FireEye Global Threat Response – How we Protect the World
Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.
This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
RecordedOct 22 201857 mins
Your place is confirmed, we'll send you email reminders
Benjamin Read, Senior Manager, Cyber Espionage Analysis, FireEye
FireEye's Perspective on Iranian Attacks and Practical Mitigations
Make Better-Informed Decisions and Protect Your Organization
The recent tension between Iran and the U.S. has increased the likelihood of Iranian action against U.S. and Gulf entities. While the exact nature, timing, and targets of any response from Iran is uncertain, FireEye Threat Intelligence analysts assess with moderate confidence that it will include a cyber component.
Watch this complimentary on-demand webinar, as Ben Read, Sr. Manager, Cyber Espionage Analysis provides:
•An overview of FireEye’s perspective on the current threat landscape from Iran
•Tactics recently employed by Iranian groups like APT33, APT34 and others
•Recommended mitigations to protect your organization from these groups
Vasu Jakal, CMO, FireEye; Alexa King, EVP, General Counsel FireEye; Luke McNamara, Principal Analyst FireEye
“The Road Ahead: Cyber Security Predictions in 2020 and Beyond” provides insights into what to expect from attackers, victim organizations, security vendors and nation-states. In the next episode of the quarterly talk show FireEye Chat, we dive deeper into two of the report’s topics: election security and the emerging role of the general counsel.
At least 70 percent of organizations say that they believe their security risk has increased significantly from the previous year.* With constantly evolving attacks, risk management will continue to play a significant global role in all industries and high profile activities, including the upcoming presidential elections. Breach planning and mitigation will be even more critical.
Join us as our expert FireEye Chat panel discusses:
• The evolution of the cyber security landscape in 2020
• Vote and election system corruption through cyber espionage and cyber influence efforts
• Election risk framework
• Best practices to reduce targeted cyber risk
Sarah Geary, Manager of Intelligence for Executives, FireEye
As 2019 comes to a close, we walk away armed with even more knowledge about the threat actors and trends we can expect to continue in 2020 and beyond. Attackers innovate and grow more sophisticated, but there is a lot we can still do to prepare for upcoming compromise attempts and get ahead of the threats.
On Thursday, November 21st at 8a PT/11a ET, join Sarah Geary, Manager of Intelligence for Executives at FireEye, as she shares her thoughts about cyber security in 2020. During the webinar, Sarah will touch on various topics discussed in our report, The Road Ahead: Cyber Security in 2020 and Beyond, including:
• Geopolitics driving threat actors
• Cyber influence operation developments
• New criminal tactics in the underground
• Trends in ransomware and supply chain attacks
The present and future of cybersecurity operations will address the skills gap by better utilizing our existing experts and creating more intelligent automation. An evolution is underway in cybersecurity to shift some of the cognitive load from human security experts to machines. When is a machine an appropriate solution and when do you really need a human expert?
In this presentation, FireEye outlines a spectrum of automatability that helps us identify when a machine or a human expert may be the most effective approach to solving cybersecurity challenges. Multiple factors make up this spectrum, including data volume, and the underlying threat behavior's frequency and stability.
Join Evan Wright, Staff Data Scientist with FireEye, as he covers:
-Examples at different points on this automation spectrum, including malware identification, alert triage in the security operations center (SOC), and incident response
-Domain examples that will demonstrate that machine learning solutions will continue to play an important role alongside human experts
Tom Guarente Vice President External Affairs & Alliances U. S. Public Sector, FireEye, Inc., Jordan Nuce Senior Analyst Cybe
From big cities to small towns, no government is immune to ransomware.
Government Technology recently hosted a panel of cyber security experts to discuss how state and local government leaders can protect their most important assets from ransomware attacks – and what to do in the event they experience one.
View on-demand now to:
•Learn about trends in ransomware
•Hear from the front lines of local government
•Understand your options for handling an attack
FireEye Chat, our quarterly talk show, brings guest experts front and center to cover today’s most important cyber security topics.
In this episode, our FireEye panel discusses the complexity of security operations and its impact on organizational risk. A typical U.S. company uses an average of 85 security tools that generate over 10,000 alerts each day. With a little luck, organizations might discover a breach only after the attacker has been in their systems for an average of 78 days. The potential damage and risk as a result of operational inefficiencies is jaw-dropping.
Join our host, Vasu Jakkal, Chief Marketing Officer, as she talks with Seth Summersett, Chief Scientist and Chris Schreiber, Product Strategist about why you need to work smarter, not harder. They will highlight:
• How technology only solutions often cause security issues
• What simple mindset shift is required to improve operational efficiency
• The FireEye approach to help focus on high impact tasks and gain access to industry expertise
Rob Ayoub, FireEye; Baseer Balazadeh, Gigamon; Tom Adamski, AWS
Everyone must work together to protect the cloud. While cloud providers focus on protecting their services and infrastructure, you must ensure that data flowing into the cloud doesn’t leave an opening for attackers.
Join us on September 26 at 10 a.m. PT/1 p.m. ET, as experts, Rob Ayoub, Sr. Product Marketing Manager, FireEye, Baseer Balazadeh, Sr. Technical Marketing Engineer, Public Cloud, Gigamon and Tom Adamski, Sr. Solutions Architect, AWS present a webinar on how to:
•Deploy a security infrastructure that helps you minimize risk by accurately detecting and quickly stopping advanced, targeted and other evasive attacks
•Achieve greater cloud network visibility by ingesting and capturing traffic data from your cloud infrastructure
•Apply intelligence to get actionable insights and speed detection and response
•Fully integrate network forensics to accelerate alert investigation and breach mitigation
From big cities to small towns, no government is immune to ransomware. Cybercriminals have their eyes set on local government. How do local municipalities address the ever-growing risks of cyber-attack?
This is an informative webinar with FireEye, CDW, and Carahsoft where you’ll learn how state and local government leaders can protect their most important assets from ransomware attacks and what to do in the event they experience one.
Attendees of this complimentary session will get to:
Learn about trends in ransomware
Hear from the front lines of your local government
Understand your options for handling an attack
Luke McNamara, Principal Intelligence Analyst, FireEye & Lauren T. Winchester, Breach Response Services Manager, Beazley
For some time, the healthcare sector has faced a wide range of threat actors and adversary motivations. Today, data held by healthcare organizations—patient records, medical research, and more—remains at risk from cyber criminals and espionage groups. More disruptive cyber attacks can even hamper operations within healthcare providers.
Join us on September 17 at 9 a.m. PT/12 p.m. ET, as FireEye and Beazley present a webinar that discusses the latest breach and threat landscape trends for this sector.
Jacqueline O'Leary,Principal Analyst; Raymond Leong, Principal Threat Analyst; Dan Perez, Principal Threat Analyst
Defending the frontlines of cybersecurity is a never-ending battle, with new advanced persistent threat (APT) groups lurking to steal data, compromise infrastructure, and interfere with victim business operations. FireEye’s newly named threat group, APT41 is no exception. Their aggressive and consistent mode of operation, and highly sophisticated tactics, distinguishes them from other adversaries making them a double threat to contend with.
APT41 uniquely balances espionage activity concurrently with financially motivated activity driven by personal gain. Since 2012 FireEye has observed APT41 conduct in a wide range of operations including data theft, innovative supply-chain attacks, and the use of unique tools and targeting techniques.
Join this webinar to hear FireEye Threat Intelligence experts, Jacqueline O’Leary, Raymond Leong and Dan Perez, provide:
•Insights into attribution and shared tactics between espionage and financially motivated operations
•Supply chain compromises attributed to APT41 activity
•Unique malware capabilities and techniques
•Details on connections to identified personas
Barry Brummund CIO University of Arizona and Christian Schreiber Higher Education Cybersecurity Lead FireEye
Colleges and universities face a variety of unique threats when it comes to cybersecurity. While allowing access to networks, institutions face a constant churn of new users, have to accommodate thousands of BYOD devices, and are often resource restrained. Cyber attacks can target valuable research data, as well as personal and financial information.
In addition, it is critical that college and university leaders understand new federal cybersecurity regulations and security standards and ensure that institutions are in compliance.
View this on-demand web seminar to learn about the new cyber threat landscape in higher ed, how to ensure your institution is in compliance with recent federal cybersecurity regulations, and strategies to help you defend your campus.
Luke McNamara, Principal Analyst, FireEye Threat Intelligence and Sue Yi, Breach Response Manager, Beazley
From cyber espionage to hacktivism, colleges and universities present uniquely attractive targets to cyber criminals. These institutions possess vast amounts of student, alumni and donor information as well as cutting edge research and valuable intellectual property.
Open networks and autonomous organization can make academic institutions harder to secure than corporate environments. In this webinar, our panel of experts share insights into:
•The top cyber threats facing higher education institutions
•New threats on the horizon
•A case study of an actual network intrusion incident
•Effective preparation and solutions for technical vulnerabilities
Daniel Slack, Senior Manager, FireEye Managed Defense, FireEye & James Robinson, Deputy CISO, Netskope
Cybersecurity executives and leaders are not the only cybersecurity experts feeling the pressure to do more with less in the age of the widening cyber skills gap. Cyber security practitioners, already at a disadvantage in the asymmetric battle for the fate of their company’s and customers’ networks, have much to teach the rest of us about how organizations can overcome the shortfall.
Join Danny Slack, Senior Manager for FireEye Managed Defense, as he talks about stories and strategies from the cyber defender’s perspective.
Deidre Diamond (CyberSN), Alyssa Miller (CDW) | Martin Holste (FireEye) | Mike Weber (CoalFire)
What do CISOs need to be successful at their job? Discover the challenges CISOs are facing and the ways they are solving them.
Join security experts as they discuss the strategies, processes and technologies CISOs use to protect their organizations in the age of breaches:
- What keeps CISOs up at night
- Strategies for breach prevention
- Strategies for making the most of AI technology and human talent
- Coping with analyst fatigue
- Threats on the horizon
- Recommendations for strengthening security
- Deidre Diamond, CEO & Founder, CyberSN
- Alyssa Miller, Manager, Information Security Solutions Practice, CDW
- Martin Holste, Cloud CTO, FireEye
- Mike Weber, Vice President, Coalfire
Vasu Jakkal, EVP & CMO, Colin Carmichael, SVP & CIO and Jason Martin, EVP
Front and Center with Colin Carmichael and Jason Martin on the Cyber Security Skills Shortage
FireEye Chat, our quarterly talk show, brings guest experts front and center to cover today’s most important cyber security topics.
In this episode, we address the growing cyber security skills gap, which is expected to reach 3.5 million by 2021.
The rise of technology, combined with more complex cyber security products and cyber threats, have gradually increased the demand for experienced, trained experts to fill a growing number of critical security roles in industry and government worldwide.
Join us as our FireEye Chat panel discusses:
• An overview of the cyber skills gap
• Current proposed solutions
• A breakdown of how FireEye thinks about the challenge, as both a technology company and a security provider
Matt Shelton, Director, Technology Risk & Threat Intelligence, FireEye
FireEye relentlessly protects its customers. But who protects FireEye? Join us for an overview of how FireEye uses its own products and services to protect itself from the same threats faced by customers.
In this webinar, Matt Shelton, FireEye Director of Technology Risk and Threat Intelligence, will reveal how FireEye:
•Uses threat intelligence to proactively protect the organization
•Detects threats using FireEye Network Security products
•Responds to incidents with FireEye Endpoint Security
•Leverages Helix as its security operations platform
•Hunts for known and unknown threats within its environment.
A Breach Investigation Scenario Leveraging FireEye Endpoint Security
FireEye spends thousands of hours annually investigating the world’s most impactful security breaches - you don’t have to stand alone when this happens to you. In this webinar, we will use a real-life scenario to dive deeper into how breaches are discovered and importantly, what security lessons can be learned.
Join FireEye’s Vinoo Thomas as we take a closer look at the discovery of credential harvesting and multiple compromised clients from a single compromised endpoint. Learn how investigation can be used to find and contain the impact of a breach in nearly any environment.
FireEye Global Threat Response – How we Protect the WorldTim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]56 mins