Hi [[ session.user.profile.firstName ]]

Swimming with sharks: Understanding & countering threats in higher education

Hosted by University Business:
An interactive discussion about cyber threats facing higher education and how you can prioritize your limited resources to most effectively protect your digital assets.

Topics will include:
•Review common cyber threats facing higher education
•Learn about cyber threat intelligence (CTI) concepts
•Explore how CTI can improve your information security
Recorded Jun 29 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Schreiber, Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
Presentation preview: Swimming with sharks: Understanding & countering threats in higher education
  • Channel
  • Channel profile
  • FireEye Helix Explained: Multistage Rules Aug 25 2020 4:00 pm UTC 60 mins
    ​Sarah Cox Sr. Instructional Designer FireEye and Mike Kizerian Principal Instructor, FireEye
    Today’s security operations are often disjointed and constrained by limited visibility and false alerts. These issues can cost organizations valuable time, resources and effort, even as they increase the risk of an incident. FireEye Helix enables organizations to take control of any incident from alert to fix, and addresses traditional SIEM shortfalls while delivering highly efficient, low-maintenance security automation.

    Join us for the next session in a series of webinars, as our experts highlight:

    •Improving FireEye Rule coverage in your environment
    •Tuning FireEye Rules to maintain a manageable flow of alerts
    •Creating custom Rules for detection
    •Creating multistage Rules to detect threats across multiple event logs

    Follow along with a hands-on Helix demonstration of multistage Rules during the session and receive sample use cases used in the webinar. Stay with us after the presentation for an in-depth Q&A session with our experts.
  • Opening the Books on Ghostwriter Aug 19 2020 3:00 pm UTC 60 mins
    Lee Foster, Senior Manager of Analysis, Mandiant Threat Intelligence
    Mandiant Threat Intelligence has identified a broad influence campaign that is closely aligned with Russian security interests. These operations have primarily targeted audiences in Lithuania, Latvia, and Poland with narratives critical of the North Atlantic Treaty Organization’s (NATO) presence in Eastern Europe while also leveraging anti-U.S. and COVID-19 themes. Mandiant Threat Intelligence has dubbed this campaign “Ghostwriter” based on its use of compromises news sites and fake personas to disseminate fabricated content.

    Join Lee Foster, Senior Manager of Analysis with Mandiant Threat Intelligence as he describes how Mandiant discovered the Ghostwriter campaign and details the various TTPs it employs.

    Register Now!
  • Mitigate Ransomware Risks With An Enterprise Content Firewall Aug 12 2020 6:00 pm UTC 60 mins
    Tim Gallo, Global Security & Intel Architect, FireEye; Cliff White, CTO, Accellion; Chris Unick, Director, FireE
    When you have to choose between paying a cyber ransom or losing your IP and customer content and taking a hit to your reputation, it’s really no choice at all. Ideally, you should avoid the problem entirely—detect and quarantine incoming files that contain ransomware before they do damage.

    Attend this webinar to learn how to combine Accellion’s enterprise content firewall with FireEye Malware Analysis and Helix to protect all your communication channels with a unified infrastructure, unified security and unified visibility.

    Key Takeaways:
    • Detect and quarantine ransomware with FireEye detection capabilities with Accellion’s content firewall
    • Use a content firewall to unify governance and security of traffic from all content communication channels
    • Use FireEye Helix to monitor and analyze the clean, pre-normalized security logs of all the consolidated content flows

    Reserve your seat for our live event on Wednesday, August 12, 2020 at 11am Pacific. l 2pm Eastern

    Tim Gallo | Global Security and Intelligence Architect, FireEye
    Cliff White | CTO, Accellion
    Christopher Unick | Director Technical Partnerships, FireEye
  • Modern Cyber Risk Management for Better Decision Making Recorded: Aug 11 2020 42 mins
    Matt Keane, Principal Consultant at FireEye Mandiant, & Jennifer Guzzetta, Product Marketing Manager at FireEye Mandiant
    Most C-suite leaders believe their investment decisions in security risk management is not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk models, which leaves gaps between attacker and defender behaviors.

    Transformation of your risk management processes, plus the people behind them, can solve for this.

    Aligning your organization’s security efforts with the risk appetite of data owners and business leaders must become a priority.

    This webinar spotlights a transformational model that operationalizes security risk management to improve and optimize decision making by:

    •Identifying challenges in your current cyber risk management program
    •Establishing a modern cyber risk management strategy
    •Shifting the players and processes involved in your cybersecurity decision support
    •Integrating risk management priorities across the entire security function
    •Monitoring progress with the right kind of security metrics

    Join Matt Keane, Principal Consultant at FireEye Mandiant, for his expertise on transforming your security risk management approach by bridging the gap between vital security teams and improving their decision making.
  • Educause Webinar: Community Resilience: Working Together to Improve Cybersecurit Recorded: Aug 10 2020 48 mins
    Monte Ratzlaff, University of California, Chris Schreiber, FireEye
    Higher education has a history of collaboration that’s unique compared to other verticals. Join FireEye and the University of California Office of the President to explore how cyberthreat intelligence and peer collaboration can extend cyber resilience capabilities beyond a single campus boundary.
    •Understand concepts for applying cyberthreat intelligence to your campus
    •Learn how UC applies these concepts across their campuses and medical centers
    •Discuss potential methods for enhancing collaboration across the broader community
  • Top 5 Cloud Security Myths: Busted Recorded: Aug 5 2020 55 mins
    Martin Holste, CTO, FireEye
    Through 2022, organizations are expected to be responsible for at least 95% of their cloud security failures (Gartner). But change how you think about cloud security, and you can be a success story.

    Our webinar helps debunk several common myths that jeopardize your fast, secure, migration to the cloud:

    • The cloud is unsafe
    • My organization doesn’t use the cloud
    • My cloud provider will keep me secure
    • The cloud is just someone else’s computer
    • Advanced adversaries aren’t attacking the cloud

    You’ll also learn how to identify a trusted advisor for cloud migration so you can confidently take advantage of cloud advancements.

    Presented by: Martin Holste, Cloud CTO at FireEye
  • Cybersecurity Expertise and Female Leadership: Why Boardrooms Need Both Recorded: Jul 22 2020 62 mins
    Coco Brown, Founder and CEO, Athena Alliance; Alexa King, EVP, General Counsel, FireEye
    Although diversity in the c-suite and the boardroom is improving, there is more work to be done. Through its Elevate initiative, FireEye looks to continue to help connect, educate and enable cyber security leaders to assume responsibilities within today’s boards.
    During this discussion, Alexa King, FireEye EVP, General Counsel and Board Member, and Coco Brown, the founder and CEO of the accomplished Athena Alliance platform, will share details and key learnings from their own personal journeys. They will highlight some of the opportunities that exist for women in cyber security as they identify and prepare for board level roles, as well as the best ways to go about advocating for others.

    Alexa and Coco strongly believe in the power of women as executives in cyber security, and how important it is to have different perspectives on a board. Making connections, bringing opportunities to more women and offering support along the way will help benefit all women leaders in cyber.
  • Measure What Matters - Enhancing Cybersecurity with Metrics Recorded: Jul 7 2020 62 mins
    John Hultquist, Senior Director, Intelligence Analysis,FireEye; Kevin Cox, Program Manager, Continuous Diagnostics and Mitiga
    With high profile breaches threatening operations, ransomware attacks on the rise, and a myriad of laws and regulations guiding cybersecurity initiatives, federal, state and local governments have prioritized shoring up their cyber defenses across the board. However, as organizations work to enhance their cybersecurity, how can they ensure these efforts are effective and in compliance with federal standards and regulations? During this webcast, Nextgov and Route Fifty explored how to develop effective cybersecurity metrics and the ways agencies are being measured. Panelists discussed how to identify what to measure when it comes to cybersecurity, how to measure it, and how to turn these metrics into actionable intelligence.
  • Building a Ransomware Defense Recorded: Jul 7 2020 62 mins
    Luke McNamara, Principal Analyst, FireEye, Jon Ford, Director of Global Strategy and Operations for Government, Dan Lohrmann
    Ransomware is a remote, digital shakedown. It is disruptive and expensive, and it affects organizations of all sizes and in many industries. Government, however, faces greater risks and impact. Infections have shut down entire operations, forcing law enforcement agencies to drop cases and hospitals to turn away patients. But there may be a silver lining. Focusing defensive efforts in key areas and with practiced response planning may allow organizations to stop ransomware before it is deployed.

    Listen to Government Technology and FireEye to hear how advanced detection and prevention and front line response practices -- supported by actionable threat intelligence -- are the best defense against ransomware and other advanced attacks. View the webcast to better understand:
    •Ransomware trends and landscape – NEW actors on the scene!
    •The “after hours” factor
    •Common initial infection vectors and dwell time
    •Potential threats to government, elections and more
    •How to defend and respond
  • Swimming with sharks: Understanding & countering threats in higher education Recorded: Jun 29 2020 58 mins
    Chris Schreiber, Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
    Hosted by University Business:
    An interactive discussion about cyber threats facing higher education and how you can prioritize your limited resources to most effectively protect your digital assets.

    Topics will include:
    •Review common cyber threats facing higher education
    •Learn about cyber threat intelligence (CTI) concepts
    •Explore how CTI can improve your information security
  • BrightTALK Local California: The Future of Events Recorded: Jun 25 2020 61 mins
    Riadh Dridi, CMO, Automation Anywhere; Vasu Jakkal, EVP & CMO, FireEye; Simon Lees, CBO, BrightTALK
    The future of events is unclear. Many marketers are leaning into entirely virtual strategies, while others are cautiously planning for a new breed of in-person and hybrid events in 2021. Join this webcam panel to hear how two of the Golden State’s top CMOs are adapting their strategies to drive results during and after the pandemic. They’ll cover:
    * Predictions for events in 2021 and beyond
    * Pivoting your in-person event strategy online
    * Inspiring your audience in the digital realm
    * Benefits and challenges of virtual events
    * Planning for an uncertain future
    * Keeping your marketing team focused while working from home
  • Ransomware Legal Implications and Proactive Solutions Recorded: Jun 24 2020 64 mins
    Experts from Mandiant, McDermott Will & Emery, Blake Cassels & Graydon LLP & Chubb
    In the 2020 M-Trends report, we noted that successful monetization of ransomware attacks and the availability of ransomware as a service have contributed to an increase in ransomware cases.

    In this session, Mandiant experts will be joined by speakers from US-based law firm McDermott Will & Emery, Canadian-based law firm Blakes, and global insurance partner Chubb, to discuss:

    •The threat profile of a ransomware attack
    •Best practices for ransomware recovery and response
    •The legal implications of a ransomware attack across the US and Canada
    •How to minimize the legal impact of a ransomware breach
    •The reactive and proactive insurance measures you can take to minimize business impact

    We encourage you to attend this session with your team to understand the impact of a breach on various business units, and the mitigation tactics that can be employed by all stakeholders within an organization.

    Reserve your spot today!
  • Security Effectiveness Strategies Recorded: Jun 16 2020 58 mins
    Maj.General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Intel Consulting
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

    Register Now
  • 5 Steps to Security Validation Recorded: Jun 15 2020 60 mins
    Major General Earl Matthews (USAF)
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we believe that our security teams are well trained and practiced when everything goes wrong. These assumptions result in financial and operational inefficiencies, defensive regression and an inability to determine if we are investing in the right areas to communicate the state of our security effectiveness to stakeholders.

    Join this webinar to hear from Retired Major General Earl Matthews (USAF), as he discusses:

    • How to move beyond assumptions with automated and continuous security controls validation
    • Identify and measure vulnerability gaps
    • Manage and suggest remediation steps by arming security practitioners with meaningful evidence
    • Validate an organization's ability to defend itself by using real adversary behaviors

    Save your seat today!
  • Validate Security Performance to Rationalize Investments Recorded: Jun 11 2020 52 mins
    Major General Earl Matthews, VP of Strategy for Mandiant Security Validation
    Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

    In this session, led by Major General Earl Matthews, VP of Strategy for Mandiant Security Validation, you can learn:

    - Best practices for investment prioritization when it comes to hiring, training and security solution procurement
    - How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
    - Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
  • C-Suite Conversations: The Value of Threat Intelligence Recorded: Jun 11 2020 47 mins
    Nigel Gardner, Sr. Cyber Threat Intelligence Leader, MGM & Bart Lenaerts-Bergmans, Sr. Product Marketing Manager, Mandiant
    Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders?
    Join this session to hear Nigel Gardner, Senior Cyber Threat Intelligence Leader at MGM Resorts discuss:

    • Types of threat intelligence consumers
    • Whether to use outcomes or operational metrics to communicate threat intelligence
    • Whether ROI-based justification is required to measure the success of threat intelligence
    • Use cases that illustrate working and nonworking approaches
  • Cloud Security for Government: A Conversation with the CyberWire and FireEye Recorded: Jun 11 2020 59 mins
    Host, Producer: Dave Bittner, CyberWire; Martin Holste and Steve Booth, FireEye; Lisun Hung, Cloudvisory, now part of FireEye
    Cloud usage in the public sector has evolved significantly, and so has its security. Still, federal agencies continue to face many new challenges, such as lack of continuous visibility, inability to detect misconfigurations and credential misuse, lack of detection capabilities for cloud-hosted artifacts and confusion around the shared responsibility model.

    On June 11th at 3:00 PM ET, the CyberWire and FireEye subject matter experts will discuss how government IT managers can overcome these challenges and pave the way for a successful path forward. Our conversation will cover not only the state of cloud for government use, but also how to:

    - Gain greater visibility across hybrid, public, private, and multi-cloud environments
    - Achieve cloud compliance, enforcement, and control
    - Manage and mitigate risks in the cloud, from a CISO’s perspective
    - Secure the remote workforce
  • How to Fortify Your Security Operations with Technology and Expertise Recorded: Jun 11 2020 52 mins
    Patrick O’Sullivan, Director of Security Engineering, Alorica​, & Stanley Parret, Principal Consultant, Mandiant​
    Today is the day you outplay cyber attackers. They can deliver easy to execute, threats with immediate impact through an as-a-service model. To beat them, CISOs must assemble skilled cyber security staff, threat intelligence and technology into an innovative managed detection and response (MDR) capability.

    Navigating the MDR marketplace can be difficult without insight from peer organizations with established programs. Stanley Parret, Mandiant Principal Consultant and Patrick O'Sullivan, Director of Security Engineering at Alorica can give you insights and advice for selecting the best MDR solutions for your needs and show you how you can outmaneuver attackers.

    Join this session to:
     Understand emergent threats and tactics that drive your need to quickly detect and respond to cyber threats.
     Realize that you’re not in an either-or situation and learn how to align people, technology and operations in your SOC.
     See what it looks like to outplay your attacker in a live tabletop exercise.
  • Sandworm Resurfaced: The Continuing Story Recorded: Jun 11 2020 59 mins
    Andy Greenberg Author, Journalist, WIRED & John Hultquist, Sr. Director, Intelligence Analysis, Mandiant Threat Intelligence
    A few years ago, in the wake of the annexation of Crimea by the Russian Federation, the world became aware of the extent of Russia's cyber attack capabilities. The story of this first real instance of sustained, unrestricted cyber war is captured in WIRED journalist Andy Greenberg’s award-winning book SANDWORM: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers.

    In this session, Andy Greenberg is welcomed by John Hultquist of Mandiant for a review of Sandworm activities, from blackouts in Ukraine to NotPetya, the most costly cyberattack in history. They will also discuss the enduring relevance of the Sandworm group in light of the recent U.S. National Security Agency warning about the group’s continuing activities to disrupt global government and corporate networks and systems.
  • Mandiant’s Perspective On The Threat Actors In Europe Recorded: Jun 11 2020 60 mins
    Adrien Bataille, Senior Consultant, FireEye Mandiant
    In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. Mandiant investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Swimming with sharks: Understanding & countering threats in higher education
  • Live at: Jun 29 2020 4:05 pm
  • Presented by: Chris Schreiber, Christian Schreiber, CISM, PMP Cybersecurity Platform Strategist, FireEye
  • From:
Your email has been sent.
or close