Hi [[ session.user.profile.firstName ]]

AI and the Future of Cyber Conflict

Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.

Additionally as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.

Join Michelle Cantos, Strategic Intelligence Analyst, for the final episode of our three-part series on AI as we discuss the:

• Changing geopolitical landscape as threat actors develop and implement AI capabilities
• Use of AI applications in businesses and associated vulnerabilities
Recorded May 24 2018 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michelle Cantos, Strategic Intelligence Analyst, FireEye
Presentation preview: AI and the Future of Cyber Conflict
  • Channel
  • Channel profile
  • Investigation on Demand: Use Cases for SOC support Recorded: Jan 14 2020 24 mins
    Jeff Guilfoyle, CISSP, Solution Architect, FireEye
    Set against increasingly resourceful and unpredictable attackers, modern digital organizations need flexible options for solving problems and doing more with less.

    Unfortunately, security operation center (SOC) personnel are often left on their own to gather and analyze event information and decide whether and how to respond.

    Better investigations can lead to better decision-making during security events. And FireEye Expertise On Demand can help your SOC personnel pursue investigations more effectively.

    Join the webinar to find out how.
  • FireEye's Perspective on Iranian Attacks and Practical Mitigations Recorded: Jan 13 2020 50 mins
    Benjamin Read, Senior Manager, Cyber Espionage Analysis, FireEye
    FireEye's Perspective on Iranian Attacks and Practical Mitigations
    Make Better-Informed Decisions and Protect Your Organization

    The recent tension between Iran and the U.S. has increased the likelihood of Iranian action against U.S. and Gulf entities. While the exact nature, timing, and targets of any response from Iran is uncertain, FireEye Threat Intelligence analysts assess with moderate confidence that it will include a cyber component.

    Watch this complimentary on-demand webinar, as Ben Read, Sr. Manager, Cyber Espionage Analysis provides:
    •An overview of FireEye’s perspective on the current threat landscape from Iran
    •Tactics recently employed by Iranian groups like APT33, APT34 and others
    •Recommended mitigations to protect your organization from these groups
  • FireEye Chat - Front and Center: Insights into 2020 and Beyond Recorded: Dec 16 2019 23 mins
    Vasu Jakal, CMO, FireEye; Alexa King, EVP, General Counsel FireEye; Luke McNamara, Principal Analyst FireEye
    “The Road Ahead: Cyber Security Predictions in 2020 and Beyond” provides insights into what to expect from attackers, victim organizations, security vendors and nation-states. In the next episode of the quarterly talk show FireEye Chat, we dive deeper into two of the report’s topics: election security and the emerging role of the general counsel.

    At least 70 percent of organizations say that they believe their security risk has increased significantly from the previous year.* With constantly evolving attacks, risk management will continue to play a significant global role in all industries and high profile activities, including the upcoming presidential elections. Breach planning and mitigation will be even more critical.

    Join us as our expert FireEye Chat panel discusses:
    • The evolution of the cyber security landscape in 2020
    • Vote and election system corruption through cyber espionage and cyber influence efforts
    • Election risk framework
    • Best practices to reduce targeted cyber risk

    Watch Now!
  • The Road Ahead: Cyber Security in 2020 and Beyond Recorded: Nov 21 2019 55 mins
    Sarah Geary, Manager of Intelligence for Executives, FireEye
    As 2019 comes to a close, we walk away armed with even more knowledge about the threat actors and trends we can expect to continue in 2020 and beyond. Attackers innovate and grow more sophisticated, but there is a lot we can still do to prepare for upcoming compromise attempts and get ahead of the threats.

    On Thursday, November 21st at 8a PT/11a ET, join Sarah Geary, Manager of Intelligence for Executives at FireEye, as she shares her thoughts about cyber security in 2020. During the webinar, Sarah will touch on various topics discussed in our report, The Road Ahead: Cyber Security in 2020 and Beyond, including:

    • Geopolitics driving threat actors
    • Cyber influence operation developments
    • New criminal tactics in the underground
    • Trends in ransomware and supply chain attacks
  • The Shifting Balance: Expertise, Automation and the Future of Cybersecurity Recorded: Oct 7 2019 38 mins
    Evan Wright, Staff Data Scientist, FireEye
    The present and future of cybersecurity operations will address the skills gap by better utilizing our existing experts and creating more intelligent automation. An evolution is underway in cybersecurity to shift some of the cognitive load from human security experts to machines. When is a machine an appropriate solution and when do you really need a human expert?

    In this presentation, FireEye outlines a spectrum of automatability that helps us identify when a machine or a human expert may be the most effective approach to solving cybersecurity challenges. Multiple factors make up this spectrum, including data volume, and the underlying threat behavior's frequency and stability.

    Join Evan Wright, Staff Data Scientist with FireEye, as he covers:
    -Examples at different points on this automation spectrum, including malware identification, alert triage in the security operations center (SOC), and incident response
    -Domain examples that will demonstrate that machine learning solutions will continue to play an important role alongside human experts
  • Ransomware Cripples Local Governments: Prepare and Respond Recorded: Oct 1 2019 57 mins
    Tom Guarente Vice President External Affairs & Alliances U. S. Public Sector, FireEye, Inc., Jordan Nuce Senior Analyst Cybe
    From big cities to small towns, no government is immune to ransomware.
    Government Technology recently hosted a panel of cyber security experts to discuss how state and local government leaders can protect their most important assets from ransomware attacks – and what to do in the event they experience one.
    View on-demand now to:
    •Learn about trends in ransomware
    •Hear from the front lines of local government
    •Understand your options for handling an attack
  • FireEye Chat - Front and Center on SOC optimization Recorded: Sep 26 2019 24 mins
    Vasu Jakkal, EVP & CMO, FireEye; Seth Summersett, Chief Scientist, FireEye & Chris Schreiber, Product Strategist
    FireEye Chat, our quarterly talk show, brings guest experts front and center to cover today’s most important cyber security topics.

    In this episode, our FireEye panel discusses the complexity of security operations and its impact on organizational risk. A typical U.S. company uses an average of 85 security tools that generate over 10,000 alerts each day. With a little luck, organizations might discover a breach only after the attacker has been in their systems for an average of 78 days. The potential damage and risk as a result of operational inefficiencies is jaw-dropping.

    Join our host, Vasu Jakkal, Chief Marketing Officer, as she talks with Seth Summersett, Chief Scientist and Chris Schreiber, Product Strategist about why you need to work smarter, not harder. They will highlight:

    • How technology only solutions often cause security issues
    • What simple mindset shift is required to improve operational efficiency
    • The FireEye approach to help focus on high impact tasks and gain access to industry expertise
  • Strategic Solutions for Effective Network Security in the Cloud Recorded: Sep 26 2019 50 mins
    Rob Ayoub, FireEye; Baseer Balazadeh, Gigamon; Tom Adamski, AWS
    Everyone must work together to protect the cloud. While cloud providers focus on protecting their services and infrastructure, you must ensure that data flowing into the cloud doesn’t leave an opening for attackers.

    Join us on September 26 at 10 a.m. PT/1 p.m. ET, as experts, Rob Ayoub, Sr. Product Marketing Manager, FireEye, Baseer Balazadeh, Sr. Technical Marketing Engineer, Public Cloud, Gigamon and Tom Adamski, Sr. Solutions Architect, AWS present a webinar on how to:

    •Deploy a security infrastructure that helps you minimize risk by accurately detecting and quickly stopping advanced, targeted and other evasive attacks

    •Achieve greater cloud network visibility by ingesting and capturing traffic data from your cloud infrastructure

    •Apply intelligence to get actionable insights and speed detection and response

    •Fully integrate network forensics to accelerate alert investigation and breach mitigation
  • More Cloud, More Problems? Recorded: Sep 23 2019 53 mins
    Martin Holste, Cloud CTO, FireEye
    The cloud is more pervasive in our organizations and our lives. But security operations centers (SOCs) can keep up, even when their organization adopts multiple public cloud and SaaS solutions.

    Join this webinar to ensure that your organization’s cloud strategy is less of a problem than you might think. Expert Martin Holste, Cloud CTO at FireEye, shares:

    • Trade-offs and nuances between cloud providers
    • Considerations that can affect your strategic direction
    • Seasoned guidance on how to optimize your cloud migration
  • State of Emergency: Ransomware in Municipalities and Counties Recorded: Sep 18 2019 55 mins
    Lauren Burnell
    From big cities to small towns, no government is immune to ransomware. Cybercriminals have their eyes set on local government. How do local municipalities address the ever-growing risks of cyber-attack?

    This is an informative webinar with FireEye, CDW, and Carahsoft where you’ll learn how state and local government leaders can protect their most important assets from ransomware attacks and what to do in the event they experience one.

    Attendees of this complimentary session will get to:

    Learn about trends in ransomware
    Hear from the front lines of your local government
    Understand your options for handling an attack
  • Cyber Threats Impacting Healthcare Today Recorded: Sep 17 2019 58 mins
    Luke McNamara, Principal Intelligence Analyst, FireEye & Lauren T. Winchester, Breach Response Services Manager, Beazley
    For some time, the healthcare sector has faced a wide range of threat actors and adversary motivations. Today, data held by healthcare organizations—patient records, medical research, and more—remains at risk from cyber criminals and espionage groups. More disruptive cyber attacks can even hamper operations within healthcare providers.

    Join us on September 17 at 9 a.m. PT/12 p.m. ET, as FireEye and Beazley present a webinar that discusses the latest breach and threat landscape trends for this sector.
  • Double Dragon: APT41, a Dual Espionage and Cyber Crime Operation Recorded: Aug 29 2019 56 mins
    Jacqueline O'Leary,Principal Analyst; Raymond Leong, Principal Threat Analyst; Dan Perez, Principal Threat Analyst
    Defending the frontlines of cybersecurity is a never-ending battle, with new advanced persistent threat (APT) groups lurking to steal data, compromise infrastructure, and interfere with victim business operations. FireEye’s newly named threat group, APT41 is no exception. Their aggressive and consistent mode of operation, and highly sophisticated tactics, distinguishes them from other adversaries making them a double threat to contend with.

    APT41 uniquely balances espionage activity concurrently with financially motivated activity driven by personal gain. Since 2012 FireEye has observed APT41 conduct in a wide range of operations including data theft, innovative supply-chain attacks, and the use of unique tools and targeting techniques.

    Join this webinar to hear FireEye Threat Intelligence experts, Jacqueline O’Leary, Raymond Leong and Dan Perez, provide:

    •Insights into attribution and shared tactics between espionage and financially motivated operations
    •Supply chain compromises attributed to APT41 activity
    •Unique malware capabilities and techniques
    •Details on connections to identified personas
  • Higher Ed Cyber Threats: What you can do to defend your campus Recorded: Aug 27 2019 61 mins
    Barry Brummund CIO University of Arizona and Christian Schreiber Higher Education Cybersecurity Lead FireEye
    Colleges and universities face a variety of unique threats when it comes to cybersecurity. While allowing access to networks, institutions face a constant churn of new users, have to accommodate thousands of BYOD devices, and are often resource restrained. Cyber attacks can target valuable research data, as well as personal and financial information.

    In addition, it is critical that college and university leaders understand new federal cybersecurity regulations and security standards and ensure that institutions are in compliance.

    View this on-demand web seminar to learn about the new cyber threat landscape in higher ed, how to ensure your institution is in compliance with recent federal cybersecurity regulations, and strategies to help you defend your campus.
  • Protecting the Academy: Cyber Threat Landscape for Higher Education Recorded: Aug 26 2019
    Luke McNamara, Principal Analyst, FireEye Threat Intelligence and Sue Yi, Breach Response Manager, Beazley
    From cyber espionage to hacktivism, colleges and universities present uniquely attractive targets to cyber criminals. These institutions possess vast amounts of student, alumni and donor information as well as cutting edge research and valuable intellectual property.

    Open networks and autonomous organization can make academic institutions harder to secure than corporate environments. In this webinar, our panel of experts share insights into:
    •The top cyber threats facing higher education institutions
    •New threats on the horizon
    •A case study of an actual network intrusion incident
    •Effective preparation and solutions for technical vulnerabilities
  • Ground Truth about the Cyber Skills Shortage Recorded: Aug 6 2019 25 mins
    Daniel Slack, Senior Manager, FireEye Managed Defense, FireEye & James Robinson, Deputy CISO, Netskope
    Cybersecurity executives and leaders are not the only cybersecurity experts feeling the pressure to do more with less in the age of the widening cyber skills gap. Cyber security practitioners, already at a disadvantage in the asymmetric battle for the fate of their company’s and customers’ networks, have much to teach the rest of us about how organizations can overcome the shortfall.

    Join Danny Slack, Senior Manager for FireEye Managed Defense, as he talks about stories and strategies from the cyber defender’s perspective.
  • CISO's Toolbox: Strategies for Success Recorded: Aug 6 2019 51 mins
    Deidre Diamond (CyberSN), Alyssa Miller (CDW) | Martin Holste (FireEye) | Mike Weber (CoalFire)
    What do CISOs need to be successful at their job? Discover the challenges CISOs are facing and the ways they are solving them.

    Join security experts as they discuss the strategies, processes and technologies CISOs use to protect their organizations in the age of breaches:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Speakers:
    - Deidre Diamond, CEO & Founder, CyberSN
    - Alyssa Miller, Manager, Information Security Solutions Practice, CDW
    - Martin Holste, Cloud CTO, FireEye
    - Mike Weber, Vice President, Coalfire
  • FireEye Chat: Cyber Security Skills Shortage Recorded: Jul 23 2019 30 mins
    Vasu Jakkal, EVP & CMO, Colin Carmichael, SVP & CIO and Jason Martin, EVP
    Front and Center with Colin Carmichael and Jason Martin on the Cyber Security Skills Shortage

    FireEye Chat, our quarterly talk show, brings guest experts front and center to cover today’s most important cyber security topics.
    In this episode, we address the growing cyber security skills gap, which is expected to reach 3.5 million by 2021.

    The rise of technology, combined with more complex cyber security products and cyber threats, have gradually increased the demand for experienced, trained experts to fill a growing number of critical security roles in industry and government worldwide.

    Join us as our FireEye Chat panel discusses:

    • An overview of the cyber skills gap
    • Current proposed solutions
    • A breakdown of how FireEye thinks about the challenge, as both a technology company and a security provider
  • How FireEye Protects FireEye Recorded: Jun 20 2019 60 mins
    Matt Shelton, Director, Technology Risk & Threat Intelligence, FireEye
    FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.

    In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:

    •Uses threat intelligence to proactively protect the organization
    •Detects threats using FireEye Network Security products
    •Responds to incidents with FireEye Endpoint Security
    •Leverages Helix as its security operations platform
    •Hunts for known and unknown threats within its environment.
  • Top 5 Cloud Security Myths Debunked Recorded: Jun 20 2019 55 mins
    Martin Holste, Cloud CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Join our webinar, which helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Help, my users have been hacked! What happened and how do I respond? Recorded: Jun 20 2019 38 mins
    Vinoo Thomas, Product Line Manager, FireEye
    A Breach Investigation Scenario Leveraging FireEye Endpoint Security

    FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.

    Join FireEye’s Vinoo Thomas as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: AI and the Future of Cyber Conflict
  • Live at: May 24 2018 3:00 pm
  • Presented by: Michelle Cantos, Strategic Intelligence Analyst, FireEye
  • From:
Your email has been sent.
or close