Hi [[ session.user.profile.firstName ]]

Connect the Dots of Your Security Evidence | The Role of XDR in the SOC

Security analysts are swimming in a sea of alerts. They end up staring at screens and multiple consoles instead of focusing on the real cyber detective work of finding attackers. Current SOC tools only fill in some of the blanks and require constant tuning and maintenance. There is a better way.

Chris Calvert, SOC builder and co-founder of Respond Software, has helped many organizations change their reactive SOC posture to a proactive approach of finding the bad guys. Watch the on-demand webinar to hear from Chris about the new XDR (Extended Detection and Response) product category and how organizations are deploying XDRs to detect and respond to attacks faster at a fraction of the cost.
Recorded Sep 29 2020 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Calvert, Co-Founder & CTO and Dan Lamorena, CMO of Respond Software
Presentation preview: Connect the Dots of Your Security Evidence | The Role of XDR in the SOC
  • Channel
  • Channel profile
  • Além dos Limites dos Escritórios: Proteção Adequada Dentro e Fora da Nuvem Oct 21 2021 1:00 pm UTC 60 mins
    Arthur Cesar Oreana, Daniel Gomes
    Os ataques cibernéticos – cada vez mais avançados e persistentes – representam uma grave ameaça para organizações de qualquer tamanho. Detectar e responder de forma rápida deixou de ser um desejo para se tornar uma necessidade. O endpoint é parte importante de uma estratégia de proteção, principalmente nos dias atuais, onde a sua utilização vai muito além do limite físico dos escritórios das organizações.

    Participe conosco e conheça as boas práticas que garantirão uma postura de segurança adequada! Nossos especialistas compartilharão estratégias de proteção tanto para ambientes locais (on premise) quanto para ambientes em nuvem.

    Registre-se agora!
  • Parte 2| FireEye XDR: Reduce la complejidad de seguridad en TI Sep 30 2021 3:00 pm UTC 60 mins
    Stephen Fallas, Cybersecurity Architect Strategist | CDPSE-CISM-CGEIT-CISSP-CRISC-GPCI-GICSP-BS7799| | LATAM Territory
    En esta sesión analizaremos cómo reducir la complejidad de seguridad de la infraestructura de TI corporativa y protegerse contra las principales amenazas cibernéticas. Como la experiencia e inteligencia le ayudara a priorizar los riesgos, orientar las respuestas y acelerar las operaciones de seguridad.
  • Why Sandboxing is still relevant. Sep 29 2021 7:00 pm UTC 60 mins
    Mike Harrington - Sales Engineer, Edwin A Betancourt - Solutions Architect, Chris Candaffio - Consulting Sales Engineer
    As the threat landscape continually evolves, security practitioners must advance their skills and tools to meet those new threats. Traditionally, Sandboxing was used primarily as a forensic analysis tool. Modern Sandboxing solutions can be used to detect today’s threats and protect your enterprise whether on-premise or in the cloud. Join this Webinar and learn how to protect applications like (O365, Slack, Teams, Box, Drobox, AWS S3, OneDrive…etc.) by integrating Sandboxing directly into the workflow.

    Join our engineering team as they answer the following questions during this technical workshop:
    - What does a modern Sandboxing solution look like?
    - Evolution of Sandboxing from static to dynamic (Automation, Workflow)
    - Use cases and demonstration

    Reserve your seat!
  • Parte 1| FireEye XDR: Un nuevo significado a la detección y respuesta extendidas Sep 23 2021 3:00 pm UTC 60 mins
    Stephen Fallas, Cybersecurity Architect Strategist | CDPSE-CISM-CGEIT-CISSP-CRISC-GPCI-GICSP-BS7799| | LATAM Territory
    Desde hace muchas décadas, las amenazas emergentes han puesto en riesgo a las organizaciones. A medida que el panorama de TI evolucionó y los actores de amenazas encontraron nuevas formas de atacar, los equipos de seguridad necesitaron encontrar nuevas formas de detectar y responder a las amenazas. Si bien las herramientas de seguridad como las tecnologías SIEM, SOAR y EDR tienen sus ventajas, las organizaciones deben mirar más allá de los límites de estas ofertas hacia la detección y respuesta extendidas (XDR). FireEye XDR protege a las organizaciones a través de tecnologías de detección, protección y respuesta entregadas a través de una plataforma extensible basada en la nube.

    En esta sesión cubriremos cómo surgió la seguridad XDR, por qué FireEye de XDR se centra en los resultados de seguridad y cómo puede simplificar la detección de amenazas, la investigación y la respuesta a incidentes.
  • Transformação Digital na Prática: Assuma o Controle! Sep 23 2021 1:00 pm UTC 60 mins
    Arthur Cesar Oreana, Daniel Gomes
    A Transformação Digital vem provocando profundas mudanças nas organizações. Elas têm investido na digitalização de seus processos a fim de torná-los mais simples e eficientes. Sabemos que essa transformação também passa pela nuvem. A questão é: como assumir o controle da sua postura de segurança nesse ambiente, minimizando os riscos para o negócio?

    Nesse webinar compartilharemos dicas importantes sobre como manter uma postura de segurança adequada enquanto a sua organização passa pelo processo de Transformação Digital.

    Registre-se agora!
  • Part 4 | Move Beyond Attack Simulation to Validate Security Effectiveness Sep 22 2021 2:00 pm UTC 39 mins
    Mandiant Security Validation Experts
    In our fourth and final session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore how security validation helps you achieve operational competency and business continuity.

    Register to attend and learn how to design and execute a strategic security validation program to protect your company’s financial position and reputation.

    Refer to the attachment section of this webinar, to register for previous parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speaker:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
  • FireEye Helix Explained: Preview of New Features Sep 21 2021 4:00 pm UTC 60 mins
    Sarah S. Cox, Prin. Instr Designer; Veronica Carr, Prin. Prod. Mgr.; Vignesh Balan R, Staff Prod. Mgr.; Todd Bane, Sr. Mgr.
    Helix works with FireEye and third-party sources, including cloud and SaaS applications.
    In this session we will be demonstrating new Helix features that enhance the security analyst experience. Current Helix customers will be invited to join a program with early access to these features, prior to their anticipated roll-out over the next few months.
    Join this installment in our webinar series, as our experts highlight:
    • Threat detection and enrichment
    • Alert correlation across data sources
    • Built-in automation for response action capabilities
    • Threat graph visualization

    The session includes a hands-on demonstration of these upcoming features that will show you how to take advantage of detection, correlation, and automated response action. Stay on after the session for an in-depth Q&A with our experts.
  • Understanding Multifaceted Extortion Attacks & How to Protect Against Them Recorded: Sep 16 2021 56 mins
    Evan Pena, Director, Mandiant; Nick Bennett, Vice President, Mandiant
    Ransomware Ups Its Game: Understanding Multifaceted Extortion Attacks and How to Protect Against Them

    Organizations across all industries are facing devastating threats to their day-to-day operations from opportunistic cyber criminals and nation-state actors. They have mastered ransomware deployment and evolved their tactics to multifaceted extortion—some resulting in million-dollar payouts, damaged reputation, and ongoing loss of operational capacity.

    To prevail against these threat actors, security teams must understand attacker motivations and behaviors and discover how to further improve detection, prevention, and response capabilities. In this webinar, Mandiant representatives Evan Pena, Director, and Nick Bennett, Vice President, discuss:
    • Best practices for preventing the deployment of ransomware and multifaceted extortion attacks in your environment
    • Use cases that spotlight effective and actionable techniques to reduce the risk of these attacks
    • Insights on the tools, tactics and procedures used by real-world threat actors as seen on the frontlines

    There are no rules of engagement for these attackers, so let’s be sure to stay one step ahead of them.
  • Part 3 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Sep 15 2021 38 mins
    Mandiant Security Validation Experts
    In our third session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore the importance of aligning your security validation program to relevant industry attack frameworks such as MITRE ATT&CK.

    Register to attend and discover why you need a depth of industry framework content based on active threat data and its role in security validation.

    Refer to the attachment section of this webinar, to register for upcoming and previous parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speakers:
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
    Henry Peltokangas, Director of Product, Mandiant Security Validation
  • Executive Intelligence Briefing 9/14 Recorded: Sep 14 2021 29 mins
    Andrew Kopcienski, Senior Analyst, Mandiant Intelligence for Executives
    A weekly intelligence briefing that empowers customer executives and their supporting staff with FireEye’s latest observations, analysis of current events, and special “behind the scenes” insights clients need to better understand the evolving threat landscape.
  • Critical Elements of a Cyber Security Strategy: Incident Response Retainers Recorded: Sep 14 2021 51 mins
    Lyle Sudin
    Don't let cyber security incidents slow you down. Incident Response Retainers help you respond to and contain incidents quickly. The FireEye Mandiant team spend about 200,000 hours per year working on the most impactful breaches and has been at the forefront of cyber security and cyber threat intelligence since 2004.

    In this session we will discuss:
    - What exactly is an Incident Response Retainer and how having one in place can save you precious time when it matters most
    - Why Incident Response Retainers are a critical piece of a cyber security strategy
    - How Incident Response Retainers provide you the flexibility to structure the retainer to your organization needs

    Reserve your spot today with Lyle Sudin
  • Part 2 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Sep 9 2021 33 mins
    Mandiant Security Validation Experts
    As we continue the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness", part two will explore why emulation of real attacks is critical when testing performance of your security program. Attack simulations are inauthentic and often not recognized by security controls, and can give you a false sense of security.

    Register to attend and gain valuable information about why testing with real attacks is key to your security validation efforts, and best practices for execution across security controls, people, and processes.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speakers:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Devon Goforth, Senior Director, Security Instrumentation and Effectiveness, Mandiant Security Validation
  • Part 3 | FireEye XDR: Moving Beyond the Limits of SIEM, SOAR, and EDR Recorded: Sep 8 2021 32 mins
    JR Wikes, Principal Systems Engineer and David Batty, Principal Systems Engineer, FIreEye Inc.
    In part three, the last part of our webinar series for "FireEye XDR: Bringing New Meaning to Extended Detection and Response", we discuss how to reduce the security complexity of modern corporate IT infrastructure.

    The strengths and limitations of SIEM, SOAR and EDR solutions are detailed to illustrate the need for and value of XDR in an organization’s cyber environment.

    Register to learn how FireEye XDR platform can improve your security posture.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "FireEye XDR: Bringing New Meaning to Extended Detection and Response".
  • Finding Evil: Building an Incident Response Plan for Any and Every Incident Recorded: Sep 8 2021 120 mins
    Matt Bromley, Senior Principal Managed Defense Analyst, FireEye Mandiant
    Responding to a cybersecurity incident is an arduous event, leading to long hours and can impact a security team's confidence. Incident response is even worse when your organization as no plan in place and is "winging it", hoping that the attacker may eventually get bored and leave your environment. But, simply "having" a plan is not enough.

    The best plans are thoroughly tested and modified as needed. An incident response plan may have a shelf life of a month, a quarter, or half a year. But how do we determine when to change, and what to change? Intelligence and knowledge of the latest threats helps bring all that together.

    Join us for this Finding Evil webinar where we are going to look at :

    - How to use the six-step incident response to build a resilient plan that can stand up to any incident,
    - How to integrate threat intelligence and frameworks like MITRE ATT&CK and D3FEND into your incident response plan to make it more resilient,
    - When and how often should an organization look at their incident response plan, and
    - How to make adjustments to your incident response plan as you incorporate new technology, people, and processes.

    We look forward to having you join us and, as always, our event will also feature a live Capture the Flag (CTF) event to allow attendees to get hands-on with a "real" incident. See you there!
  • Part 2 | FireEye XDR: Born from Frontline Intelligence Recorded: Sep 1 2021 31 mins
    Robert Kusters, Senior PMM Cloud Endpoint Security, and Veronica Carr, Sr Principal PM, Security Platforms at FireEye
    In part two of our webinar series for "FireEye XDR: Bringing New Meaning to Extended Detection and Response", we discuss how FireEye relentlessly protects its customers against major cyber threats. Our frontline human expertise and intelligence helps you prioritize risks, guide responses and accelerate security operations.

    Register to learn how FireEye XDR can simplify threat detection, investigation and incident response.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series " FireEye XDR: Bringing New Meaning to Extended Detection and Response".
  • Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Aug 31 2021 32 mins
    Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation
    With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver.

    In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform.

    You’ll learn:

    ● June 9, 2021 at 1PM ET: Part 1 | The Importance of Threat Intelligence and Adversary Knowledge to Prioritize Risks
    ● June 16, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte
    ● June 23, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK
    ● June 30, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".
  • Part 1 | FireEye XDR: Understanding XDR Security Recorded: Aug 25 2021 31 mins
    Robert Kusters, PMM, Cloud Endpoint Security and Jim Waggoner, VP of Product Management, FireEye
    For many decades now, emerging threats have put organizations at risk. As the IT landscape evolved and threat actors found new ways to attack, security teams needed to find new ways to detect and respond to threats. While security tools such as SIEM, SOAR and EDR technologies all have their benefits, organizations must look beyond the limits of these offerings to extended detection and response (XDR).

    FireEye XDR protects organizations though unmatched detection, protection and response technologies delivered through an extensible cloud-based platform. By simplifying and correlating incident data across the entire security stack, FireEye XDR applies frontline intelligence and analytics to help you find and resolve the threats that matter most.

    Join us for a webinar series on FireEye XDR, where we will cover how XDR security came about, why FireEye’s take on XDR is focused on security outcomes, and how we have been delivering on this for years.


    Register for all parts of this webinar series:

    Part 1| Understanding XDR Security
    August 25, 2021 at 10am PT | 1pm ET

    Part 2| FireEye XDR: Born from Frontline Intelligence
    September 1, 2021 at 10am PT | 1pm ET

    Part 3| FireEye XDR: Moving Beyond the Limits of SIEM, SOAR, and EDR
    September 8, 2021 at 10am PT | 1pm ET
  • Tales from the Trenches: How Managed Defense Customers Avoid the Biggest Threats Recorded: Aug 25 2021 65 mins
    Mandiant Managed Defense Expert Team: Matt Bromiley, Principal Consultant; Daniel Slack, Director
    For most organizations, a security breach or ransomware infection is a nightmare scenario. But how do these scenarios change when you join forces with battle-tested experts?

    In this live webinar, we'll reach into Managed Defense, Mandiant’s managed detection and response (MDR) service to show real-world examples of how Mandiant addresses the biggest threats, from the sly spying of SUNBURST to the exploitation of the Microsoft Exchange and SonicWall zero-day vulnerabilities. We'll hear from the Managed Defense Consultants who saw these events unfolding before them, and who did all they could to defend their customers.

    Join Matthew Bromiley and Daniel Slack, for a look inside Managed Defense and the biggest breaches of the year.

    You’ll learn:
    • How Managed Defense helps customers prepare for threats like ransomware and APT actors
    • How the timelines of specific customers unfolded when the threats surfaced
    • How Managed Defense helped customers understand the risk involved and helped them address issues along the way with access to real-time threat intelligence and data.
  • Obtenga una ventaja sobre las ciber-amenazas que están afectando a México Recorded: Aug 12 2021 67 mins
    Fidel Garcia; Consulting Sales Engineer MEXICO, Fireeye/Mandiant
    Las organizaciones están cambiando la forma en que administran sus operaciones de seguridad. En México, el riesgo de ciberataques, así como el fraude y robo de datos se han clasificado entre los 10 principales riesgos con mayor probabilidad de ocurrir. Las organizaciones necesitan todas las ventajas que puedan obtener para proteger a sus activos críticos y sus datos de las amenazas en constante evolución. El mejor punto de partida es comprender a los adversarios, los tipos de amenazas, aprender a usar toda la información disponible para medir la efectividad de la infraestructura de seguridad existente y aplicar automáticamente la inteligencia a la detección y respuesta.
    Acompáñenos este 12 de agosto de 2021 a las 10:00 am (GMT-5), donde nos enfocaremos en:

    - Tomar ventaja de la inteligencia ante los adversarios
    - Valide continuamente la eficacia de sus controles de seguridad.
    - Como tener una defensa automatizada en su entorno.
  • Ransomware: 5 Steps To Protect against it Recorded: Aug 11 2021 64 mins
    Rich Reece and David Pany
    In our last webcast, we discussed the true impact of Ransomware attacks by analyzing Mandiant Intelligence to understand where and how it is a growing threat. We also discussed ways in which your organization can take proactive measures to prevent these attacks. But what happens if your organization believes it may have been hit with a Ransomware attack?

    In this follow up webcast, we will outline 5 essential steps and best practices that all organizations should take to ensure adequate protections against an already prevalent and growing number of Ransomware attacks.

    Join our Mandiant experts as they discuss:

    1. The essential requirements to protect against Ransomware attacks today
    2. 5 baseline steps that can be taken to proactively defend against Ransomware
    3. The practices that most organizations are missing that can help circumvent Ransomware threats
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Connect the Dots of Your Security Evidence | The Role of XDR in the SOC
  • Live at: Sep 29 2020 6:00 pm
  • Presented by: Chris Calvert, Co-Founder & CTO and Dan Lamorena, CMO of Respond Software
  • From:
Your email has been sent.
or close