Hi [[ session.user.profile.firstName ]]

Cloud Security for Government: A Conversation with the CyberWire and FireEye

Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

On May 28 at 1:00 PM ET, the CyberWire and FireEye subject matter experts will discuss how government IT managers can overcome these challenges and pave the way for a successful path forward. Our conversation will cover not only the state of cloud for government use, but also how to:

- Gain greater visibility across hybrid, public, private, and multi-cloud environments
- Achieve cloud compliance, enforcement, and control
- Manage and mitigate risks in the cloud, from a CISO’s perspective
- Secure the remote workforce
Recorded May 28 2020 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
Presentation preview: Cloud Security for Government:  A Conversation with the CyberWire and FireEye
  • Channel
  • Channel profile
  • Achieving Operational Competency through Security Validation Nov 9 2021 6:00 pm UTC 39 mins
    Mandiant Security Validation Experts
    In our fourth and final session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore how security validation helps you achieve operational competency and business continuity.

    Register to attend and learn how to design and execute a strategic security validation program to protect your company’s financial position and reputation.

    Refer to the attachment section of this webinar, to register for previous parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speaker:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
  • Mandiant Presents: 14 Cyber Security Predictions for 2022 Nov 8 2021 9:00 pm UTC 60 mins
    Andrew Kopcienski, Senior Analyst, Mandiant Intelligence for Executives
    This past year, front page news reported what seemed to be one ransomware attack or breach after another, at an accelerated pace. Threat actors continue to evolve, putting tremendous pressure on security teams to identify attackers, TTPs, all the while managing their resources to ensure they aren’t victimized by the latest cyber schemes.

    Now more than ever, it’s essential for organizations to better prepare for what’s to come to ensure they aren’t the next news headline.

    Join us at the BrightTalk Threatscape 2022 Summit on November 8th for a webinar featuring Mandiant expert, Andrew Kopcienski. He will share insights from our upcoming report, Mandiant Presents: 14 Cyber Security Predictions for 2022, to give you a glimpse into what you can expect in the new year.

    Highlights include:
    • Ransomware, Multifaceted Extortion and the negative consequences for organizations
    • An outlook on the Big Four: Russia, Iran, China and North Korea
    • How the events in Afghanistan trigger espionage and information operations
    • Expanding attack surfaces: IOT and Cloud
    • How cyber outsourcing can increase velocity and impact of malicious operations
    • Supply chain threats and mitigating the associated risks

    Register to reserve your spot today!
  • Align Security Validation with MITRE and Att&CK Framework Nov 2 2021 5:00 pm UTC 38 mins
    Mandiant Security Validation Experts
    In our third session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore the importance of aligning your security validation program to relevant industry attack frameworks such as MITRE ATT&CK.

    Register to attend and discover why you need a depth of industry framework content based on active threat data and its role in security validation.

    Refer to the attachment section of this webinar, to register for upcoming and previous parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speakers:
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
    Henry Peltokangas, Director of Product, Mandiant Security Validation
  • Simulation vs Emulation: Why Real Attacks Matter Oct 26 2021 5:00 pm UTC 33 mins
    Mandiant Security Validation Experts
    As we continue the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness", part two will explore why emulation of real attacks is critical when testing performance of your security program. Attack simulations are inauthentic and often not recognized by security controls, and can give you a false sense of security.

    Register to attend and gain valuable information about why testing with real attacks is key to your security validation efforts, and best practices for execution across security controls, people, and processes.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speakers:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Devon Goforth, Senior Director, Security Instrumentation and Effectiveness, Mandiant Security Validation
  • Part 3 | FireEye XDR: Moving Beyond the Limits of SIEM, SOAR, and EDR Oct 26 2021 4:00 pm UTC 32 mins
    JR Wikes, Principal Systems Engineer and David Batty, Principal Systems Engineer, FIreEye Inc.
    In part three, the last part of our webinar series for "FireEye XDR: Bringing New Meaning to Extended Detection and Response", we discuss how to reduce the security complexity of modern corporate IT infrastructure.

    The strengths and limitations of SIEM, SOAR and EDR solutions are detailed to illustrate the need for and value of XDR in an organization’s cyber environment.

    Register to learn how FireEye XDR platform can improve your security posture.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "FireEye XDR: Bringing New Meaning to Extended Detection and Response".
  • Spooky RYUKy 3: The Final Chapter Oct 21 2021 3:30 pm UTC 40 mins
    Van Ta, Principal Analyst; Joshua Shilko, Principal Analyst; Zach Riddle, Sr. Analyst; Aaron Stephens, Principal Analyst
    Mandiant recently exposed the operations of FIN12, a financially motivated threat group specializing in the post-compromise deployment of ransomware, primarily RYUK, which we will discuss extensively in our upcoming webinar: Spooky RYUKy 3: The FINal Chapter.

    During this session a team of Mandiant Analysts will detail:

    -The evolution of FIN12, the most prolific user of RYUK ransomware
    -Ongoing group activity and new malware
    -What separates FIN12 from other ransomware actors
    -How FIN12 relates to other clusters of activity

    Register today for Spooky RYUKy 3: The FINal Chapter, Tuesday, October 21, 8:30 am PT/11:30am EST.
  • Além dos Limites dos Escritórios: Proteção Adequada Dentro e Fora da Nuvem Oct 21 2021 1:00 pm UTC 60 mins
    Arthur Cesar Oreana, Daniel Gomes
    Os ataques cibernéticos – cada vez mais avançados e persistentes – representam uma grave ameaça para organizações de qualquer tamanho. Detectar e responder de forma rápida deixou de ser um desejo para se tornar uma necessidade. O endpoint é parte importante de uma estratégia de proteção, principalmente nos dias atuais, onde a sua utilização vai muito além do limite físico dos escritórios das organizações.

    Participe conosco e conheça as boas práticas que garantirão uma postura de segurança adequada! Nossos especialistas compartilharão estratégias de proteção tanto para ambientes locais (on premise) quanto para ambientes em nuvem.

    Registre-se agora!
  • The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks Oct 19 2021 5:00 pm UTC 32 mins
    Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation
    Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness

    With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver.

    In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform.

    You’ll learn:

    ● October 19, 2021 at 1PM ET: Part 1 | The Importance of Threat Intel and Adversary Knowledge to Prioritize Risks
    ● October 26, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte
    ● November 2, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK
    ● November 9, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".
  • Part 2 | FireEye XDR: Born from Frontline Intelligence Oct 19 2021 4:00 pm UTC 31 mins
    Robert Kusters, Senior PMM Cloud Endpoint Security, and Veronica Carr, Sr Principal PM, Security Platforms at FireEye
    In part two of our webinar series for "FireEye XDR: Bringing New Meaning to Extended Detection and Response", we discuss how FireEye relentlessly protects its customers against major cyber threats. Our frontline human expertise and intelligence helps you prioritize risks, guide responses and accelerate security operations.

    Register to learn how FireEye XDR can simplify threat detection, investigation and incident response.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series " FireEye XDR: Bringing New Meaning to Extended Detection and Response".
  • Parte 2 | FireEye XDR: Reduza a complexidade da segurança de TI Recorded: Oct 14 2021 39 mins
    Arthur Cesar Oreana | CISSP, SSCP, CCSK | Sales Manager
    A segurança na maioria das organizações é mais complexa a cada dia. Com uma média de mais de 45 ferramentas de segurança para manter por empresa, o gerenciamento de custos e complexidade é agora mais crítico do que nunca.
    Há uma nova maneira de lidar com esse e outros problemas críticos de segurança: FireEye XDR.
    Nesta sessão, discutiremos como reduzir a complexidade da segurança de sua infraestrutura de TI corporativa e protegê-la contra as principais ameaças cibernéticas. Como a experiência e a inteligência o ajudarão a priorizar riscos, orientar respostas e acelerar as operações de segurança.
  • Part 1 | FireEye XDR: Understanding XDR Security Recorded: Oct 12 2021 31 mins
    Robert Kusters, PMM, Cloud Endpoint Security and Jim Waggoner, VP of Product Management, FireEye
    For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).

    FireEye XDR protects organizations though unmatched detection, protection and response technologies delivered through an extensible cloud-based platform. By simplifying and correlating incident data across the entire security stack, FireEye XDR applies frontline intelligence and analytics to help you find and resolve the threats that matter most.

    Join us for a webinar series on FireEye XDR, where we will cover how XDR security came about, why FireEye’s take on XDR is focused on security outcomes, and how we have been delivering on this for years.


    Register for all parts of this webinar series:

    Part 1| Understanding XDR Security
    August 25, 2021 at 10am PT | 1pm ET

    Part 2| FireEye XDR: Born from Frontline Intelligence
    September 1, 2021 at 10am PT | 1pm ET

    Part 3| FireEye XDR: Moving Beyond the Limits of SIEM, SOAR, and EDR
    September 8, 2021 at 10am PT | 1pm ET
  • FireEye XDR Trazendo um Novo Significado para Detecção e Resposta Ampliadas Recorded: Oct 7 2021 58 mins
    Arthur Cesar Oreana, CISSP, SSCP, CCSK | Sales Manager
    Ameaças emergentes colocaram as organizações em risco por muitas décadas. À medida que o cenário de TI evoluía e os atores de ameaças encontravam novas maneiras de atacar, as equipes de segurança precisavam encontrar novas maneiras de detectar e responder às ameaças. Embora ferramentas de segurança como tecnologias SIEM, SOAR e EDR tenham suas vantagens, as organizações devem olhar além dos limites dessas ofertas, para detecção e resposta estendidas (XDR). O FireEye XDR protege as organizações por meio de tecnologias de detecção, proteção e resposta fornecidas por meio de uma plataforma extensível baseada em nuvem.

    Abordaremos como a segurança XDR surgiu, porque o XDR da FireEye se concentra em resultados de segurança e como pode simplificar a detecção de ameaças, investigação e resposta a incidentes.
  • Parte 2| FireEye XDR: Reduce la complejidad de seguridad en TI Recorded: Sep 30 2021 53 mins
    Stephen Fallas, Cybersecurity Architect Strategist | CDPSE-CISM-CGEIT-CISSP-CRISC-GPCI-GICSP-BS7799| | LATAM Territory
    En esta sesión analizaremos cómo reducir la complejidad de seguridad de la infraestructura de TI corporativa y protegerse contra las principales amenazas cibernéticas. Como la experiencia e inteligencia le ayudara a priorizar los riesgos, orientar las respuestas y acelerar las operaciones de seguridad.
  • Why Sandboxing is still relevant. Recorded: Sep 29 2021 39 mins
    Mike Harrington - Sales Engineer, Edwin A Betancourt - Solutions Architect, Chris Candaffio - Consulting Sales Engineer
    As the threat landscape continually evolves, security practitioners must advance their skills and tools to meet those new threats. Traditionally, Sandboxing was used primarily as a forensic analysis tool. Modern Sandboxing solutions can be used to detect today’s threats and protect your enterprise whether on-premise or in the cloud. Join this Webinar and learn how to protect applications like (O365, Slack, Teams, Box, Drobox, AWS S3, OneDrive…etc.) by integrating Sandboxing directly into the workflow.

    Join our engineering team as they answer the following questions during this technical workshop:
    - What does a modern Sandboxing solution look like?
    - Evolution of Sandboxing from static to dynamic (Automation, Workflow)
    - Use cases and demonstration

    Reserve your seat!
  • FireEye Chat | Simplifying Security Operations with Automation & Intelligence Recorded: Sep 24 2021 16 mins
    Sandra Joyce, EVP, Mandiant Threat Intel; Travis Abrams, Managing Principal Consultant, CyberPeak
    FireEye Chat | Front and Center on Simplifying Security Operations with Automation and Intelligence

    Effective security is not only based on the security controls deployed, but the expertise and intelligence behind them. With evolving threats constantly looming, security teams are under tremendous pressure to identify their adversaries and the attack tactics they use and prioritize limited resources to protect the organization.

    In this episode of FireEye Chat, cyber security experts Sandra Joyce, EVP and Head of Mandiant Threat Intelligence and Travis Abrams, Managing Principal Consultant, CyberPeak, will discuss how operationalized threat intelligence combined with automated alert triage can increase efficiency of security operations and reduce risk to better protect an organization’s most valuable assets.

    Watch Now!
  • Mandiant Intelligence Briefing: Stories Directly From The Frontline Recorded: Sep 23 2021 31 mins
    Andrew Kopcienski, Senior Analyst, Mandiant Intelligence for Executives
    Modern day business solutions source critical components and vital software from a myriad of different sources. Join us to learn more about the cyber threats affecting supply chains, and the hidden risks of supply chain compromise.
  • Parte 1| FireEye XDR: Un nuevo significado a la detección y respuesta extendidas Recorded: Sep 23 2021 58 mins
    Stephen Fallas, Cybersecurity Architect Strategist | CDPSE-CISM-CGEIT-CISSP-CRISC-GPCI-GICSP-BS7799| | LATAM Territory
    Desde hace muchas décadas, las amenazas emergentes han puesto en riesgo a las organizaciones. A medida que el panorama de TI evolucionó y los actores de amenazas encontraron nuevas formas de atacar, los equipos de seguridad necesitaron encontrar nuevas formas de detectar y responder a las amenazas. Si bien las herramientas de seguridad como las tecnologías SIEM, SOAR y EDR tienen sus ventajas, las organizaciones deben mirar más allá de los límites de estas ofertas hacia la detección y respuesta extendidas (XDR). FireEye XDR protege a las organizaciones a través de tecnologías de detección, protección y respuesta entregadas a través de una plataforma extensible basada en la nube.

    En esta sesión cubriremos cómo surgió la seguridad XDR, por qué FireEye de XDR se centra en los resultados de seguridad y cómo puede simplificar la detección de amenazas, la investigación y la respuesta a incidentes.
  • Part 4 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Sep 22 2021 39 mins
    Mandiant Security Validation Experts
    In our fourth and final session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore how security validation helps you achieve operational competency and business continuity.

    Register to attend and learn how to design and execute a strategic security validation program to protect your company’s financial position and reputation.

    Refer to the attachment section of this webinar, to register for previous parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speaker:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
  • FireEye Helix Explained: Preview of New Features Recorded: Sep 21 2021 51 mins
    Sarah S. Cox, Prin. Instr Designer; Veronica Carr, Prin. Prod. Mgr.; Vignesh Balan R, Staff Prod. Mgr.; Todd Bane, Sr. Mgr.
    Helix works with FireEye and third-party sources, including cloud and SaaS applications.
    In this session we will be demonstrating new Helix features that enhance the security analyst experience. Current Helix customers will be invited to join a program with early access to these features, prior to their anticipated roll-out over the next few months.
    Join this installment in our webinar series, as our experts highlight:
    • Threat detection and enrichment
    • Alert correlation across data sources
    • Built-in automation for response action capabilities
    • Threat graph visualization

    The session includes a hands-on demonstration of these upcoming features that will show you how to take advantage of detection, correlation, and automated response action. Stay on after the session for an in-depth Q&A with our experts.
  • Understanding Multifaceted Extortion Attacks & How to Protect Against Them Recorded: Sep 16 2021 56 mins
    Evan Pena, Director, Mandiant; Nick Bennett, Vice President, Mandiant
    Ransomware Ups Its Game: Understanding Multifaceted Extortion Attacks and How to Protect Against Them

    Organizations across all industries are facing devastating threats to their day-to-day operations from opportunistic cyber criminals and nation-state actors. They have mastered ransomware deployment and evolved their tactics to multifaceted extortion—some resulting in million-dollar payouts, damaged reputation, and ongoing loss of operational capacity.

    To prevail against these threat actors, security teams must understand attacker motivations and behaviors and discover how to further improve detection, prevention, and response capabilities. In this webinar, Mandiant representatives Evan Pena, Director, and Nick Bennett, Vice President, discuss:
    • Best practices for preventing the deployment of ransomware and multifaceted extortion attacks in your environment
    • Use cases that spotlight effective and actionable techniques to reduce the risk of these attacks
    • Insights on the tools, tactics and procedures used by real-world threat actors as seen on the frontlines

    There are no rules of engagement for these attackers, so let’s be sure to stay one step ahead of them.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Security for Government: A Conversation with the CyberWire and FireEye
  • Live at: May 28 2020 5:00 pm
  • Presented by: Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
  • From:
Your email has been sent.
or close