Hi [[ session.user.profile.firstName ]]

The Road Ahead: Cyber Security in 2020 and Beyond

As 2019 comes to a close, we walk away armed with even more knowledge about the threat actors and trends we can expect to continue in 2020 and beyond. Attackers innovate and grow more sophisticated, but there is a lot we can still do to prepare for upcoming compromise attempts and get ahead of the threats.

On Thursday, November 21st at 8a PT/11a ET, join Sarah Geary, Manager of Intelligence for Executives at FireEye, as she shares her thoughts about cyber security in 2020. During the webinar, Sarah will touch on various topics discussed in our report, The Road Ahead: Cyber Security in 2020 and Beyond, including:

• Geopolitics driving threat actors
• Cyber influence operation developments
• New criminal tactics in the underground
• Trends in ransomware and supply chain attacks
Recorded Nov 21 2019 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sarah Geary, Manager of Intelligence for Executives, FireEye
Presentation preview: The Road Ahead: Cyber Security in 2020 and Beyond
  • Channel
  • Channel profile
  • Considerations for Evolving to Intelligence-Led Security Jun 9 2020 8:00 pm UTC 60 mins
    Gina Hill, Principle Consultant, Mandiant & Duke McDonald, Consultant, Mandiant
    An intelligence-led security posture and program recognizes that cyber threat intelligence has the potential to help keep organizations ahead of adversaries. The challenge is how to effectively and repeatedly make proper use of the intelligence that organizations collect and consume. Ultimately, organizations need to be able to understand the return on their threat intelligence investments.

    Mandiant Threat Intelligence experts Gina Hill and Duke McDonald present an in-depth explanation of what it means to be intelligence-led, how organizations should seek to increase intelligence maturity and capability, and how to get started on this journey.

    Join this session to learn:
    • The definition, characteristics and caveats of an intelligence-led security approach
    • Things to consider when assessing and evolving intelligence maturity
    • The importance of frameworks when assessing, measuring and executing on your strategy

    Register Now
  • Proactive Solutions to Stop Modern Ransomware in its Tracks Jun 9 2020 7:00 pm UTC 60 mins
    Nader Zaveri, IR Mgr; Matt Bromiley, Principal Consultant; Kimberly Goody, Sr. Mgr., Threat Intelligence
    Ransomware is one of the most active and profound cyber threats facing organizations today. Years after Wannacry attacks shuttered businesses across the globe, stealthy ransomware infections continuously dominate headlines and board discussions. Attackers have developed advanced techniques that now require organizations to apply a holistic security risk mitigation strategy from the C-suite to practitioners.

    This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:

    • Learn modern ransomware trends and attacker behaviors observed on the frontlines
    • Realize why proactive assessment is critical when preparing for and preventing ransomware
    • Understand how threat intelligence, hunting, and response provides the decision support and detection needed to outmaneuver ransomware actors
    • Implement effective mitigation strategies to stop ransomware attackers in their tracks

    Register today to join Nader Zaveri – Incident Response Manager, Matt Bromiley – Managed Defense Principal Consultant, and Kimberly Goody – Threat Intelligence Senior Manager, as they provide expert insights on modern-day ransomware attacks and how best to mitigate them.
  • Rethink Cyber Defense Strategies Starting with Threats Jun 9 2020 6:00 pm UTC 60 mins
    Peter Watts, former Director for Cybersecurity Policy, National Security Council
    Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
    Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces.
    In this session, Peter Watts, threat intelligence veteran and former Director for Cybersecurity Policy, National Security Council lays out:

    • A modern definition of threat intelligence with important milestones
    • How to recognize and develop critical success factors for producing or consuming threat intelligence
    • The impact of actionable threat intelligence on security risk leaders and their organizations
    • Future use cases that may reshape how we think about cyber defense and business value
  • Tips for Securing Your Cloud Environments Jun 9 2020 5:00 pm UTC 60 mins
    Chris Romano, Mandiant Senior Consultant and Greg Blaum, Mandiant Principal Consultant
    For the last several years, organizations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organizations fail to fully understand the security controls they have at their disposal and fail to effectively harden their cloud environments against attack. As a result, FireEye Mandiant experts have observed a significant rise in cloud-related breaches driven by both targeted and opportunistic threat actors over the past several years.

    In this session, Mandiant consultants Greg Blaum and Chris Romano share lessons learned from real-world incident response experiences, identify some common pitfalls and provide best practices for organizations to harden their cloud environments and reduce the risk of compromise. They also discuss the pitfalls and best practices presented in M-Trends 2020.
  • How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness Jun 9 2020 4:00 pm UTC 60 mins
    Chris Key, Sr. VP Mandiant Security Validation featuring Josh Zelonis, Principal Analyst, Forrester
    Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

    With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations.

    Join this webinar on Tuesday, June 9 at 9 a.m. PT/ 12 p.m. ET as FireEye Sr. VP of Mandiant Security Validation, Chris Key and featured speaker, Forrester Principal Analyst, John Zelonis highlight the:

    - MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
    - Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
    - Impact of environmental drift on your security posture and how to plan for it
    - Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure

    Register Now>>
  • Take Control of Your Cloud Environments Jun 9 2020 3:00 pm UTC 60 mins
    Martin Holste, Cloud CTO; Lisun Kung, Sr. Director; Joshua Bass, Sr. Manager; Matthew McWhirt, Mandiant Director
    Complex cloud environments are a reality for many enterprises and organizations, and managing them is a requirement. But it can be done. Learn firsthand how FireEye delivers world-class capabilities to prevent, detect, and respond to security threats in and from the cloud.

    This Virtual Summit session covers:
    -Ways to gain greater visibility across hybrid, public, private, and multi-cloud environments
    -Expectations of the shared responsibility model
    -Pitfalls when approaching a move to the cloud
    -Best practices based on real-world use cases

    Register Now!
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation Jun 9 2020 11:00 am UTC 60 mins
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye
    Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Security Validation enables you to:

    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT&CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The results can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • Security Validation - what is it and how can it improve security effectiveness? Jun 9 2020 9:00 am UTC 60 mins
    Mike Batten - VP Sales Engineering EMEA, FireEye
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • An Intelligence Driven Approach to Security Validation Jun 9 2020 2:00 am UTC 60 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • FireEye Chat | Front and Center: How to Empower. Evolve. Defend. Recorded: Jun 5 2020 28 mins
    Vasu Jakkal CMO, FireEye; General Earl Matthews VP, Strategy, Mandiant Security Validation; Martin Holste Cloud CTO, FireEye
    Cyber attackers never rest, but neither does FireEye. In our upcoming Virtual Summit on June 9-11, industry professionals will showcase best practices, research and strategies to empower organizations to evolve their cyber security solutions and better defend against attackers.

    In this latest episode of the quarterly talk show FireEye Chat, we dive deeper into two topics from the virtual summit: security effectiveness and cloud security. Watch now to hear from our experts who are front and center from their homes as they tackle these common questions:

    • How secure are you? And can we be sure we’re protected against the evolving threat landscape?
    • Are your cyber security products effective and working the way they should?
    • Do you know how to be secure in the cloud?
    • What should you consider when moving to the cloud?
  • Defending your OT Network: The Anatomy of a Cyber Attack Recorded: Jun 3 2020 59 mins
    Neal Gay, Sr. Manager - Managed Defense, FireEye Daniel Kapellmann Zafra, Technical Analysis Manager, FireEye
    You’ve checked all the standard cyber security boxes, giving you a sense of security and a plan in place. The problem is – what if it’s a false sense of security? All of your planning has secured the information technology (IT) side, while at the same time your operational technology (OT) is left wide open.

    While consolidation is happening, it’s still a dangerous gap that begs the questions:
    •Are we doing enough to anticipate threats and prevent, detect, and quickly respond to cyber attacks?
    •Do we know our OT environment and have we implemented adequate security measures to protect our most critical assets?
    •Are we developing an intelligence driven, risk-based plan, timeline, and budget?
    •Have we done a recent risk assessment and developed a plan to address known risks?
    •Will we have a good explanation to give our leadership and constituents when attacks do happen?

    Register now for this complimentary webinar to learn more on FireEye’s analysis of a cyber attack and how you can better prepare to defend your organization.

    Have Questions? Contact Kerry Best at kerry.best@fireeye.com with your questions or to get connected with your FireEye expert.
  • Cloud Security for Government: A Conversation with the CyberWire and FireEye Recorded: May 28 2020 60 mins
    Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
    Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

    On May 28 at 1:00 PM ET, the CyberWire and FireEye subject matter experts will discuss how government IT managers can overcome these challenges and pave the way for a successful path forward. Our conversation will cover not only the state of cloud for government use, but also how to:

    - Gain greater visibility across hybrid, public, private, and multi-cloud environments
    - Achieve cloud compliance, enforcement, and control
    - Manage and mitigate risks in the cloud, from a CISO’s perspective
    - Secure the remote workforce
  • Integrating Better Intelligence for Better Security Recorded: May 27 2020 50 mins
    James Graham, Sr. PMM, FireEye ; Jeff Guilfoyle, CISSP, Solution Architect, FireEye; Finian Mackin, Sr. PM, Anomali
    Anomali and FireEye Mandiant Threat Intelligence: Integrating Better Intelligence for Better Security

    As attackers grow more resourceful and effective in their efforts to expose and compromise users and their data, it is becoming more important than ever to integrate effective cyber threat intelligence to drive better detection and apply added context to potential threats. Anomali’s addition of FireEye Mandiant Threat Intelligence to its App Store presents a scalable way to integrate industry-leading threat intelligence into your security systems and program.

    Join experts from FireEye and Anomali for a panel discussion surrounding the value of cyber threat intelligence, the need for increased integration of intelligence to drive better security, and the added value that a combined Anomali-FireEye solution can provide.​

    Register Now!
  • Navigating MAZE: Analysis of a Rising Ransomware Threat Recorded: May 21 2020 58 mins
    Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence & Jeremy Kennelly, Manager, Mandiant Threat Intelligence
    The MAZE family of ransomware has been actively distributed by threat actors since at least May 2019. Starting in November 2019, Mandiant Threat Intelligence observed MAZE operators begin to combine traditional ransomware attacks with corresponding data theft and extortion demands. Today, the actors behind the MAZE operation now maintain a public-facing website where they post data stolen from victims who refuse to pay their extortion fee.

    Join Mandiant Threat Intelligence for a deep dive into the MAZE ransomware operation, including details shared by impacted organizations, and insight into the tactics, techniques and procedures used throughout these prolific and damaging attacks.

    In this exclusive webinar, attendees will learn about:
    •Common intrusion vectors across MAZE ransomware incidents
    •Actors’ reliance upon open-source and commercially available attack tools
    •Data exfiltration techniques present across most MAZE ransomware incidents
  • 2020 Mandiant Security Effectiveness Report Findings Recorded: May 19 2020 60 mins
    Matt Hartley SVP Mandiant Strategy for FireEye Mandiant & Devon Goforth Sr Dir Security Instrumentation for FireEye Mandiant
    2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality

    Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

    The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.

    Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:

    - Do I have confidence in the effectiveness of my security controls?
    - Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
    - Am I stopping data leakage and protecting data integrity?
    - How can I simplify and standardize my security stack?
    - Do I have evidence to support communicating key metrics to executives?

    Register Now to Reserve Your Seat!
  • FireEye Helix Explained - Dashboards and Reports Recorded: May 19 2020 57 mins
    Sarah Cox, Sr Instructional Designer; John Dianni, Sr. Staff Instructor
    FireEye Helix enables organizations to take control of any incident from alert to fix, saving organizations valuable time, resources and effort. This unified security operations platform addresses traditional SIEM shortfalls while delivering highly efficient, low-maintenance security automation.

    Join us for the next session in a series of webinars, as our experts highlight:
    • Best practices and common use cases for Helix to boost the effectiveness of your security operations
    • Essential Helix features that improve visibility across your security operations platform
    • Guidance on creating custom dashboards to visualize your most important data
    • Options to use FireEye preconfigured custom dashboards to simplify the collection and visualization of compliance data
    • Ways to schedule reports and manage report subscriptions

    Follow along with a hands-on Helix demonstration that shows how to create and use dashboards and reports during the session. Stay with us after the presentation for an in-depth Q&A session with our experts.
  • Part 2: Security and Visibility for a Multi-Cloud World Recorded: May 15 2020 58 mins
    JR Wikes, FireEye Principal Systems Engineer, and Christopher Glidden, FireEye Solutions Architect
    Join us for part two of our security and visibility for a multi-cloud world webinar series, as we demonstrate Cloudvisory's capability to ensure visibility, compliance, and governance across multiple cloud environments.

    Cloudvisory solution is designed to provide:

    •Visibility into network data traffic for workloads, applications, and microservices
    •Ability to detect and remediate misconfigurations and malicious activities across multiple cloud providers
    •Compliance assurance standard benchmarks for CIS, PCI, HIPAA, GDPR, and compliance requirements
    •Ability to detect, alert, block, and quarantine attacks using cloud-native microsegmentation

    Save your seat today!

    Best Regards,

    The FireEye Team
  • Part 1: Security and Visibility for a Multi-Cloud World Recorded: May 14 2020 39 mins
    JR Wikes, FireEye Principal Systems Engineer, and Christopher Glidden, FireEye Solutions Architect
    Two-part Cloud Security Webinar Series: May 14,2020 | 1PM EST and May 15,2020 | 1PM EST

    FireEye continues to see risk when leveraging Public, Private, and Hybrid cloud infrastructure. The challenge of using cloud native controls for AWS, Azure, Kubernetes, OpenStack & even traditional virtualized and bare metal environments is a growing risk.

    So, how are organizations solving for shadow IT, poor visibility, and fragmented security management? Join FireEye solution experts for a two-part webinar series to explore how FireEye Cloudvisory is solving multi-cloud security challenges for IT and security business units.

    Common needs now include:

    •Gaining visibility of cloud assets, security controls, and security events from multiple cloud providers
    •Ensuring compliance and security controls are in place to mitigate risk
    •Automating governance policy to help prevent security incidents

    Save your seat today!

    Best Regards,

    The FireEye Team
  • Security Effectiveness Strategies Recorded: May 13 2020 59 mins
    General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Intel Consulting
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

    Register Now
  • FireEye Virtual Briefing - Morning Track Recorded: May 12 2020 112 mins
    Various
    CYBER RISK AND SECURITY EFFECTIVENESS IN THE DIGITAL AGE

    MANDIANT PERSPECTIVE ON THE THREAT ACTORS IN EUROPE
    Time: 11:00-11.40 (CET) - 10:00-10:40 (BST)
    Speaker: Adrien Bataille, Senior Consultant, Mandiant Consulting

    In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.

    HOW CYBER THREAT INTELLIGENCE HELPS YOU TO PRIORITIZE VULNERABILITIES PATCHING
    Time: 11.40-12.10 (CET) - 10:40-11:10 (BST)
    Speaker: Alexis Bourbion, Sales Consultant, Southern Europe

    We inevitably have hundreds, if not thousands, of applications publicly available in order to provide commerce to our customers. How can you ensure you stop cyber risk from affecting your business? In this session learn how Threat Intel can provide up-front knowledge to prioritise your focus.

    HOW TO UNDERSTAND AND COMMUNICATE CYBER SECURITY EFFECTIVENESS WITH QUANTIFIABLE, EVIDENCE-BASED DATA
    Time: 12.10-12.40 (CET) - 11:10-11:40 (BST)
    Speaker: Lluis Coma, EMEA Consulting Sales Engineer

    The world’s most serious breaches of 2020 are already in flight; the most catastrophic breaches of 2021 are already in the making. How can we tell if we are secure? Discover how we can measure, assess and define security effectiveness through an intelligence-driven approach.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Road Ahead: Cyber Security in 2020 and Beyond
  • Live at: Nov 21 2019 4:00 pm
  • Presented by: Sarah Geary, Manager of Intelligence for Executives, FireEye
  • From:
Your email has been sent.
or close