Hi [[ session.user.profile.firstName ]]

Connecting the Dots: the Importance of an Integrated Security Solution

As cyber threats continue to proliferate and expand, so does the arsenal of tools organizations employ to protect against the attackers. With most security solutions equipping to solve only narrow problems, it has become the norm for organizations to deploy an unbearable amount of technologies. Join Misha Sokolnikov, Director of Product Marketing, FireEye as he provides:

• An overview of why security solutions today are not integrated and cause complexity, inefficiencies and excessive alert noise
• The tactics that threat actors use to take advantage of disjointed, complex security technologies
• The most critical threat vectors and how the consolidation and integration of security tools can help you improve your security posture

Register Now!
Recorded Oct 24 2018 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Misha Sokolnikov, Director of Product Marketing, FireEye
Presentation preview: Connecting the Dots: the Importance of an Integrated Security Solution
  • Channel
  • Channel profile
  • M-Trends 2019: Trends Behind Today's Cyber Attacks Mar 14 2019 3:00 pm UTC 60 mins
    FireEye Mandiant Experts
    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from this year’s M-Trends 2019 Report, our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2018.

    Join us for this webinar, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition, including:

    • Evolving attack trends in today’s threat landscape
    • New advanced persistent threat (APT) groups that emerged in 2018
    • Hidden risks found across M&A business activities
    • Best practices lessons learned from the front lines of incident response


    Register for the webinar NOW!
  • Defending Against Cyber Threats Mar 7 2019 9:30 pm UTC 60 mins
    Sushila Nair (NTT Data Services), Stewart Bradley (SAS), Ken Bagnall (FireEye), Joseph Carson (Thycotic)
    "As cyber threats continue to grow, cyber vigilance is more critical than ever. How are CISOs and their security teams addressing the threat of cyber attacks like phishing, IoT-powered DDoS attacks, crippling ransomware or other attacks? How prepared are today's businesses to detect an attacker or launch the appropriate response?

    Join top security leader and experts as they discuss:
    - Top 5 cyber threats businesses face today
    - Notable cyber attack methods and strategies and how to protect against them
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today"
  • M-Trends 2019: Trends Behind Today’s Most Impactful Breaches and Cyber Attacks Mar 6 2019 4:30 pm UTC 30 mins
    Jurgen Kutcher, Executive Vice President, GSI, FireEye
    The cyber security landscape is constantly evolving, with attackers becoming more and more aggressive. Companies need to know what they’re up against to ensure they are fully prepared for when a breach occurs. Over the last decade, consultants from FireEye Mandiant have shared the latest cyber security investigations and trends from the front lines with the release of the annual M-Trends Report.

    Learn more about the latest developments from the newly launched M-Trends 2019 report. Get direct insight from Jurgen Kutscher, Executive Vice President, Service Delivery, FireEye as he highlights some of the report’s most interesting and impactful findings.

    Discussion topics will include:
    - Which trends in the cybersecurity landscape should we be more mindful of than in previous years
    - New/emerging security technologies and solutions becoming more important
    - Innovative ways the industry is addressing the skills gap
    - Examples of attackers taking advantage of cloud-related weaknesses
  • Top 5 Cloud Security Myths Debunked Feb 28 2019 5:00 pm UTC 60 mins
    Martin Holste, CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar on Thursday, February 28, helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • The Best Way to Assess Incident Response Preparedness Feb 21 2019 4:00 pm UTC 60 mins
    Jeff Laskowski, Security Consulting Director, FireEye Mandiant
    Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
    Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.

    In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:

    • Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
    • Assess your organization’s crisis management capabilities through the lens of an executive team
    • Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations

    Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
  • Facing Forward: Cyber Security in 2019 and Beyond Recorded: Dec 11 2018 57 mins
    Christopher Porter, Chief Intelligence Strategist, FireEye
    As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

    Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye Threat Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

    •Threats to the aviation industry, including cyber espionage and cybercrime
    •What to expect from established and emerging nation states
    •How threat actors are changing their tactics to stay ahead of defenders

    Register today to learn what lies ahead and stay one step ahead of cyber security threats.
  • Navigating Today’s Global Cyber Regulations – Regional Perspectives Recorded: Dec 3 2018 59 mins
    Ron Bushar, VP & Gov. CTO, FireEye, Michael Trevett, Director, FireEye & Heather Sussman, Partner, Ropes & Gray
    As the cyber threat landscape evolves, lawmakers are prompting organizations to protect their networks and handle sensitive information more mindfully with cyber security and breach notification laws that are stricter, carry higher penalties and result in further enforcement.

    Companies are spending more time and resources managing cyber security risks—but where should organizations focus their time, talent and spend? And how does a multinational organization navigate these complex regulatory requirements?

    Join Ron Bushar, VP and CTO of Government Solutions at FireEye, Michael Trevett, Director of Professional Services at FireEye Mandiant, and Heather Sussman, Partner at Ropes & Gray, as they share their security and legal expertise:

    • Executive perspectives on the impact changing security regulations has on how organizations are thinking about cyber security
    • Regional overviews of existing and upcoming regulations in North America, EMEA, and APAC
    • Impact of GDPR on regional business landscapes since its formal release in May
    • Influence of the SEC’s recent interpretive guidance on security risks and incident disclosures
    • Best practices for making cyber security a strategic priority and a competitive advantage


    Also don't miss "Leading with Threat Intelligence – How to Select the Right Security Provider," the first webinar in this two-part series aimed to help you be better prepared for what's to come in 2019. Register Now - https://www.brighttalk.com/webcast/7451/342393
  • Leading with threat intelligence – How to select the right security provider Recorded: Nov 29 2018 58 mins
    Nicholas Flores, Security Consulting Director, FireEye Mandiant
    Today’s sophisticated attackers often hide within the noise of abundant alerts generated by a myriad of security products. Limited budgets, a shortage of skilled security staff, and rigid regulatory requirements make it difficult for organizations to effectively identify and understand these threats—negatively affecting risk-based decision making and asset protection.

    Effective cyber security requires an understanding of who is likely to target you, and how they operate.

    As security leaders and executives turn to service providers to evaluate their security maturity, manage business risks and build sustainable security programs, they often ask ‘how do I select the right security partner for my organization?’

    Join Nick Flores, Security Consulting Director at FireEye Mandiant, as he shares insights and expertise on:

    • Selecting the right service provider for your organization
    • Realizing limitations of providers who apply traditional and compliance-focused approaches
    • Working with providers who intimately monitor attackers across the evolving threat landscape
    • Understanding the role of cyber threat intelligence in effective cyber security services
    • Asking the right questions of your security providers to enable critical business decisions

    Also, don't miss "Navigating Today’s Global Cyber Regulations – Regional Perspectives," the second webinar in this two-part series aimed to help you be better prepared for what's to come in 2019. https://www.brighttalk.com/webcast/7451/337259
  • Connecting the Dots: the Importance of an Integrated Security Solution Recorded: Oct 24 2018 51 mins
    Misha Sokolnikov, Director of Product Marketing, FireEye
    As cyber threats continue to proliferate and expand, so does the arsenal of tools organizations employ to protect against the attackers. With most security solutions equipping to solve only narrow problems, it has become the norm for organizations to deploy an unbearable amount of technologies. Join Misha Sokolnikov, Director of Product Marketing, FireEye as he provides:

    • An overview of why security solutions today are not integrated and cause complexity, inefficiencies and excessive alert noise
    • The tactics that threat actors use to take advantage of disjointed, complex security technologies
    • The most critical threat vectors and how the consolidation and integration of security tools can help you improve your security posture

    Register Now!
  • Executive Panel | Financial Services: Cyber Threats on the Horizon Recorded: Oct 24 2018 25 mins
    Kevin Taylor, EMEA VP; Sandra Joyce, VP, Global Intel Operations; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP
    Cyber threats plague the financial services industry:
    • Advanced persistent threat (APT) actors seek to support economic reforms and reach state goals
    • Financial threat actors seek financial gain through the direct theft of funds or the sale of stolen information
    • Disruptive threat actors and hacktivists seek to gain publicity, divert banks' attentions, or demonstrate a political motive

    Any one of these threats would increase activity in an industry, but the presence of all three likely accounts for the large number of intrusions in financial services organizations.

    Join us for a live video panel and get executive insights for critical topics relevant to the financial services industry, including the:
    • Nature of threats, as well as their motivations and tactics, techniques and procedures (TTPs)
    • Ripple effect consequences of geopolitics
    • Cost of a breach and importance of risk awareness in the boardroom
    • Need to keep GDPR a high priority
  • Autopsy of a real ICS case – TRITON Recorded: Oct 24 2018 47 mins
    David Grout, Director Technical, South EMEA, FireEye
    Mandiant responded to an incident in 2017 at a critical infrastructure organisation where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. This malware, called TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.

    Join David Grout, our Technical Director for South EMEA, for a live session and get insights into the technical framework details and the potential outcomes.
  • The Double-Edged Sword of Cloud Security Recorded: Oct 24 2018 31 mins
    Shashwath Hegde, Solutions Architect, APAC, FireEye
    In many ways, public cloud is more secure than a traditional data center. And yet, assets on the public cloud are still being compromised just as those stored in traditional data centers. Mandiant, the industry leader in incident response consulting, estimates that 15 percent of all of its incident response involves public cloud assets. So, if the cloud is more secure, why is it still getting hacked?

    In this session, we will discuss
    • the challenges in Cloud Security
    • how to design an effective strategy to tackle them
  • Panel: Responding to Evolving Threats With People, Intelligence & Technology Recorded: Oct 23 2018 59 mins
    Colin Connor, Director, AT&T; Jim Waggoner, Sr. Director, FireEye; Seth Summersett, Chief Scientist, FireEye
    Ransomware, application exploits, advanced persistent threats, all put your data, customer information and intellectual property in more danger than ever, putting your company’s reputation and revenue at risk. Even if you are able to protect yourself against today’s threats, you cannot stand still. Threats and threat actors are constantly evolving. You need to understand how the threats are evolving and what you need to do to protect yourself.

    In this expert panel discussion with Colin Connor Director, Threat Intelligence and Cyber Forensics at AT&T, Seth Summersett, Chief Scientist at FireEye and Jim Waggoner, Sr. Director of Product Management for Endpoint Security at FireEye, learn how threats are evolving, how companies are becoming more proactive in the response to the threats and how technology is changing to provide greater protection, detection and response to the emerging threats.
  • Cyber Security Risk Management –New Methods to Gain Control Recorded: Oct 23 2018 58 mins
    Matthew Keane, Sr. Director, FireEye, Travis Fry, Sr. Consultant, FireEye & Michelle Visser, Partner, Ropes & Gray
    Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.

    This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.

    Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:

    • Security risks across the complete cyber attack lifecycle, not only detection and response
    • A simple and proven method for approaching the risk reality facing all organizations
    • The rising cyber security insurance market and how it will affect risk management efforts
    • Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
    • Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
    • Best practice exercises to test your incident response plan based on real-world experiences
    • Techniques for effectively reporting risk and capability needs to a Board-level audience
  • How to Elevate Security as a Boardroom Priority Recorded: Oct 23 2018 61 mins
    Simon Moor, Director, Northern Europe, FireEye; Duncan Brown, Associate VP, European Infrastructure & Security, IDC EMEA
    Despite the continued focus on security and cyber-risk, most organisations demonstrate poor alignment between the business and security in the consideration of risk. This disconnect can start right at the beginning of a business process, where security is often not involved early enough (or at all) in strategic projects. Boardroom visibility of security threats is often weak, while the nature of security threats means that a continuous reassessment of risk is required, but rarely occurs.

    This webinar explores the gap between security and business risk, and examines the opportunities for alignment in Digital Trust, as a prerequisite for digital transformation.
  • Are you Ready to Handle a Cyber Crisis? Recorded: Oct 23 2018 59 mins
    Rob van der Ende, VP APJ, Mandiant, a FireEye company & Mimi Yang, Senior Foreign Legal Consultant Ropes & Gray
    How prepared are you and your organization to respond to a data breach?
    Executives and their teams in PR/Communications, Cybersecurity, IT, (external) Legal Counsel, and others, should all be intimately aware of the Breach Response Plan and practice their tasks regularly through a Cyber Breach Simulation, or Tabletop Exercise.

    Ropes & Gray and Mandiant have joined forces to help you evaluate your organization’s ability to respond effectively to a cyber incident before it occurs. The Tabletop Exercise uses gameplay techniques to assess your cyber crisis processes, tools and proficiency from legal, governance and technical perspectives. During the exercise, multiple scenarios based on real-world experience are simulated in a roundtable environment, allowing Ropes & Gray to provide concrete legal advice to your organization based on the results, including advice on potential enhancements to your organization’s cyber breach and incident response preparedness that Mandiant and Ropes & Gray identify through the exercise.

    About Ropes & Gray
    Ropes & Gray privacy & cybersecurity attorneys have advised and assisted clients in responding to cyberincidents of multiple shapes and sizes, including many of the largest incidents in history, and apply that extensive background to counsel clients on cybersecurity incident preparedness.

    About Mandiant
    Mandiant, a FireEye company, has over 14 years of near-daily interaction with organized, persistent attackers and threat groups around the world. Mandiant consultants spend hundreds of thousands of hours annually working with organizations of all sizes to remediate security breaches, identify vulnerabilities and provide guidance on closing security gaps.
  • Evolving to an Intel-led Security Organization Recorded: Oct 22 2018 51 mins
    Nigel Gardner, MGM Resorts Intl., Joseph O’Laughlin, FireEye; Jason Tuininga, FireEye
    Threat intelligence has the power to enhance an organization’s security effectiveness, improve its time-to-response, and reduce business risk. No matter where an organization is on the continuum of security operations maturity, threat intelligence can provide significant value. The question is, what is the best way to maximize that value? What advantages can you gain through simple process or technology changes to ensure that you’re ready to respond quickly to the threats that matter? Come hear from our experts about what threat intelligence can do for you, and hear from a FireEye customer who has made this journey, transforming its security operations to be intelligence-led.
  • Cyber Security in Today's IoT World Recorded: Oct 22 2018 41 mins
    Parnian Najafi Borazjani, Senior Analyst, FireEye
    IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.

    The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
    Moreover, device consumers such as corporations should be aware of their attack surface.

    Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
  • Your breach readiness master plan: take the sting out of a cyber attack Recorded: Oct 22 2018 61 mins
    Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant
    With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

    “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

    Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

    •How to identify security maturity improvement areas before, during and after a breach
    •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
    •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
    •Which key strategic communication tactics should be considered when reporting a breach
  • What Executives Should Know about Cyber AI Recorded: Oct 22 2018 54 mins
    Claudio Scarabello Director Product, APAC FireEye Inc
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Connecting the Dots: the Importance of an Integrated Security Solution
  • Live at: Oct 24 2018 3:00 pm
  • Presented by: Misha Sokolnikov, Director of Product Marketing, FireEye
  • From:
Your email has been sent.
or close