Hi [[ session.user.profile.firstName ]]

AI and the Future of Cyber Conflict

Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.

Additionally as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.

Join Michelle Cantos, Strategic Intelligence Analyst, for the final episode of our three-part series on AI as we discuss the:

• Changing geopolitical landscape as threat actors develop and implement AI capabilities
• Use of AI applications in businesses and associated vulnerabilities
Recorded May 24 2018 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michelle Cantos, Strategic Intelligence Analyst, FireEye
Presentation preview: AI and the Future of Cyber Conflict
  • Channel
  • Channel profile
  • How FireEye Protects FireEye Jun 20 2019 4:00 pm UTC 60 mins
    Matt Shelton, Director, Risk & Threat Intelligence & Risk Management
    FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.

    In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:

    •Uses threat intelligence to proactively protect the organization
    •Detects threats using FireEye Network Security products
    •Responds to incidents with FireEye Endpoint Security
    •Leverages Helix as its security operations platform
    •Hunts for known and unknown threats within its environment.
  • Top 5 Cloud Security Myths Debunked Jun 20 2019 1:00 pm UTC 55 mins
    Martin Holste, CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Join our webinar, which helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.

    Presented by: Martin Holste, Cloud CTO at FireEye
  • The Cyber Skills Gap: A Practitioner’s Perspective Jun 19 2019 6:00 pm UTC 60 mins
    Stanley Parret, Principal Consultant, FireEye Managed Defense
    The shortage of cybersecurity workers is a growing concern for the teams who are directly responsible for protecting the organization against cyber threats. It’s estimated that by 2021, 3.5 million cyber security positions will go unfilled.

    Join Stanley Parret, Principal Consultant for FireEye Managed Defense, for a look at the unforeseen challenges and consequences of the growing cyber skills gap, especially around protecting against advanced threats. In this webinar, we’ll discuss:

    -The impact of staffing shortages on security practitioners
    -How they’re being required to protect more with less
    -The options available to security teams who need to extend their capacity

    Register now for the webinar
  • Simplifying Security Operations with ONE Platform Jun 19 2019 4:00 pm UTC 60 mins
    Ben Forster, Sr. Product Marketing Manager, FireEye
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • Using Risk Management to Optimize Cybersecurity Costs Jun 18 2019 3:00 pm UTC 60 mins
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
  • Defensive Security Techniques You Can Use Now May 22 2019 3:00 pm UTC 60 mins
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennet and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • Understanding, Combating, and Identifying Insider Threats for Government Recorded: May 2 2019 56 mins
    Matt Shelton - Director of Technology Risk and Threat Intelligence
    There is no doubt that insider threats pose a significant risk to organizations and government agencies, as they can compromise sensitive and confidential data. Any accidental or malicious act by an employee can potentially lead to catastrophic incidents that threaten an organization’s security and reputation. The ability to identify, combat and protect against insider threats is critical to your organization’s security posture.

    Join FireEye’s Matt Shelton, Director of Technology Risk and Threat Intelligence as he discusses how organizations must stay vigilant against external threats while keeping a keen eye on the risk that insider threats pose.

    Matt will also address:
    •What an insider threat looks like to your organization
    •What assets and systems are targeted by inside threat actors
    •Steps to secure your organization against these threats
  • The Role of the General Counsel in Cyber Security Decision-Making Recorded: May 1 2019 18 mins
    Alexa King, EVP & General Counsel, FireEye; Karen Kukoda, Sr. Strategic Alliance Director, FireEye
    Long gone are the days when a single individual or team – whether IT not – would oversee cyber security at an enterprise. Savvy business leaders know that security is the responsibility of everyone, from the entry-level staffer on up to the board, and that a knowledgeable and prepared executive team can mean the difference between a minor incident and a major breach.

    One of the most important decision-makers when it comes to cyber security is the General Counsel (GC). No one knows this better than Alexa King, EVP and General Counsel at FireEye. In this video, Alexa sits down with Karen Kukoda, FireEye Senior Director of Strategic Alliances, to discuss not only the role the GC plays in cyber security, but also the duties of the board of directors in overseeing cyber security.

    Watch the video to learn about all of this and more:
    -How cyber risk has evolved and how we need to start thinking about it
    -Preventative measures GC should take and how they can educate their teams
    -Incident response planning and preparedness
    -How to include cyber risk partners to complement your team’s security strategy
  • A 360-Degree View of the Latest APT Groups Recorded: Apr 18 2019 58 mins
    Fred Plan, Sr. Threat Intel Analyst, FireEye
    FireEye analysts work to identify cyber espionage trends and gather the evidence needed to name APT groups.

    The most recently named groups—APT38, APT39, APT40—exemplify the variety of state-sponsored threats that network defenders face today: a North Korean operator specializing in bank heists, an Iranian group tracking personal data and specific individuals and a long-established Chinese actor shifting its targeting to reflect changing geopolitics.

    In this webinar, Fred Plan, Sr. Threat Intelligence Analyst at FireEye provides:

    • A high-level overview on how nation-state interests are driving APT activity
    • Insight into the most recent APT groups investigated by FireEye
    • The latest adversary tactics, techniques and procedures (TTPs) these groups use

    Register NOW for the live webinar
  • Code Triage: Why Healthcare is Facing More Cyber Attacks... Recorded: Apr 16 2019 53 mins
    Christopher Porter, Chief Intelligence Strategist, FireEye & Darrell Keeling, VP IT, PVH
    Code Triage: Why Healthcare is Facing More Cyber Attacks and How to Protect Your Organization

    Healthcare organizations face a number of unique security concerns, including the increasingly interconnected systems between doctors’ offices, hospitals, insurance companies, suppliers, etc. As such, healthcare is being targeted by multiple types of attackers: nuisance attackers (such as the creators of commodity malware), advanced persistent threat (APT) attackers, and cyber criminals. To battle such attackers, healthcare security teams need to understand:

    -Why healthcare is at risk / what threat actors are seeking / how they are doing it
    -Why email is the #1 threat vector in Healthcare and how to defend against it
    -Best practices and action items for a more robust security program
  • How to Develop and Implement an Effective Cloud Assurance Program for Government Recorded: Mar 19 2019 59 mins
    Ron Bushar, Vice President & CTO - Government Solutions
    As departments and agencies move business operations to the cloud, protecting assets and data remains top priority. Identifying the steps and actions needed to structure, develop, and implement effective security controls in this new environment is the critical first step.

    Where should you start? How do you prioritize activities? How can you leverage existing IT programs, processes, and policies that are already in place?

    Join FireEye’s Ron Bushar, Vice President & CTO - Government Solutions, as he shares steps and best practices to building a cloud assurance program, including:

    - Identifying roles and responsibilities of government, service provider, and third-party stakeholders
    - Adapting existing data classification scheme for cloud services and establishing a cloud-adapted risk assessment process
    - Implementing requirements baselines, risk assessments, and approaches to addressing unique risk scenarios
    - Selecting a cloud service delivery and deployment model
  • The Email Security Goal: ONE Single Solution Recorded: Mar 19 2019 50 mins
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • M-Trends 2019: Trends Behind Today's Cyber Attacks Recorded: Mar 14 2019 58 mins
    Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    Join us for this webinar, as experts, Chris Nutt, Managing Director, FireEye Mandiant and Nick Bennett, Director, FireEye Mandiant discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Hidden risks found across M&A business activities
    • Best practices lessons learned from the front lines of incident response

    Register for the webinar NOW!
  • FireEye Chat - Front and Center with Kevin Mandia and the Evolution of M-Trends Recorded: Mar 11 2019 20 mins
    Vasu Jakkal, EVP & CMO, FireEye; Kevin Mandia, CEO, FireEye
    FireEye Chat
    Front and Center with Today’s Leading Cyber Security Experts

    FireEye Chat is a new quarterly talk show that brings guest experts front and center to cover today’s most important cybersecurity topics.

    Episode #1: Front and Center with Kevin Mandia and the Evolution of M-Trends

    Our inaugural episode celebrates the 10-year anniversary of M-Trends, our annual report on the latest developments that define today’s threat landscape. Join host Vasu Jakkal, FireEye CMO and special guest Kevin Mandia, FireEye CEO as they discuss the report’s origin story and the people behind it. They also cover:
    • Key milestones in the evolution of the report
    • How M-Trends has raised awareness about the importance of cyber security
    • The most significant trends in today’s cyber threat landscape.

    Watch now to get unique insights, direct from the frontlines, in what promises to be a series of lively and thought-provoking exchanges.
  • The BIG Cyber Security Skills Gap Recorded: Mar 8 2019 48 mins
    Alistair E. Macrae, Systems Engineer, FireEye
    Attackers will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organizations face in recruiting and retaining skilled cyber professionals.

    During this webinar we will discuss the benefits and challenges of in-house vs. outsourcing of cyber security operations, and how this has been affected by a cyber-skills shortage within the industry with ‘on-demand’ resource being readily available when needed with real time insight and expertise of cyber breaches.
  • Defending Against Cyber Threats Recorded: Mar 7 2019 46 mins
    Sushila Nair (NTT Data Services), Liz Goldberg (SAS), Ken Bagnall (FireEye), Joseph Carson (Thycotic)
    "As cyber threats continue to grow, cyber vigilance is more critical than ever. How are CISOs and their security teams addressing the threat of cyber attacks like phishing, IoT-powered DDoS attacks, crippling ransomware or other attacks? How prepared are today's businesses to detect an attacker or launch the appropriate response?

    Join top security leader and experts as they discuss:
    - Top 5 cyber threats businesses face today
    - Notable cyber attack methods and strategies and how to protect against them
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today"
  • M-Trends 2019: Trends Behind Today’s Most Impactful Breaches and Cyber Attacks Recorded: Mar 6 2019 22 mins
    Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye & Rena Stern, Director, Product Marketing, Mandiant
    The cyber security landscape is constantly evolving, with attackers becoming more and more aggressive. Companies need to know what they’re up against to ensure they are fully prepared for when a breach occurs. Over the last decade, consultants from FireEye Mandiant have shared the latest cyber security investigations and trends from the front lines with the release of the annual M-Trends Report.

    Learn more about the latest developments from the newly launched M-Trends 2019 report. Get direct insight from Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye as he highlights some of the report’s most interesting and impactful findings.

    Discussion topics will include:
    - Which trends in the cybersecurity landscape should we be more mindful of than in previous years
    - New/emerging security technologies and solutions becoming more important
    - Innovative ways the industry is addressing the skills gap
    - Examples of attackers taking advantage of cloud-related weaknesses
  • MITRE ATT&CK Evaluation Framework Analysis Recorded: Mar 6 2019 45 mins
    David Grout, EMEA CTO, FireEye
    When EDR gives you Answers and not Alerts

    On February 13, MITRE released the results of its evaluation of FireEye Endpoint Security in a simulation of real-world attacks by APT3 (a Chinese government-backed adversary). Based on this evaluation and an independent scoring methodology, FireEye delivered the highest efficacy scores and the highest number of behavior-based detections and provided the most relevant contextual information about an attack.

    During this session, our EMEA CTO David Grout will present the MITRE Methodology and how to interpret it. We will discuss about metrics and capabilities highlighted during this process and how FireEye has been ranked the number #1 EDR in this test.
  • Top 5 Cloud Security Myths Debunked Recorded: Feb 28 2019 56 mins
    Martin Holste, CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar on Thursday, February 28, helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.

    Presented by: Martin Holste, Cloud CTO at FireEye
  • The Best Way to Assess Incident Response Preparedness Recorded: Feb 21 2019 56 mins
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: AI and the Future of Cyber Conflict
  • Live at: May 24 2018 3:00 pm
  • Presented by: Michelle Cantos, Strategic Intelligence Analyst, FireEye
  • From:
Your email has been sent.
or close