Hi [[ session.user.profile.firstName ]]

AI and the Future of Cyber Conflict

Adversarial use of artificial intelligence (AI) in cyberspace will lead to attacks that are more targeted, affect more people, and inflict more damage. It’s imperative that security professionals understand what this means for the future of conflict.

Additionally as more companies integrate AI applications into their businesses, they must understand the risks associated with this technology.

Join Michelle Cantos, Strategic Intelligence Analyst, for the final episode of our three-part series on AI as we discuss the:

• Changing geopolitical landscape as threat actors develop and implement AI capabilities
• Use of AI applications in businesses and associated vulnerabilities
Recorded May 24 2018 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michelle Cantos, Strategic Intelligence Analyst, FireEye
Presentation preview: AI and the Future of Cyber Conflict
  • Channel
  • Channel profile
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness Jun 9 2020 4:00 pm UTC 60 mins
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    - MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    - Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    - Impact of environmental drift on your security posture and how to plan for it
    - Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>
  • Take Control of Your Cloud Environments Jun 9 2020 3:00 pm UTC 60 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation Jun 9 2020 11:00 am UTC 60 mins
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye
    Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Security Validation enables you to:

    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT&CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The results can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • Security Validation - what is it and how can it improve security effectiveness? Jun 9 2020 9:00 am UTC 60 mins
    Mike Batten - VP Sales Engineering EMEA, FireEye
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • Intelligence-Driven Security Validation: Why Cyber Security needs Validation. Jun 9 2020 2:00 am UTC 60 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lacked the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high cost of their defenses.
    Security validation helps organizations validate and consolidate their existing security investments before throwing more tools at the problem. And by integrating and operationalizing threat intelligence, organizations can develop an effective, highly scalable security posture. During this session, you can learn how to achieve a more efficient, effective and future-proof security program through security validation.
  • Cloud Security for Government: A Conversation with the CyberWire and FireEye Recorded: May 28 2020 60 mins
    Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
    Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

    On May 28 at 1:00 PM ET, the CyberWire and FireEye subject matter experts will discuss how government IT managers can overcome these challenges and pave the way for a successful path forward. Our conversation will cover not only the state of cloud for government use, but also how to:

    - Gain greater visibility across hybrid, public, private, and multi-cloud environments
    - Achieve cloud compliance, enforcement, and control
    - Manage and mitigate risks in the cloud, from a CISO’s perspective
    - Secure the remote workforce
  • Integrating Better Intelligence for Better Security Recorded: May 27 2020 50 mins
    James Graham, Sr. PMM, FireEye ; Jeff Guilfoyle, CISSP, Solution Architect, FireEye; Finian Mackin, Sr. PM, Anomali
    Anomali and FireEye Mandiant Threat Intelligence: Integrating Better Intelligence for Better Security

    As attackers grow more resourceful and effective in their efforts to expose and compromise users and their data, it is becoming more important than ever to integrate effective cyber threat intelligence to drive better detection and apply added context to potential threats. Anomali’s addition of FireEye Mandiant Threat Intelligence to its App Store presents a scalable way to integrate industry-leading threat intelligence into your security systems and program.

    Join experts from FireEye and Anomali for a panel discussion surrounding the value of cyber threat intelligence, the need for increased integration of intelligence to drive better security, and the added value that a combined Anomali-FireEye solution can provide.​

    Register Now!
  • Navigating MAZE: Analysis of a Rising Ransomware Threat Recorded: May 21 2020 58 mins
    Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence & Jeremy Kennelly, Manager, Mandiant Threat Intelligence
    The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.

    Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.

    In this exclusive webinar, attendees will learn about:
    •Common intrusion vectors across MAZE ransomware incidents
    •Actors’ reliance upon open-source and commercially available attack tools
    •Data exfiltration techniques present across most MAZE ransomware incidents
  • 2020 Mandiant Security Effectiveness Report Findings Recorded: May 19 2020 60 mins
    Matt Hartley SVP Mandiant Strategy for FireEye Mandiant & Devon Goforth Sr Dir Security Instrumentation for FireEye Mandiant
    2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality

    Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

    The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.

    Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:

    - Do I have confidence in the effectiveness of my security controls?
    - Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
    - Am I stopping data leakage and protecting data integrity?
    - How can I simplify and standardize my security stack?
    - Do I have evidence to support communicating key metrics to executives?

    Register Now to Reserve Your Seat!
  • FireEye Helix Explained - Dashboards and Reports Recorded: May 19 2020 57 mins
    Sarah Cox, Sr Instructional Designer; John Dianni, Sr. Staff Instructor
    FireEye Helix enables organizations to take control of any incident from alert to fix, saving organizations valuable time, resources and effort. This unified security operations platform addresses traditional SIEM shortfalls while delivering highly efficient, low-maintenance security automation.

    Join us for the next session in a series of webinars, as our experts highlight:
    • Best practices and common use cases for Helix to boost the effectiveness of your security operations
    • Essential Helix features that improve visibility across your security operations platform
    • Guidance on creating custom dashboards to visualize your most important data
    • Options to use FireEye preconfigured custom dashboards to simplify the collection and visualization of compliance data
    • Ways to schedule reports and manage report subscriptions

    Follow along with a hands-on Helix demonstration that shows how to create and use dashboards and reports during the session. Stay with us after the presentation for an in-depth Q&A session with our experts.
  • Part 2: Security and Visibility for a Multi-Cloud World Recorded: May 15 2020 58 mins
    JR Wikes, FireEye Principal Systems Engineer, and Christopher Glidden, FireEye Solutions Architect
    Join us for part two of our security and visibility for a multi-cloud world webinar series, as we demonstrate Cloudvisory's capability to ensure visibility, compliance, and governance across multiple cloud environments.

    Cloudvisory solution is designed to provide:

    •Visibility into network data traffic for workloads, applications, and microservices
    •Ability to detect and remediate misconfigurations and malicious activities across multiple cloud providers
    •Compliance assurance standard benchmarks for CIS, PCI, HIPAA, GDPR, and compliance requirements
    •Ability to detect, alert, block, and quarantine attacks using cloud-native microsegmentation

    Save your seat today!

    Best Regards,

    The FireEye Team
  • Part 1: Security and Visibility for a Multi-Cloud World Recorded: May 14 2020 39 mins
    JR Wikes, FireEye Principal Systems Engineer, and Christopher Glidden, FireEye Solutions Architect
    Two-part Cloud Security Webinar Series: May 14,2020 | 1PM EST and May 15,2020 | 1PM EST

    FireEye continues to see risk when leveraging Public, Private, and Hybrid cloud infrastructure. The challenge of using cloud native controls for AWS, Azure, Kubernetes, OpenStack & even traditional virtualized and bare metal environments is a growing risk.

    So, how are organizations solving for shadow IT, poor visibility, and fragmented security management? Join FireEye solution experts for a two-part webinar series to explore how FireEye Cloudvisory is solving multi-cloud security challenges for IT and security business units.

    Common needs now include:

    •Gaining visibility of cloud assets, security controls, and security events from multiple cloud providers
    •Ensuring compliance and security controls are in place to mitigate risk
    •Automating governance policy to help prevent security incidents

    Save your seat today!

    Best Regards,

    The FireEye Team
  • Security Effectiveness Strategies Recorded: May 13 2020 59 mins
    General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Intel Consulting
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

    Register Now
  • FireEye Virtual Briefing - Morning Track Recorded: May 12 2020 112 mins
    Various
    CYBER RISK AND SECURITY EFFECTIVENESS IN THE DIGITAL AGE

    MANDIANT PERSPECTIVE ON THE THREAT ACTORS IN EUROPE
    Time: 11:00-11.40 (CET) - 10:00-10:40 (BST)
    Speaker: Adrien Bataille, Senior Consultant, Mandiant Consulting

    In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.

    HOW CYBER THREAT INTELLIGENCE HELPS YOU TO PRIORITIZE VULNERABILITIES PATCHING
    Time: 11.40-12.10 (CET) - 10:40-11:10 (BST)
    Speaker: Alexis Bourbion, Sales Consultant, Southern Europe

    We inevitably have hundreds, if not thousands, of applications publicly available in order to provide commerce to our customers. How can you ensure you stop cyber risk from affecting your business? In this session learn how Threat Intel can provide up-front knowledge to prioritise your focus.

    HOW TO UNDERSTAND AND COMMUNICATE CYBER SECURITY EFFECTIVENESS WITH QUANTIFIABLE, EVIDENCE-BASED DATA
    Time: 12.10-12.40 (CET) - 11:10-11:40 (BST)
    Speaker: Lluis Coma, EMEA Consulting Sales Engineer

    The world’s most serious breaches of 2020 are already in flight; the most catastrophic breaches of 2021 are already in the making. How can we tell if we are secure? Discover how we can measure, assess and define security effectiveness through an intelligence-driven approach.
  • Intelligence Led Threat Protection For SaaS-Mobile Environments Recorded: May 6 2020 60 mins
    Rob Ayoub, Sr. Product Marketing Manager, FireEye; Salah Nassar, VP of Marketing, CipherCloud, Inc.
    The continued migration to the cloud and the unprecedented rise in the number of employees working from home has created challenging security implications, leaving many organizations scrambling to gain needed visibility and control into their SaaS/Cloud usage. With employees working remotely, SOC teams need to see threats wherever their companies do business and the ability to reduce those threats as quickly as possible.

    In this webinar, we will discuss how FireEye’s detection capabilities can be combined with CipherCloud to stop malicious content from being shared.

    Register Now!
  • Top 5 Cloud Security Myths Debunked Recorded: May 5 2020 55 mins
    Martin Holste, CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Threat Intelligence Drives Effective Vulnerability Management Recorded: Apr 30 2020 57 mins
    Jared Semrau, Sr. Mgr.,Vulnerability and Exploitation, Mandiant; Kathleen Metrick, Analyst, Strategic Intelligence, Mandiant
    Organizations value cyber threat intelligence (CTI) because it helps their security teams stay focused on, and stay ahead of, the most impactful threats. One of the critical strategic and tactical roles that CTI plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk.

    Join us to hear FireEye Threat Intelligence experts, Jared Semrau and Kathleen Metrick share:
    • The importance of comprehensive CTI to drive better-informed vulnerability management decisions
    • Insight into how FireEye tracks, prioritizes and categorizes vulnerabilities to help organizations more effectively manage and mitigate the risks associated with these potential threats
    • The latest research findings around the speed and frequency of exploitation

    Register for the webinar
  • Defensive Security Techniques You Can Use Now Recorded: Apr 28 2020 59 mins
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennett and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • 5 Steps to Security Validation Recorded: Apr 27 2020 61 mins
    Major General Earl Matthews (USAF)
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we believe that our security teams are well trained and practiced when everything goes wrong. These assumptions result in financial and operational inefficiencies, defensive regression and an inability to determine if we are investing in the right areas to communicate the state of our security effectiveness to stakeholders.

    Join this webinar to hear from Retired Major General Earl Matthews (USAF), as he discusses:

    • How to move beyond assumptions with automated and continuous security controls validation
    • Identify and measure vulnerability gaps
    • Manage and suggest remediation steps by arming security practitioners with meaningful evidence
    • Validate an organization's ability to defend itself by using real adversary behaviors

    Save your seat today!
  • More Cloud, More Problems? Recorded: Apr 21 2020 52 mins
    Martin Holste, Cloud CTO, FireEye
    The cloud is more pervasive in our organizations and our lives. But security operations centers (SOCs) can keep up, even when their organization adopts multiple public cloud and SaaS solutions.

    Join this webinar to ensure that your organization’s cloud strategy is less of a problem than you might think. Expert Martin Holste, Cloud CTO at FireEye, shares:

    • Trade-offs and nuances between cloud providers
    • Considerations that can affect your strategic direction
    • Seasoned guidance on how to optimize your cloud migration
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: AI and the Future of Cyber Conflict
  • Live at: May 24 2018 3:00 pm
  • Presented by: Michelle Cantos, Strategic Intelligence Analyst, FireEye
  • From:
Your email has been sent.
or close