Hi [[ session.user.profile.firstName ]]

Why Today’s Changing Threat Landscape Requires Agile Security

Advanced threats continue to grow in severity, complexity and reach as threat actors expand their attacks to hit soft targets. Adding to this, as business workloads move to the cloud, and as shadow IT continues to proliferate, unforeseen security gaps expose new vectors for exploit and abuse.

Attacks are not just targeting the core of a network, nor are they limited to just large scale enterprises. More and more, threat actors are aiming at vulnerable endpoints, distributed network environments and porous perimeter defenses. To combat this, security solutions need to be as agile as today’s threat actors.

In this webinar, we will discuss the changing threat landscape and how today’s threat actors and advanced malware are impacting businesses of all sizes and types. Additionally, we will examine new security solutions and deployment models that provide agility, flexibility and widespread protective reach that scales and grows with IT and security needs.
Recorded Nov 9 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rajiv Raghunarayan, Sr. Director, Product Marketing, FireEye. Robert Westervelt, Research Manager, IDC.
Presentation preview: Why Today’s Changing Threat Landscape Requires Agile Security
  • Channel
  • Channel profile
  • The Shifting Balance: Expertise, Automation and the Future of Cybersecurity Oct 7 2019 7:00 pm UTC 60 mins
    Evan Wright, Staff Data Scientist, FireEye
    The present and future of cybersecurity operations will address the skills gap by better utilizing our existing experts and creating more intelligent automation. An evolution is underway in cybersecurity to shift some of the cognitive load from human security experts to machines. When is a machine an appropriate solution and when do you really need a human expert?

    In this presentation, FireEye outlines a spectrum of automatability that helps us identify when a machine or a human expert may be the most effective approach to solving cybersecurity challenges. Multiple factors make up this spectrum, including data volume, and the underlying threat behavior's frequency and stability.

    Join Evan Wright, Staff Data Scientist with FireEye, as he covers:
    -Examples at different points on this automation spectrum, including malware identification, alert triage in the security operations center (SOC), and incident response
    -Domain examples that will demonstrate that machine learning solutions will continue to play an important role alongside human experts
  • Strategic Solutions for Effective Network Security in the Cloud Sep 26 2019 5:00 pm UTC 75 mins
    Rob Ayoub, FireEye; Baseer Balazadeh, Gigamon; Tom Clavel, AWS
    Everyone must work together to protect the cloud. While cloud providers focus on protecting their services and infrastructure, you must ensure that data flowing into the cloud doesn’t leave an opening for attackers.

    Join us on September 26 at 10 a.m. PT/1 p.m. ET, as experts from FireEye, Gigamon and AWS present a webinar on how to:

    •Deploy a security infrastructure that helps you minimize risk by accurately detecting and quickly stopping advanced, targeted and other evasive attacks

    •Achieve greater cloud network visibility by ingesting and capturing traffic data from your cloud infrastructure

    •Apply intelligence to get actionable insights and speed detection and response

    •Fully integrate network forensics to accelerate alert investigation and breach mitigation
  • More Cloud, More Problems? Sep 23 2019 7:00 pm UTC 60 mins
    Martin Holste, Cloud CTO, FireEye
    The cloud is more pervasive in our organizations and our lives. But security operations centers (SOCs) can keep up, even when their organization adopts multiple public cloud and SaaS solutions.

    Join this webinar to ensure that your organization’s cloud strategy is less of a problem than you might think. Expert Martin Holste, Cloud CTO at FireEye, shares:

    • Trade-offs and nuances between cloud providers
    • Considerations that can affect your strategic direction
    • Seasoned guidance on how to optimize your cloud migration
  • Cyber Threats Impacting Healthcare Today Recorded: Sep 17 2019 58 mins
    Luke McNamara, Principal Intelligence Analyst, FireEye & Lauren T. Winchester, Breach Response Services Manager, Beazley
    For some time, the healthcare sector has faced a wide range of threat actors and adversary motivations. Today, data held by healthcare organizations—patient records, medical research, and more—remains at risk from cyber criminals and espionage groups. More disruptive cyber attacks can even hamper operations within healthcare providers.

    Join us on September 17 at 9 a.m. PT/12 p.m. ET, as FireEye and Beazley present a webinar that discusses the latest breach and threat landscape trends for this sector.
  • Double Dragon: APT41, a Dual Espionage and Cyber Crime Operation Recorded: Aug 29 2019 56 mins
    Jacqueline O'Leary,Principal Analyst; Raymond Leong, Principal Threat Analyst; Dan Perez, Principal Threat Analyst
    Defending the frontlines of cybersecurity is a never-ending battle, with new advanced persistent threat (APT) groups lurking to steal data, compromise infrastructure, and interfere with victim business operations. FireEye’s newly named threat group, APT41 is no exception. Their aggressive and consistent mode of operation, and highly sophisticated tactics, distinguishes them from other adversaries making them a double threat to contend with.

    APT41 uniquely balances espionage activity concurrently with financially motivated activity driven by personal gain. Since 2012 FireEye has observed APT41 conduct in a wide range of operations including data theft, innovative supply-chain attacks, and the use of unique tools and targeting techniques.

    Join this webinar to hear FireEye Threat Intelligence experts, Jacqueline O’Leary, Raymond Leong and Dan Perez, provide:

    •Insights into attribution and shared tactics between espionage and financially motivated operations
    •Supply chain compromises attributed to APT41 activity
    •Unique malware capabilities and techniques
    •Details on connections to identified personas
  • Higher Ed Cyber Threats: What you can do to defend your campus Recorded: Aug 27 2019 61 mins
    Barry Brummund CIO University of Arizona and Christian Schreiber Higher Education Cybersecurity Lead FireEye
    Colleges and universities face a variety of unique threats when it comes to cybersecurity. While allowing access to networks, institutions face a constant churn of new users, have to accommodate thousands of BYOD devices, and are often resource restrained. Cyber attacks can target valuable research data, as well as personal and financial information.

    In addition, it is critical that college and university leaders understand new federal cybersecurity regulations and security standards and ensure that institutions are in compliance.

    View this pn-demand web seminar to learn about the new cyber threat landscape in higher ed, how to ensure your institution is in compliance with recent federal cybersecurity regulations, and strategies to help you defend your campus.
  • Protecting the Academy: Cyber Threat Landscape for Higher Education Recorded: Aug 26 2019
    Luke McNamara, Principal Analyst, FireEye Threat Intelligence and Sue Yi, Breach Response Manager, Beazley
    From cyber espionage to hacktivism, colleges and universities present uniquely attractive targets to cyber criminals. These institutions possess vast amounts of student, alumni and donor information as well as cutting edge research and valuable intellectual property.

    Open networks and autonomous organization can make academic institutions harder to secure than corporate environments. In this webinar, our panel of experts share insights into:
    •The top cyber threats facing higher education institutions
    •New threats on the horizon
    •A case study of an actual network intrusion incident
    •Effective preparation and solutions for technical vulnerabilities
  • Ground Truth about the Cyber Skills Shortage Recorded: Aug 6 2019 25 mins
    Daniel Slack, Senior Manager, FireEye Managed Defense, FireEye & James Robinson, Deputy CISO, Netskope
    Cybersecurity executives and leaders are not the only cybersecurity experts feeling the pressure to do more with less in the age of the widening cyber skills gap. Cyber security practitioners, already at a disadvantage in the asymmetric battle for the fate of their company’s and customers’ networks, have much to teach the rest of us about how organizations can overcome the shortfall.

    Join Danny Slack, Senior Manager for FireEye Managed Defense, as he talks about stories and strategies from the cyber defender’s perspective.
  • CISO's Toolbox: Strategies for Success Recorded: Aug 6 2019 51 mins
    Deidre Diamond (CyberSN), Alyssa Miller (CDW) | Martin Holste (FireEye) | Mike Weber (CoalFire)
    What do CISOs need to be successful at their job? Discover the challenges CISOs are facing and the ways they are solving them.

    Join security experts as they discuss the strategies, processes and technologies CISOs use to protect their organizations in the age of breaches:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Speakers:
    - Deidre Diamond, CEO & Founder, CyberSN
    - Alyssa Miller, Manager, Information Security Solutions Practice, CDW
    - Martin Holste, Cloud CTO, FireEye
    - Mike Weber, Vice President, Coalfire
  • FireEye Chat: Cyber Security Skills Shortage Recorded: Jul 23 2019 30 mins
    Vasu Jakkal, EVP & CMO, Colin Carmichael, SVP & CIO and Jason Martin, EVP
    Front and Center with Colin Carmichael and Jason Martin on the Cyber Security Skills Shortage

    FireEye Chat, our quarterly talk show, brings guest experts front and center to cover today’s most important cyber security topics.
    In this episode, we address the growing cyber security skills gap, which is expected to reach 3.5 million by 2021.

    The rise of technology, combined with more complex cyber security products and cyber threats, have gradually increased the demand for experienced, trained experts to fill a growing number of critical security roles in industry and government worldwide.

    Join us as our FireEye Chat panel discusses:

    • An overview of the cyber skills gap
    • Current proposed solutions
    • A breakdown of how FireEye thinks about the challenge, as both a technology company and a security provider
  • How FireEye Protects FireEye Recorded: Jun 20 2019 60 mins
    Matt Shelton, Director, Technology Risk & Threat Intelligence, FireEye
    FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.

    In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:

    •Uses threat intelligence to proactively protect the organization
    •Detects threats using FireEye Network Security products
    •Responds to incidents with FireEye Endpoint Security
    •Leverages Helix as its security operations platform
    •Hunts for known and unknown threats within its environment.
  • Top 5 Cloud Security Myths Debunked Recorded: Jun 20 2019 55 mins
    Martin Holste, Cloud CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Join our webinar, which helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Help, my users have been hacked! What happened and how do I respond? Recorded: Jun 20 2019 38 mins
    Vinoo Thomas, Product Line Manager, FireEye
    A Breach Investigation Scenario Leveraging FireEye Endpoint Security

    FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.

    Join FireEye’s Vinoo Thomas as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
  • A Review of Cyber Resilience -- Past, Present, and Future Recorded: Jun 20 2019 45 mins
    Rob van der Ende, VP APJ, FireEye Mandiant & Naureen Rasul, Head of Cyber Practice Asia, Marsh Pacific
    Rapidly evolving threats and infiltration techniques have rendered traditional cyber defense strategies insufficient and ineffective. The emerging threat vectors and speed of change amplified by the digital transformation cannot be addressed by traditional means. Globally, laws are also changing to keep pace as cybercrime evolves, knowing no boundaries. Therefore, organizations must be nimble and agile to keep pace with policy changes, especially when expanding across different jurisdictions

    Join us as we discuss three strategic imperatives to strengthen cyber resilience:
    • Understand (know your threats) – Identify organization- and industry-specific cyber threats and regulations calls for robust strategies that include cross-disciplinary considerations.
    • Measure (know yourself) – Quantify the potential financial impact of cyber exposures to compare against the level of risk appetite acceptable to the board. This will determine the amount of investment necessary to mitigate and transfer any residual risk.
    • Manage (know what you can do) – Proactively manage cyber risks by having clear action plans based on your capabilities and capacities to protect against cyber criminals.

    While cyber-attacks are inevitable, proper preparation is the essential element that sets resilient organizations apart from the rest in managing risk, minimizing damage, and recovering quickly from any incidents.
  • The Cyber Skills Gap: A Practitioner’s Perspective Recorded: Jun 19 2019 52 mins
    Stanley Parret, Principal Consultant, FireEye Managed Defense
    The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.

    Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:

    -The impact of staffing shortages on security practitioners
    -How they’re being required to protect more with less
    -The options available to security teams who need to extend their capacity

    Register now for the webinar
  • Simplifying Security Operations with ONE Platform Recorded: Jun 19 2019 53 mins
    Ben Forster, Sr. Product Marketing Manager, FireEye
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • Cyber Threats and Elections: What You Need to Know Recorded: Jun 19 2019 39 mins
    Luke McNamara, Principal Intelligence Analyst, FireEye
    Election security has become a growing priority for governments and citizens alike on a global scale.
    While cyber-enabled interference and election tampering continues to make headlines, coverage of the root cause can seem unclear due to the wide range of differing threats facing entities within an election’s ecosystem.

    Join this webinar with Luke McNamara, Principal Analyst of Threat Intelligence, as he uncovers:
    • Frontline observances by FireEye of election-driven threat actors—and their key target areas
    • A risk framework for organizations to categorize election threat activities and targets
    • Beyond the enterprise, how these threats impact individuals and donors involved in political campaigns
    • Best practices used by FireEye and implemented by election administrators to reduce targeted cyber risks
    • The anticipated evolution of sophisticated attacker techniques in future elections
  • How To Train Your Email Security Dragon Recorded: Jun 19 2019 38 mins
    Gareth Fraser-King, Director, Product Marketing EMEA
    The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.

    Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
    - The state of the cyber landscape, specific to email security.
    - How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
    - Why is FireEye better at catching evolving attacks and how this can benefit you.
  • Green Demon Denied Recorded: Jun 19 2019 25 mins
    Shashwath Hegde, Solutions Architect, APAC
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Using Risk Management to Optimize Cybersecurity Costs Recorded: Jun 18 2019 47 mins
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Today’s Changing Threat Landscape Requires Agile Security
  • Live at: Nov 9 2016 4:00 pm
  • Presented by: Rajiv Raghunarayan, Sr. Director, Product Marketing, FireEye. Robert Westervelt, Research Manager, IDC.
  • From:
Your email has been sent.
or close