Hi [[ session.user.profile.firstName ]]

FireEye Chat | Front and Center: How to Empower. Evolve. Defend.

Cyber attackers never rest, but neither does FireEye. In our upcoming Virtual Summit on June 9-11, industry professionals will showcase best practices, research and strategies to empower organizations to evolve their cyber security solutions and better defend against attackers.

In this latest episode of the quarterly talk show FireEye Chat, we dive deeper into two topics from the virtual summit: security effectiveness and cloud security. Watch now to hear from our experts who are front and center from their homes as they tackle these common questions:

• How secure are you? And can we be sure we’re protected against the evolving threat landscape?
• Are your cyber security products effective and working the way they should?
• Do you know how to be secure in the cloud?
• What should you consider when moving to the cloud?
Recorded Jun 5 2020 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vasu Jakkal CMO; Major General Earl Matthews VP, Strategy, Mandiant Security Validation; Martin Holste Cloud CTO
Presentation preview: FireEye Chat | Front and Center: How to Empower. Evolve. Defend.
  • Channel
  • Channel profile
  • Modern Cyber Risk Management for Better Decision Making Aug 11 2020 9:00 am UTC 42 mins
    Matt Keane, Principal Consultant at FireEye Mandiant, & Jennifer Guzzetta, Product Marketing Manager at FireEye Mandiant
    Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk models, which leaves gaps between attacker and defender behaviors.

    Transformation of your risk management processes, plus the people behind them, can solve for this.

    Aligning your organization’s security efforts with the risk appetite of data owners and business leaders must become a priority.

    This webinar spotlights a transformational model that operationalizes security risk management to improve and optimize decision making by:

    •Identifying challenges in your current cyber risk management program
    •Establishing a modern cyber risk management strategy
    •Shifting the players and processes involved in your cybersecurity decision support
    •Integrating risk management priorities across the entire security function
    •Monitoring progress with the right kind of security metrics

    Join Matt Keane, Principal Consultant at FireEye Mandiant, for his expertise on transforming your security risk management approach by bridging the gap between vital security teams and improving their decision making.
  • Building a Ransomware Defense Recorded: Jul 7 2020 62 mins
    Luke McNamara, Principal Analyst, FireEye, Jon Ford, Director of Global Strategy and Operations for Government, Dan Lohrmann
    Ransomware is a remote, digital shakedown. It is disruptive and expensive, and it affects organizations of all sizes and in many industries. Government, however, faces greater risks and impact. Infections have shut down entire operations, forcing law enforcement agencies to drop cases and hospitals to turn away patients. But there may be a silver lining. Focusing defensive efforts in key areas and with practiced response planning may allow organizations to stop ransomware before it is deployed.

    Listen to Government Technology and FireEye to hear how advanced detection and prevention and front line response practices -- supported by actionable threat intelligence -- are the best defense against ransomware and other advanced attacks. View the webcast to better understand:
    •Ransomware trends and landscape – NEW actors on the scene!
    •The “after hours” factor
    •Common initial infection vectors and dwell time
    •Potential threats to government, elections and more
    •How to defend and respond
  • Swimming with sharks: Understanding & countering threats in higher education Recorded: Jun 29 2020 58 mins
    Chris Schreiber, Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
    Hosted by University Business:
    An interactive discussion about cyber threats facing higher education and how you can prioritize your limited resources to most effectively protect your digital assets.

    Topics will include:
    •Review common cyber threats facing higher education
    •Learn about cyber threat intelligence (CTI) concepts
    •Explore how CTI can improve your information security
  • BrightTALK Local California: The Future of Events Recorded: Jun 25 2020 61 mins
    Riadh Dridi, CMO, Automation Anywhere; Vasu Jakkal, EVP & CMO, FireEye; Simon Lees, CBO, BrightTALK
    The future of events is unclear. Many marketers are leaning into entirely virtual strategies, while others are cautiously planning for a new breed of in-person and hybrid events in 2021. Join this webcam panel to hear how two of the Golden State’s top CMOs are adapting their strategies to drive results during and after the pandemic. They’ll cover:
    * Predictions for events in 2021 and beyond
    * Pivoting your in-person event strategy online
    * Inspiring your audience in the digital realm
    * Benefits and challenges of virtual events
    * Planning for an uncertain future
    * Keeping your marketing team focused while working from home
  • Ransomware Legal Implications and Proactive Solutions Recorded: Jun 24 2020 64 mins
    Experts from Mandiant, McDermott Will & Emery, Blake Cassels & Graydon LLP & Chubb
    In the 2020 M-Trends report, we noted that successful monetization of ransomware attacks and the availability of ransomware as a service have contributed to an increase in ransomware cases.

    In this session, Mandiant experts will be joined by speakers from US-based law firm McDermott Will & Emery, Canadian-based law firm Blakes, and global insurance partner Chubb, to discuss:

    •The threat profile of a ransomware attack
    •Best practices for ransomware recovery and response
    •The legal implications of a ransomware attack across the US and Canada
    •How to minimize the legal impact of a ransomware breach
    •The reactive and proactive insurance measures you can take to minimize business impact


    We encourage you to attend this session with your team to understand the impact of a breach on various business units, and the mitigation tactics that can be employed by all stakeholders within an organization.

    Reserve your spot today!
  • Security Effectiveness Strategies Recorded: Jun 16 2020 58 mins
    Maj.General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Intel Consulting
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

    Register Now
  • 5 Steps to Security Validation Recorded: Jun 15 2020 60 mins
    Major General Earl Matthews (USAF)
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we believe that our security teams are well trained and practiced when everything goes wrong. These assumptions result in financial and operational inefficiencies, defensive regression and an inability to determine if we are investing in the right areas to communicate the state of our security effectiveness to stakeholders.

    Join this webinar to hear from Retired Major General Earl Matthews (USAF), as he discusses:

    • How to move beyond assumptions with automated and continuous security controls validation
    • Identify and measure vulnerability gaps
    • Manage and suggest remediation steps by arming security practitioners with meaningful evidence
    • Validate an organization's ability to defend itself by using real adversary behaviors

    Save your seat today!
  • Validate Security Performance to Rationalize Investments Recorded: Jun 11 2020 52 mins
    Major General Earl Matthews, VP of Strategy for Mandiant Security Validation
    Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

    In this session, led by Major General Earl Matthews, VP of Strategy for Mandiant Security Validation, you can learn:

    - Best practices for investment prioritization when it comes to hiring, training and security solution procurement
    - How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
    - Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
  • C-Suite Conversations: The Value of Threat Intelligence Recorded: Jun 11 2020 47 mins
    Nigel Gardner, Sr. Cyber Threat Intelligence Leader, MGM & Bart Lenaerts-Bergmans, Sr. Product Marketing Manager, Mandiant
    Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders?
    Join this session to hear Nigel Gardner, Senior Cyber Threat Intelligence Leader at MGM Resorts discuss:

    • Types of threat intelligence consumers
    • Whether to use outcomes or operational metrics to communicate threat intelligence
    • Whether ROI-based justification is required to measure the success of threat intelligence
    • Use cases that illustrate working and nonworking approaches
  • Cloud Security for Government: A Conversation with the CyberWire and FireEye Recorded: Jun 11 2020 59 mins
    Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
    Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

    On June 11th at 3:00 PM ET, the CyberWire and FireEye subject matter experts will discuss how government IT managers can overcome these challenges and pave the way for a successful path forward. Our conversation will cover not only the state of cloud for government use, but also how to:

    - Gain greater visibility across hybrid, public, private, and multi-cloud environments
    - Achieve cloud compliance, enforcement, and control
    - Manage and mitigate risks in the cloud, from a CISO’s perspective
    - Secure the remote workforce
  • How to Fortify Your Security Operations with Technology and Expertise Recorded: Jun 11 2020 52 mins
    Patrick O’Sullivan, Director of Security Engineering, Alorica​, & Stanley Parret, Principal Consultant, Mandiant​
    Today is the day you outplay cyber attackers. They can deliver easy to execute, threats with immediate impact through an as-a-service model. To beat them, CISOs must assemble skilled cyber security staff, threat intelligence and technology into an innovative managed detection and response (MDR) capability.

    Navigating the MDR marketplace can be difficult without insight from peer organizations with established programs. Stanley Parret, Mandiant Principal Consultant and Patrick O'Sullivan, Director of Security Engineering at Alorica can give you insights and advice for selecting the best MDR solutions for your needs and show you how you can outmaneuver attackers.

    Join this session to:
     Understand emergent threats and tactics that drive your need to quickly detect and respond to cyber threats.
     Realize that you’re not in an either-or situation and learn how to align people, technology and operations in your SOC.
     See what it looks like to outplay your attacker in a live tabletop exercise.
  • Sandworm Resurfaced: The Continuing Story Recorded: Jun 11 2020 59 mins
    Andy Greenberg Author, Journalist, WIRED & John Hultquist, Sr. Director, Intelligence Analysis, Mandiant Threat Intelligence
    A few years ago, in the wake of the annexation of Crimea by the Russian Federation, the world became aware of the extent of Russia's cyber attack capabilities. The story of this first real instance of sustained, unrestricted cyber war is captured in WIRED journalist Andy Greenberg’s award-winning book SANDWORM: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers.

    In this session, Andy Greenberg is welcomed by John Hultquist of Mandiant for a review of Sandworm activities, from blackouts in Ukraine to NotPetya, the most costly cyberattack in history. They will also discuss the enduring relevance of the Sandworm group in light of the recent U.S. National Security Agency warning about the group’s continuing activities to disrupt global government and corporate networks and systems.
  • Mandiant’s Perspective On The Threat Actors In Europe Recorded: Jun 11 2020 60 mins
    Adrien Bataille, Senior Consultant, FireEye Mandiant
    In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. Mandiant investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.
  • A Red Teaming Case Study Recorded: Jun 11 2020 42 mins
    Vivek Chudgar, Sr. Director - Mandiant Consulting
    Red team assessments help organizations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives.
    This session reviews a red team case study in which an objective-based assessment involved emulating the activities of an advanced, nation state attacker across the entire attack lifecycle. Come learn valuable insights from how one organization dealt with genuine attack conditions.
  • FireEye Endpoint Security War Story Recorded: Jun 11 2020 50 mins
    Anthony Ng, Vice President of Systems Engineering, APAC
    When Mandiant respond to a breach they need equally elite weapons to facilitate their response. This war story will look at how Mandiant Incident Responders fought off APT38 using some of the more sophisticated functions of FireEye Endpoint Security.
  • Proactive Cyber Crime Defense Through Public-Private Partnerships Recorded: Jun 10 2020 59 mins
    Tim Wellsmore, head of Mandiant government programs across Asia Pacific and Japan
    Cyber crime has redefined security operations for governments and the private sector. A continually evolving threat environment means cyber crime is growing in both scale and diversity. Public and private organizations must shed any pre-disposed focus on cyber espionage to adopt a proactive, intelligence led mission.

    Tim Wellsmore, head of Mandiant government programs across Asia Pacific and Japan, helps Australia manage national efforts on financially motivated cyber security threats and related cyber intelligence collection. In this session, he’ll:

    - Examine an intelligence led model for uplifting government cyber defense operations to counter cyber crime threat activity.
    - Show you how the private sector can uniquely support governments as they implement a proactive intelligence-led cyber mission.-
    - Deliver insights on the tactics and methods cyber criminals use against both public and private sector organizations.
  • Modern Cyber Risk Management for Better Decision Making Recorded: Jun 10 2020 43 mins
    Matt Keane, Principal Consultant at FireEye Mandiant, & Jennifer Guzzetta, Product Marketing Manager at FireEye Mandiant
    Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk models, which leaves gaps between attacker and defender behaviors.

    Transformation of your risk management processes, plus the people behind them, can solve for this.

    Aligning your organization’s security efforts with the risk appetite of data owners and business leaders must become a priority.

    This webinar spotlights a transformational model that operationalizes security risk management to improve and optimize decision making by:

    •Identifying challenges in your current cyber risk management program
    •Establishing a modern cyber risk management strategy
    •Shifting the players and processes involved in your cybersecurity decision support
    •Integrating risk management priorities across the entire security function
    •Monitoring progress with the right kind of security metrics

    Join Matt Keane, Principal Consultant at FireEye Mandiant, for his expertise on transforming your security risk management approach by bridging the gap between vital security teams and improving their decision making.
  • Security Without Barriers: How to Adopt, Implement, and Measure Cyber Resilience Recorded: Jun 10 2020 48 mins
    Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
    Adoption of cloud computing, an increasingly remote workforce and more reliance on mobile devices to access enterprise applications has radically changed how technology is deployed and used. Organizations need to protect their digital assets with strategies that evolve to support changing conditions.
    Attend this session to learn how a cyber resilience strategy can help protect your organization, as well as how you can explain the new cyber security landscape to your stakeholders.
    Topics include:
    • How cyber resilience can better protect your assets whenever and wherever your users require access
    • How to maintain an open and collaborative environment while still meeting security needs
    • How you can explain your security program goals to stakeholders
  • Held Hostage by Ransomware: One City’s Story Recorded: Jun 10 2020 58 mins
    Stephen Schommer, CISO, City of Sammamish & Shelly Tzoumas, Sr. Product Marketing Manager, Mandiant
    In the security community, stories are how we warn, educate and inform one another, if only so others will learn from and avoid the same mistakes. Because ransomware has seen such a resurgence in recent years, almost everyone has a ransomware story to tell, but very few are willing to share details about their trials so that others might be more fortunate.

    Join Stephen Schommer from the City of Sammamish, Washington as he recounts past ransomware experiences, and provides insights and advice to better prepare for and navigate this all-too-common cyber security horror story. Attendees can ask questions after the presentation.
  • Election Protection: Real World Guidance and Best Practices Recorded: Jun 10 2020 59 mins
    Ron Bushar, Sr. Vice President & CTO - Government Solutions, FireEye, Ben Woolsey, Manager, Mandiant Services
    Election security is a top concern for national and local governments across the world. With real-world experience from the frontlines of cyber attacks, our experts share hard-won guidance on strategies to reinforce elections infrastructure against malicious cyber activity.
    Join us to learn best practices and get frontline insights into how officials at all levels should address the threats to election security. We will share the current threat landscape and best practices to address the challenges.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: FireEye Chat | Front and Center: How to Empower. Evolve. Defend.
  • Live at: Jun 5 2020 9:40 pm
  • Presented by: Vasu Jakkal CMO; Major General Earl Matthews VP, Strategy, Mandiant Security Validation; Martin Holste Cloud CTO
  • From:
Your email has been sent.
or close