Hi [[ session.user.profile.firstName ]]

M-Trends 2020: Insights into Today’s Cyber Attacks

Protect your organization against today’s most dangerous attackers.

Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from the M-Trends 2020 Report - our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2019.

Join us for this webinar on Thursday, March 12th at 8 a.m. PT/11 a.m. ET, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition, including:
• Global perspectives on trending attacks and how to combat them
• Details on the most active attack groups in 2019
• Malware family trends
• The rise of malicious insiders
• Insights from cloud investigations, along with common weaknesses and best practices
• Case studies with practical security lessons

Register for the webinar
Recorded Mar 12 2020 73 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Bennett, Managing Director, FireEye Mandiant; Jon Ford, Director, FireEye Mandiant; Steven Stone, Director, FireEye
Presentation preview: M-Trends 2020: Insights into Today’s Cyber Attacks
  • Channel
  • Channel profile
  • FireEye Virtual Briefing - Morning Track May 12 2020 9:00 am UTC 135 mins
    Various
    Cyber Risk and Security Effectiveness in the Digital Age

    Mandiant perspective on the Threat Actors in Europe
    Time: 11:00-11.40 (CEST)
    Speaker: Adrien Bataille, Senior Consultant, Mandiant Consulting

    In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.

    How Cyber Threat Intelligence help you to prioritize vulnerabilities patching
    Time: 11.40-12.10 (CEST)
    Speaker: Alexis Bourbion, Sales Consultant, Southern Europe

    We inevitably have hundreds, if not thousands, of applications publicly available in order to provide commerce to our customers. How can you ensure you stop cyber risk from affecting your business? In this session learn how Threat Intel can provide up-front knowledge to prioritise your focus.

    How to understand and communicate cyber security effectiveness with quantifiable, evidence-based data
    Time: 12.10-12.40 (CEST)
    Speaker: Lluis Coma, EMEA Consulting Sales Engineer

    The world’s most serious breaches of 2020 are already in flight; the most catastrophic breaches of 2021 are already in the making. How can we tell if we are secure? Discover how we can measure, assess and define security effectiveness through an intelligence-driven approach.
  • Top 5 Cloud Security Myths Debunked May 5 2020 9:00 am UTC 55 mins
    Martin Holste, CTO, FireEye
    Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.


    Presented by: Martin Holste, Cloud CTO at FireEye
  • Threat Intelligence Drives Effective Vulnerability Management Apr 30 2020 3:00 pm UTC 60 mins
    Jared Semrau, Sr. Mgr.,Vulnerability and Exploitation, FireEye; Kathleen Metrick, Analyst, Strategic Intelligence, FireEye
    Organizations value cyber threat intelligence (CTI) because it helps their security teams stay focused on, and stay ahead of, the most impactful threats. One of the critical strategic and tactical roles that CTI plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk.

    Join us on Thursday, April 30 at 8 a.m./11 a.m. ET, as FireEye Threat Intelligence experts, Jared Semrau and Kathleen Metrick share:
    • The importance of comprehensive CTI to drive better-informed vulnerability management decisions
    • Insight into how FireEye tracks, prioritizes and categorizes vulnerabilities to help organizations more effectively manage and mitigate the risks associated with these potential threats
    • The latest research findings around the speed and frequency of exploitation

    Register for the webinar
  • Defensive Security Techniques You Can Use Now Apr 28 2020 9:00 am UTC 59 mins
    Nick Bennett, Director, FireEye Mandiant & Matt McWhirt, Sr. Manager, FireEye Mandiant
    Many organizations struggle with how to prioritize hardening and protective security actions.

    Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact.

    Join our webinar, where Mandiant incident response experts Nick Bennett and Matt McWhirt will discuss the following topics:

    • Five technical categories to consider when implementing preventative security
    • Proven tips to effectively execute network segmentation, endpoint hardening and other critical tasks
    • Common pitfalls in evidence destruction, investigation techniques and remediation timing
    • Recommendations for enabling effective remediation and the power of operational playbooks

    Register today to learn how to better handle your organization’s next security incident.
  • More Cloud, More Problems? Apr 21 2020 9:00 am UTC 52 mins
    Martin Holste, Cloud CTO, FireEye
    The cloud is more pervasive in our organizations and our lives. But security operations centers (SOCs) can keep up, even when their organization adopts multiple public cloud and SaaS solutions.

    Join this webinar to ensure that your organization’s cloud strategy is less of a problem than you might think. Expert Martin Holste, Cloud CTO at FireEye, shares:

    • Trade-offs and nuances between cloud providers
    • Considerations that can affect your strategic direction
    • Seasoned guidance on how to optimize your cloud migration
  • Knowing is Half the Battle: Cloud Visibility and Protection Apr 14 2020 3:00 pm UTC 60 mins
    Martin Holste, Cloud CTO, FireEye featuring Andras Cser, VP, Principal Analyst, Security and Risk, Forrester
    As organizations move more data into multi-cloud environments, it becomes increasingly difficult to protect against cyber attacks. You need to know where your data is and have the visibility you need to control and protect your assets.

    Join this webinar on Tuesday, April 14, 2020 at 8 a.m. PT/11 a.m. ET to uncover how to optimize your organization’s cloud security solution. Hear industry expert Martin Holste and featured speaker, Andreas Cser, as they help attendees to:

    • Learn what cloud providers do and do not secure under the shared responsibility model
    • Understand why it’s important to identify and track changes to assets and permissions
    • Discover how to establish robust visibility and detection across all cloud environments to reduce overall risk
  • How to prepare for breaches through cyber risk assessment and mitigation Recorded: Apr 7 2020 69 mins
    Speakers: Karen Kukoda, FireEye– moderator Ron Bushar, FireEye Mandiant Sue Leung, Alliant – (insurance broker) Dan Raymond
    Join FireEye Mandiant risk assessment experts and its valued insurance partners as they discuss how to best evaluate and manage cyber risk. This webinar is designed to help state, local and other public sector organizations better identify, understand and prepare for the latest cyber threats.
    Join us to learn:
    •What are the current top cyber security threats
    •How you can develop a cyber security incident response plan (CIRP)
    •How to test and measure the effectiveness of your incident response plan
    •Why municipalities are buying coverage against cyber attacks
    •How the Mandiant Incident Response service works with your team
    •What role the external breach counsel plays
    •How you can manage the litigation, investigations and reputational damage that follow a high-profile breach
  • Protect All Files from Malware with a Content Firewall Recorded: Apr 7 2020 45 mins
    Chris Unick, Director Technical Partnerships, FireEye​ and Cliff White, CTO, Accellion​
    Security-first organizations deploy innovative technologies like LDAP/AD, SSO, ATP, DLP and others to protect customer data and other intellectual property from hackers. Despite these efforts, hackers still get in through vulnerable third parties like partners, suppliers, and customers. As a result, defending sensitive information requires not just a network firewall but a content firewall.​

    Attend this webinar to learn the value of seeing, controlling, securing, and tracking all the information that enters, moves through and leaves your organization so you can:​

    • See every login, login failure, error, administrative setting or permission change, and every system event
    • Spot anomalies in volume, location, domain, user, source, and scan results
    • Drill down to the actionable details, including users, timestamps, and IP addresses, in real-time
    • Demonstrate compliance with regulations and standards like NIST 800-171, HIPAA, GDPR, FISMA, FedRAMP and more
    • Enforce security and compliance standards with granular policy controls
    • Record and send detailed audit trail from connected on-prem and cloud content sources to FireEye Helix, Malware Analysis (AX), and Detection on Demand
  • They Come in the Night: Emerging Ransomware Trends Recorded: Mar 31 2020 57 mins
    Kelli Vanderlee Manager, Intelligence Analysis, FireEye & Kimberly Goody, Sr. Manager, FireEye Intelligence
    Ransomware is remote digital extortion. Disruptive and costly to address, it affects all kinds of organizations, from space technology firms to global manufacturers and industrial environments.

    FireEye Threat Intelligence research has uncovered an increasing number of common characteristics in ransomware attacks, including new trends in intrusion vectors, dwell time, deployment time of day and the use of additional tactics to increase leverage against victims.

    Join Threat Intelligence experts Kelli Vanderlee and Kimberly Goody, on Tuesday, March 31, 2020 at 8 a.m. PT/11 a.m. ET, to learn about the latest research and ask them critical questions. During this presentation, attendees will hear about:

    • The latest ransomware threats
    • Threat actor tactics
    • Ways to use this intelligence to defend your organization

    Register for the webinar
  • FireEye Helix Explained - Mandiant Query Language Searches Recorded: Mar 24 2020 58 mins
    ​Mike Kizerian, Principal Instructor, FireEye & Sarah Cox, Sr. Instructional Designer, FireEye
    Today’s security operations are often disjointed and constrained by limited visibility and false alerts. These issues can cost organizations valuable time, resources and effort, even as they increase the risk of an incident. FireEye Helix enables organizations to take control of any incident from alert to fix, and addresses traditional SIEM shortfalls while delivering highly efficient, low-maintenance security automation.

    Join us for the first session in a series of upcoming webinars, as our experts highlight:
    •The power of the Mandiant Query Language (MQL) to perform searches and transform clauses
    •Best practices and common use cases for Helix to boost the effectiveness of your security operations
    •Essential Helix features that improve visibility across your security operations platform

    Follow along with a hands-on Helix demonstration of MQL during the session and receive samples of the MQL scripts used in the webinar. Stay with us after the presentation for an in-depth Q&A session with our experts.
  • FireEye Chat | Front and Center with Steven Stone on M-Trends 2020 Recorded: Mar 19 2020 24 mins
    Vasu Jakkal, CMO, FireEye; Steven Stone, Director, Adversary Pursuit, FireEye
    In our newly released M-Trends 2020 report, we explore the latest developments behind today’s attacker techniques, behaviors and motivations based on frontline experiences during FireEye Mandiant engagements. We reveal a range of new techniques used by threat actors, as well as their continued reliance on traditional, well established actions, which include a mix of valid access, valid client tools and attacker-owned files.

    In this latest episode of the quarterly talk show FireEye Chat, we talk with Steven Stone, Director of Adversary Pursuit, FireEye, who shares highlights from M-Trends 2020 and a behind-the-scenes look at:

    • Why we produce M-Trends and what it contributes to the security community
    • How our unique innovation cycle leverages FireEye research and frontline investigations to contribute to the report
  • M-Trends 2020: Insights into Today’s Cyber Attacks Recorded: Mar 12 2020 73 mins
    Nick Bennett, Managing Director, FireEye Mandiant; Jon Ford, Director, FireEye Mandiant; Steven Stone, Director, FireEye
    Protect your organization against today’s most dangerous attackers.

    Explore the latest developments behind today’s attacker techniques, behaviors, and motivations sourced from the M-Trends 2020 Report - our annual publication based on FireEye Mandiant’s frontline investigations of the most interesting and impactful cyber attacks in 2019.

    Join us for this webinar on Thursday, March 12th at 8 a.m. PT/11 a.m. ET, as FireEye Mandiant experts discuss highlights and case studies from this year’s edition, including:
    • Global perspectives on trending attacks and how to combat them
    • Details on the most active attack groups in 2019
    • Malware family trends
    • The rise of malicious insiders
    • Insights from cloud investigations, along with common weaknesses and best practices
    • Case studies with practical security lessons

    Register for the webinar
  • 2020 Security Technology for the Multi-Cloud Recorded: Mar 9 2020 56 mins
    Jeremy Snyder, DivvyCloud | Chris Romano, Mandiant | Sol Cates, Thales | Nathan Howe, ZScaler
    Multi-cloud adoption is on the rise, but the challenge of securing organizations against cyber attacks remains.

    Discover the cost of data breaches in 2020, as well as the technologies CISOs are using for keeping track of their assets, assessing and managing cyber risk and mitigating threats against the enterprise.

    Join this Q&A panel of experts as they discuss:
    - CISO priorities in a multi-cloud environment
    - Biggest threats to the enterprise
    - How to assess and mitigate cyber risk
    - Technologies powering security
    - Best practices and recommendations for a more secure organization

    Speakers:
    Jeremy Snyder, VP of Business Development & Corporate Development, DivvyCloud (moderator)
    Christopher Romano, Senior Consultant, Mandiant
    Sol Cates, VP of Technical Strategy, Thales
    Nathan Howe, Director of Transformation Strategy, ZScaler
  • Operationalizing Cyber Threat Intel for Computer Network Defense: Focus on Iran Recorded: Feb 10 2020 47 mins
    Shanyn Ronis, Manager, FireEye Threat Intelligence Services; Katie Bowen, Threat Analyst, FireEye
    Operationalizing Cyber Threat Intelligence (CTI) helps mitigate risk by focusing people, processes, and technology on the threat activity matters. Above all, it allows organizations to take a more proactive, structured, and holistic approach to security that reduces dwell time and shortens the time frame from identification to fix. In today's dynamic threat environment, it is critical to boosting your overall cyber security return on investment.

    Join us as we look specifically at how cyber threat intelligence can help improve computer network defense (CND) operations. Our experts will share:

    • A case study, that will examine the intelligence tied to recent Iranian geopolitical events and demonstrate how operators can pivot from intelligence reporting to high confidence alerting and targeted threat hunting
    • FireEye’s Iranian relevant threat intelligence along with the MITRE ATT&CK framework to help decision makers improve their overall network security posture by prioritizing security investments based on adversary capabilities
    • How intelligence enhances your overall cyber security investment and places your operations ahead of the threat
    • Methods for automating vulnerability management and patch prioritization by correlating intelligence to vulnerability scan data
  • Protect All Files from Malware with a Content Firewall Recorded: Feb 5 2020 46 mins
    Chris Unick, Director Technical Partnerships, FireEye​ and Cliff White, CTO, Accellion​
    Security-first organizations deploy innovative technologies like LDAP/AD, SSO, ATP, DLP and others to protect customer data and other intellectual property from hackers. Despite these efforts, hackers still get in through vulnerable third parties like partners, suppliers, and customers. As a result, defending sensitive information requires not just a network firewall but a content firewall.​

    Attend this webinar to learn the value of seeing, controlling, securing, and tracking all the information that enters, moves through and leaves your organization so you can:​

    • See every login, login failure, error, administrative setting or permission change, and every system event
    • Spot anomalies in volume, location, domain, user, source, and scan results
    • Drill down to the actionable details, including users, timestamps, and IP addresses, in real-time
    • Demonstrate compliance with regulations and standards like NIST 800-171, HIPAA, GDPR, FISMA, FedRAMP and more
    • Enforce security and compliance standards with granular policy controls
    • Record and send detailed audit trail from connected on-prem and cloud content sources to FireEye Helix, Malware Analysis (AX), and Detection on Demand
  • Investigation on Demand: Use Cases for SOC support Recorded: Jan 14 2020 24 mins
    Jeff Guilfoyle, CISSP, Solution Architect, FireEye
    Set against increasingly resourceful and unpredictable attackers, modern digital organizations need flexible options for solving problems and doing more with less.

    Unfortunately, security operation center (SOC) personnel are often left on their own to gather and analyze event information and decide whether and how to respond.

    Better investigations can lead to better decision-making during security events. And FireEye Expertise On Demand can help your SOC personnel pursue investigations more effectively.

    Join the webinar to find out how.
  • FireEye's Perspective on Iranian Attacks and Practical Mitigations Recorded: Jan 13 2020 50 mins
    Benjamin Read, Senior Manager, Cyber Espionage Analysis, FireEye
    FireEye's Perspective on Iranian Attacks and Practical Mitigations
    Make Better-Informed Decisions and Protect Your Organization

    The recent tension between Iran and the U.S. has increased the likelihood of Iranian action against U.S. and Gulf entities. While the exact nature, timing, and targets of any response from Iran is uncertain, FireEye Threat Intelligence analysts assess with moderate confidence that it will include a cyber component.

    Watch this complimentary on-demand webinar, as Ben Read, Sr. Manager, Cyber Espionage Analysis provides:
    •An overview of FireEye’s perspective on the current threat landscape from Iran
    •Tactics recently employed by Iranian groups like APT33, APT34 and others
    •Recommended mitigations to protect your organization from these groups
  • FireEye Chat - Front and Center: Insights into 2020 and Beyond Recorded: Dec 16 2019 23 mins
    Vasu Jakal, CMO, FireEye; Alexa King, EVP, General Counsel FireEye; Luke McNamara, Principal Analyst FireEye
    “The Road Ahead: Cyber Security Predictions in 2020 and Beyond” provides insights into what to expect from attackers, victim organizations, security vendors and nation-states. In the next episode of the quarterly talk show FireEye Chat, we dive deeper into two of the report’s topics: election security and the emerging role of the general counsel.

    At least 70 percent of organizations say that they believe their security risk has increased significantly from the previous year.* With constantly evolving attacks, risk management will continue to play a significant global role in all industries and high profile activities, including the upcoming presidential elections. Breach planning and mitigation will be even more critical.

    Join us as our expert FireEye Chat panel discusses:
    • The evolution of the cyber security landscape in 2020
    • Vote and election system corruption through cyber espionage and cyber influence efforts
    • Election risk framework
    • Best practices to reduce targeted cyber risk

    Watch Now!
  • The Road Ahead: Cyber Security in 2020 and Beyond Recorded: Nov 21 2019 55 mins
    Sarah Geary, Manager of Intelligence for Executives, FireEye
    As 2019 comes to a close, we walk away armed with even more knowledge about the threat actors and trends we can expect to continue in 2020 and beyond. Attackers innovate and grow more sophisticated, but there is a lot we can still do to prepare for upcoming compromise attempts and get ahead of the threats.

    On Thursday, November 21st at 8a PT/11a ET, join Sarah Geary, Manager of Intelligence for Executives at FireEye, as she shares her thoughts about cyber security in 2020. During the webinar, Sarah will touch on various topics discussed in our report, The Road Ahead: Cyber Security in 2020 and Beyond, including:

    • Geopolitics driving threat actors
    • Cyber influence operation developments
    • New criminal tactics in the underground
    • Trends in ransomware and supply chain attacks
  • The Shifting Balance: Expertise, Automation and the Future of Cybersecurity Recorded: Oct 7 2019 38 mins
    Evan Wright, Staff Data Scientist, FireEye
    The present and future of cybersecurity operations will address the skills gap by better utilizing our existing experts and creating more intelligent automation. An evolution is underway in cybersecurity to shift some of the cognitive load from human security experts to machines. When is a machine an appropriate solution and when do you really need a human expert?

    In this presentation, FireEye outlines a spectrum of automatability that helps us identify when a machine or a human expert may be the most effective approach to solving cybersecurity challenges. Multiple factors make up this spectrum, including data volume, and the underlying threat behavior's frequency and stability.

    Join Evan Wright, Staff Data Scientist with FireEye, as he covers:
    -Examples at different points on this automation spectrum, including malware identification, alert triage in the security operations center (SOC), and incident response
    -Domain examples that will demonstrate that machine learning solutions will continue to play an important role alongside human experts
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: M-Trends 2020: Insights into Today’s Cyber Attacks
  • Live at: Mar 12 2020 3:00 pm
  • Presented by: Nick Bennett, Managing Director, FireEye Mandiant; Jon Ford, Director, FireEye Mandiant; Steven Stone, Director, FireEye
  • From:
Your email has been sent.
or close