dynamic discussion with subject matter experts where you will learn:

•What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
•Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
•How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
Recorded Mar 5 2015 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tony Cole, VP/Global Government CTO (FireEye)
Presentation preview: Protecting Government Assets in an Era of Cyber Warfare
  • Channel
  • Channel profile
  • Uplift Your Security Defense from IT to OT Nov 10 2021 4:00 pm UTC 60 mins
    Rob Caldwell, Director, ICS and OT Services, Mandiant; Richard Diver, Sr. Tech Business Strategy Mgr., Microsoft
    As more companies work to interconnect IT to IoT/OT, new cyber and operational risks are multiplying. Aligning your security capabilities to monitor, detect and respond across IT, IoT and OT assets is critical to improving security operations and detecting threats in real-time.  You need a solution that efficiently augments your security tech stack and equips you with threat intelligence and OT security expertise to defend against today’s sophisticated attackers.

    Our Mandiant and Microsoft experts will guide you through how to up level your IT to OT security by identifying how to prevent disruption from cyber attack by fusing technology with talent to naturally extend your security team.

    Key components:
    - Technology – extend your Microsoft investment by implementing Azure Defender for IoT
    - Intelligence – lead with an “intelligence-led” security approach with the combination of Microsoft technology with proven Mandiant threat intelligence tailored to your distinct industry profile.
    - People – bring in Mandiant experts who routinely protect critical infrastructure to optimize your security operations

    Speakers:
    Rob Caldwell, Director of Industrial Control Systems and Operational Technology Services, Mandiant

    Rob is responsible for consulting and managed services delivery in the ICS and OT space. The capabilities of Rob’s team extend from industrial security to other cyber physical disciplines such as IoT, building management, and biomedical devices. Prior to joining Mandiant, Rob spent 8 years with GE Digital Energy where he served as the Chief Security Architect.
  • Achieving Operational Competency through Security Validation Nov 9 2021 6:00 pm UTC 39 mins
    Mandiant Security Validation Experts
    In our fourth and final session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore how security validation helps you achieve operational competency and business continuity.

    Register to attend and learn how to design and execute a strategic security validation program to protect your company’s financial position and reputation.

    Refer to the attachment section of this webinar, to register for previous parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speaker:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
  • Mandiant Presents | Security Predictions for 2022 Nov 8 2021 9:00 pm UTC 60 mins
    Andrew Kopcienski, Senior Analyst, Mandiant Intelligence for Executives
    This past year, front page news reported what seemed to be one ransomware attack or breach after another, at an accelerated pace. Threat actors continue to evolve, putting tremendous pressure on security teams to identify attackers, TTPs, all the while managing their resources to ensure they aren’t victimized by the latest cyber schemes.

    Now more than ever, it’s essential for organizations to better prepare for what’s to come to ensure they aren’t the next news headline.

    Join us at the BrightTalk Threatscape 2022 Summit on November 8th for a webinar featuring Mandiant expert, Andrew Kopcienski. He will share insights from our upcoming report, Mandiant Presents Security Predictions for 2022, to give you a glimpse into what you can expect in the new year.

    Highlights include:
    • Ransomware, Multifaceted Extortion and the negative consequences for organizations
    • An outlook on the Big Four: Russia, Iran, China and North Korea
    • How the events in Afghanistan trigger espionage and information operations
    • Expanding attack surfaces: IOT and Cloud
    • How cyber outsourcing can increase velocity and impact of malicious operations
    • Supply chain threats and mitigating the associated risks

    Register to reserve your spot today!
  • Align Security Validation with MITRE and Att&CK Framework Nov 2 2021 5:00 pm UTC 38 mins
    Mandiant Security Validation Experts
    In our third session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore the importance of aligning your security validation program to relevant industry attack frameworks such as MITRE ATT&CK.

    Register to attend and discover why you need a depth of industry framework content based on active threat data and its role in security validation.

    Refer to the attachment section of this webinar, to register for upcoming and previous parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speakers:
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
    Henry Peltokangas, Director of Product, Mandiant Security Validation
  • Simulation vs Emulation: Why Real Attacks Matter Oct 26 2021 5:00 pm UTC 33 mins
    Mandiant Security Validation Experts
    As we continue the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness", part two will explore why emulation of real attacks is critical when testing performance of your security program. Attack simulations are inauthentic and often not recognized by security controls, and can give you a false sense of security.

    Register to attend and gain valuable information about why testing with real attacks is key to your security validation efforts, and best practices for execution across security controls, people, and processes.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speakers:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Devon Goforth, Senior Director, Security Instrumentation and Effectiveness, Mandiant Security Validation
  • Part 3 | FireEye XDR: Moving Beyond the Limits of SIEM, SOAR, and EDR Oct 26 2021 4:00 pm UTC 32 mins
    JR Wikes, Principal Systems Engineer and David Batty, Principal Systems Engineer, FIreEye Inc.
    In part three, the last part of our webinar series for "FireEye XDR: Bringing New Meaning to Extended Detection and Response", we discuss how to reduce the security complexity of modern corporate IT infrastructure.

    The strengths and limitations of SIEM, SOAR and EDR solutions are detailed to illustrate the need for and value of XDR in an organization’s cyber environment.

    Register to learn how FireEye XDR platform can improve your security posture.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "FireEye XDR: Bringing New Meaning to Extended Detection and Response".
  • Spooky RYUKy 3: The Final Chapter Recorded: Oct 21 2021 40 mins
    Van Ta, Principal Analyst; Joshua Shilko, Principal Analyst; Zach Riddle, Sr. Analyst; Aaron Stephens, Principal Analyst
    Mandiant recently exposed the operations of FIN12, a financially motivated threat group specializing in the post-compromise deployment of ransomware, primarily RYUK, which we will discuss extensively in our upcoming webinar: Spooky RYUKy 3: The FINal Chapter.

    During this session a team of Mandiant Analysts will detail:

    -The evolution of FIN12, the most prolific user of RYUK ransomware
    -Ongoing group activity and new malware
    -What separates FIN12 from other ransomware actors
    -How FIN12 relates to other clusters of activity

    Register today for Spooky RYUKy 3: The FINal Chapter, Tuesday, October 21, 8:30 am PT/11:30am EST.
  • The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks Recorded: Oct 19 2021 32 mins
    Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation
    Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness

    With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver.

    In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform.

    You’ll learn:

    ● October 19, 2021 at 1PM ET: Part 1 | The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks
    ● October 26, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte
    ● November 2, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK
    ● November 9, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".
  • Part 2 | FireEye XDR: Born from Frontline Intelligence Recorded: Oct 19 2021 31 mins
    Robert Kusters, Senior PMM Cloud Endpoint Security, and Veronica Carr, Sr Principal PM, Security Platforms at FireEye
    In part two of our webinar series for "FireEye XDR: Bringing New Meaning to Extended Detection and Response", we discuss how FireEye relentlessly protects its customers against major cyber threats. Our frontline human expertise and intelligence helps you prioritize risks, guide responses and accelerate security operations.

    Register to learn how FireEye XDR can simplify threat detection, investigation and incident response.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series " FireEye XDR: Bringing New Meaning to Extended Detection and Response".
  • Parte 2 | FireEye XDR: Reduza a complexidade da segurança de TI Recorded: Oct 14 2021 39 mins
    Arthur Cesar Oreana | CISSP, SSCP, CCSK | Sales Manager
    A segurança na maioria das organizações é mais complexa a cada dia. Com uma média de mais de 45 ferramentas de segurança para manter por empresa, o gerenciamento de custos e complexidade é agora mais crítico do que nunca.
    Há uma nova maneira de lidar com esse e outros problemas críticos de segurança: FireEye XDR.
    Nesta sessão, discutiremos como reduzir a complexidade da segurança de sua infraestrutura de TI corporativa e protegê-la contra as principais ameaças cibernéticas. Como a experiência e a inteligência o ajudarão a priorizar riscos, orientar respostas e acelerar as operações de segurança.
  • Part 1 | FireEye XDR: Understanding XDR Security Recorded: Oct 12 2021 31 mins
    Robert Kusters, PMM, Cloud Endpoint Security and Jim Waggoner, VP of Product Management, FireEye
    For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).

    FireEye XDR protects organizations though unmatched detection, protection and response technologies delivered through an extensible cloud-based platform. By simplifying and correlating incident data across the entire security stack, FireEye XDR applies frontline intelligence and analytics to help you find and resolve the threats that matter most.

    Join us for a webinar series on FireEye XDR, where we will cover how XDR security came about, why FireEye’s take on XDR is focused on security outcomes, and how we have been delivering on this for years.


    Register for all parts of this webinar series:

    Part 1| Understanding XDR Security
    August 25, 2021 at 10am PT | 1pm ET

    Part 2| FireEye XDR: Born from Frontline Intelligence
    September 1, 2021 at 10am PT | 1pm ET

    Part 3| FireEye XDR: Moving Beyond the Limits of SIEM, SOAR, and EDR
    September 8, 2021 at 10am PT | 1pm ET
  • FireEye XDR Trazendo um Novo Significado para Detecção e Resposta Ampliadas Recorded: Oct 7 2021 58 mins
    Arthur Cesar Oreana, CISSP, SSCP, CCSK | Sales Manager
    Ameaças emergentes colocaram as organizações em risco por muitas décadas. À medida que o cenário de TI evoluía e os atores de ameaças encontravam novas maneiras de atacar, as equipes de segurança precisavam encontrar novas maneiras de detectar e responder às ameaças. Embora ferramentas de segurança como tecnologias SIEM, SOAR e EDR tenham suas vantagens, as organizações devem olhar além dos limites dessas ofertas, para detecção e resposta estendidas (XDR). O FireEye XDR protege as organizações por meio de tecnologias de detecção, proteção e resposta fornecidas por meio de uma plataforma extensível baseada em nuvem.

    Abordaremos como a segurança XDR surgiu, porque o XDR da FireEye se concentra em resultados de segurança e como pode simplificar a detecção de ameaças, investigação e resposta a incidentes.
  • Parte 2| FireEye XDR: Reduce la complejidad de seguridad en TI Recorded: Sep 30 2021 53 mins
    Stephen Fallas, Cybersecurity Architect Strategist | CDPSE-CISM-CGEIT-CISSP-CRISC-GPCI-GICSP-BS7799| | LATAM Territory
    En esta sesión analizaremos cómo reducir la complejidad de seguridad de la infraestructura de TI corporativa y protegerse contra las principales amenazas cibernéticas. Como la experiencia e inteligencia le ayudara a priorizar los riesgos, orientar las respuestas y acelerar las operaciones de seguridad.
  • Why Sandboxing is still relevant. Recorded: Sep 29 2021 39 mins
    Mike Harrington - Sales Engineer, Edwin A Betancourt - Solutions Architect, Chris Candaffio - Consulting Sales Engineer
    As the threat landscape continually evolves, security practitioners must advance their skills and tools to meet those new threats. Traditionally, Sandboxing was used primarily as a forensic analysis tool. Modern Sandboxing solutions can be used to detect today’s threats and protect your enterprise whether on-premise or in the cloud. Join this Webinar and learn how to protect applications like (O365, Slack, Teams, Box, Drobox, AWS S3, OneDrive…etc.) by integrating Sandboxing directly into the workflow.

    Join our engineering team as they answer the following questions during this technical workshop:
    - What does a modern Sandboxing solution look like?
    - Evolution of Sandboxing from static to dynamic (Automation, Workflow)
    - Use cases and demonstration

    Reserve your seat!
  • FireEye Chat | Simplifying Security Operations with Automation & Intelligence Recorded: Sep 24 2021 16 mins
    Sandra Joyce, EVP, Mandiant Threat Intel; Travis Abrams, Managing Principal Consultant, CyberPeak
    FireEye Chat | Front and Center on Simplifying Security Operations with Automation and Intelligence

    Effective security is not only based on the security controls deployed, but the expertise and intelligence behind them. With evolving threats constantly looming, security teams are under tremendous pressure to identify their adversaries and the attack tactics they use and prioritize limited resources to protect the organization.

    In this episode of FireEye Chat, cyber security experts Sandra Joyce, EVP and Head of Mandiant Threat Intelligence and Travis Abrams, Managing Principal Consultant, CyberPeak, will discuss how operationalized threat intelligence combined with automated alert triage can increase efficiency of security operations and reduce risk to better protect an organization’s most valuable assets.

    Watch Now!
  • Mandiant Intelligence Briefing: Stories Directly From The Frontline Recorded: Sep 23 2021 31 mins
    Andrew Kopcienski, Senior Analyst, Mandiant Intelligence for Executives
    Modern day business solutions source critical components and vital software from a myriad of different sources. Join us to learn more about the cyber threats affecting supply chains, and the hidden risks of supply chain compromise.
  • Parte 1| FireEye XDR: Un nuevo significado a la detección y respuesta extendidas Recorded: Sep 23 2021 58 mins
    Stephen Fallas, Cybersecurity Architect Strategist | CDPSE-CISM-CGEIT-CISSP-CRISC-GPCI-GICSP-BS7799| | LATAM Territory
    Desde hace muchas décadas, las amenazas emergentes han puesto en riesgo a las organizaciones. A medida que el panorama de TI evolucionó y los actores de amenazas encontraron nuevas formas de atacar, los equipos de seguridad necesitaron encontrar nuevas formas de detectar y responder a las amenazas. Si bien las herramientas de seguridad como las tecnologías SIEM, SOAR y EDR tienen sus ventajas, las organizaciones deben mirar más allá de los límites de estas ofertas hacia la detección y respuesta extendidas (XDR). FireEye XDR protege a las organizaciones a través de tecnologías de detección, protección y respuesta entregadas a través de una plataforma extensible basada en la nube.

    En esta sesión cubriremos cómo surgió la seguridad XDR, por qué FireEye de XDR se centra en los resultados de seguridad y cómo puede simplificar la detección de amenazas, la investigación y la respuesta a incidentes.
  • Part 4 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Sep 22 2021 39 mins
    Mandiant Security Validation Experts
    In our fourth and final session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore how security validation helps you achieve operational competency and business continuity.

    Register to attend and learn how to design and execute a strategic security validation program to protect your company’s financial position and reputation.

    Refer to the attachment section of this webinar, to register for previous parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speaker:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
  • FireEye Helix Explained: Preview of New Features Recorded: Sep 21 2021 51 mins
    Sarah S. Cox, Prin. Instr Designer; Veronica Carr, Prin. Prod. Mgr.; Vignesh Balan R, Staff Prod. Mgr.; Todd Bane, Sr. Mgr.
    Helix works with FireEye and third-party sources, including cloud and SaaS applications.
    In this session we will be demonstrating new Helix features that enhance the security analyst experience. Current Helix customers will be invited to join a program with early access to these features, prior to their anticipated roll-out over the next few months.
    Join this installment in our webinar series, as our experts highlight:
    • Threat detection and enrichment
    • Alert correlation across data sources
    • Built-in automation for response action capabilities
    • Threat graph visualization

    The session includes a hands-on demonstration of these upcoming features that will show you how to take advantage of detection, correlation, and automated response action. Stay on after the session for an in-depth Q&A with our experts.
  • Understanding Multifaceted Extortion Attacks & How to Protect Against Them Recorded: Sep 16 2021 56 mins
    Evan Pena, Director, Mandiant; Nick Bennett, Vice President, Mandiant
    Ransomware Ups Its Game: Understanding Multifaceted Extortion Attacks and How to Protect Against Them

    Organizations across all industries are facing devastating threats to their day-to-day operations from opportunistic cyber criminals and nation-state actors. They have mastered ransomware deployment and evolved their tactics to multifaceted extortion—some resulting in million-dollar payouts, damaged reputation, and ongoing loss of operational capacity.

    To prevail against these threat actors, security teams must understand attacker motivations and behaviors and discover how to further improve detection, prevention, and response capabilities. In this webinar, Mandiant representatives Evan Pena, Director, and Nick Bennett, Vice President, discuss:
    • Best practices for preventing the deployment of ransomware and multifaceted extortion attacks in your environment
    • Use cases that spotlight effective and actionable techniques to reduce the risk of these attacks
    • Insights on the tools, tactics and procedures used by real-world threat actors as seen on the frontlines

    There are no rules of engagement for these attackers, so let’s be sure to stay one step ahead of them.
Your Cybersecurity Advantage
Mandiant provides public and private organizations and critical infrastructure worldwide with early threat insights through unmatched intelligence and response expertise for the highest-profile incidents.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protecting Government Assets in an Era of Cyber Warfare
  • Live at: Mar 5 2015 4:00 pm
  • Presented by: Tony Cole, VP/Global Government CTO (FireEye)
  • From:
Your email has been sent.
or close