Hi [[ session.user.profile.firstName ]]

Transformação Digital na Prática: Assuma o Controle!

A Transformação Digital vem provocando profundas mudanças nas organizações. Elas têm investido na digitalização de seus processos a fim de torná-los mais simples e eficientes. Sabemos que essa transformação também passa pela nuvem. A questão é: como assumir o controle da sua postura de segurança nesse ambiente, minimizando os riscos para o negócio?

Nesse webinar compartilharemos dicas importantes sobre como manter uma postura de segurança adequada enquanto a sua organização passa pelo processo de Transformação Digital.

Registre-se agora!
Live online Sep 23 1:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Arthur Cesar Oreana, Daniel Gomes
  • Channel
  • Channel profile
  • Além dos Limites dos Escritórios: Proteção Adequada Dentro e Fora da Nuvem Oct 21 2021 1:00 pm UTC 60 mins
    Arthur Cesar Oreana, Daniel Gomes
    Os ataques cibernéticos – cada vez mais avançados e persistentes – representam uma grave ameaça para organizações de qualquer tamanho. Detectar e responder de forma rápida deixou de ser um desejo para se tornar uma necessidade. O endpoint é parte importante de uma estratégia de proteção, principalmente nos dias atuais, onde a sua utilização vai muito além do limite físico dos escritórios das organizações.

    Participe conosco e conheça as boas práticas que garantirão uma postura de segurança adequada! Nossos especialistas compartilharão estratégias de proteção tanto para ambientes locais (on premise) quanto para ambientes em nuvem.

    Registre-se agora!
  • Transformação Digital na Prática: Assuma o Controle! Sep 23 2021 1:00 pm UTC 60 mins
    Arthur Cesar Oreana, Daniel Gomes
    A Transformação Digital vem provocando profundas mudanças nas organizações. Elas têm investido na digitalização de seus processos a fim de torná-los mais simples e eficientes. Sabemos que essa transformação também passa pela nuvem. A questão é: como assumir o controle da sua postura de segurança nesse ambiente, minimizando os riscos para o negócio?

    Nesse webinar compartilharemos dicas importantes sobre como manter uma postura de segurança adequada enquanto a sua organização passa pelo processo de Transformação Digital.

    Registre-se agora!
  • Executive Intelligence Briefing 9/14 Sep 14 2021 7:00 pm UTC 30 mins
    Andrew Kopcienski, Senior Analyst, Mandiant Intelligence for Executives
    A weekly intelligence briefing that empowers customer executives and their supporting staff with FireEye’s latest observations, analysis of current events, and special “behind the scenes” insights clients need to better understand the evolving threat landscape.
  • Obtenga una ventaja sobre las ciber-amenazas que están afectando a México Aug 12 2021 3:00 pm UTC 60 mins
    Fidel Garcia; Consulting Sales Engineer MEXICO, Fireeye/Mandiant
    Las organizaciones están cambiando la forma en que administran sus operaciones de seguridad. En México, el riesgo de ciberataques, así como el fraude y robo de datos se han clasificado entre los 10 principales riesgos con mayor probabilidad de ocurrir. Las organizaciones necesitan todas las ventajas que puedan obtener para proteger a sus activos críticos y sus datos de las amenazas en constante evolución. El mejor punto de partida es comprender a los adversarios, los tipos de amenazas, aprender a usar toda la información disponible para medir la efectividad de la infraestructura de seguridad existente y aplicar automáticamente la inteligencia a la detección y respuesta.
    Acompáñenos este 12 de agosto de 2021 a las 10:00 am (GMT-5), donde nos enfocaremos en:

    - Tomar ventaja de la inteligencia ante los adversarios
    - Valide continuamente la eficacia de sus controles de seguridad.
    - Como tener una defensa automatizada en su entorno.
  • Ransomware: 5 Steps To Protect against it Aug 11 2021 6:00 pm UTC 60 mins
    Brad Curtis and Rich Reece
    In our last webcast, we discussed the true impact of Ransomware attacks by analyzing Mandiant Intelligence to understand where and how it is a growing threat. We also discussed ways in which your organization can take proactive measures to prevent these attacks. But what happens if your organization believes it may have been hit with a Ransomware attack?

    In this follow up webcast, we will outline 5 essential steps and best practices that all organizations should take to ensure adequate protections against an already prevalent and growing number of Ransomware attacks.

    Join our Mandiant experts as they discuss:

    1. The essential requirements to protect against Ransomware attacks today
    2. 5 baseline steps that can be taken to proactively defend against Ransomware
    3. The practices that most organizations are missing that can help circumvent Ransomware threats
  • Mandiant Intelligence Briefing: Stories Directly from the Frontline Recorded: Jul 22 2021 35 mins
    Andrew Kopcienski, Senior Analyst, Mandiant Intelligence for Executives
    Professionalization and commoditization of the cyber threat ecosystem continues to evolve as criminals increase focus on efficiency and profits. Ransomware operations regained attention as an efficient, effective monetization process unlimited by industry or geography with new professional interactions between criminal enterprises and victims.
  • Virtual RoundTable: Reducing the Risk of Cyber Attacks with Data and Automation Recorded: Jul 7 2021 61 mins
    Earl D. Matthews, Maj Gen (Ret), Vice President Strategy, Mandiant; Vic Troyan, Census; Gerald Caron, HHS
    Join Earl D. Matthews, Maj Gen (Ret), Vice President Strategy, ‎FireEye Mandiant, Gerald Caron, Chief Information Officer, HHS and Victor (Vic) Troyan, Assistant Division Chief for Cybersecurity Operations, U.S.Census Bureau, as they discuss how organizations can effectively identify and respond to threats, evaluate and improve their security measures and reduce their business risks before, during and after an incident.
  • Part 4 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Jun 30 2021 39 mins
    Mandiant Security Validation Experts
    In our fourth and final session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore how security validation helps you achieve operational competency and business continuity.

    Register to attend and learn how to design and execute a strategic security validation program to protect your company’s financial position and reputation.

    Refer to the attachment section of this webinar, to register for previous parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speaker:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
  • [Series] Designing an Effective SOC - Part I Economics of Security Operations Recorded: Jun 24 2021 39 mins
    Dr. Larry Ponemon, Chairman, Ponemon Institute and Dan Lamorena, VP of Product Marketing, Mandiant
    Ponemon Insights - Despite significant investments in 2019, half of the security managers in the survey report that their SOC is ineffective at detecting attacks. What’s keeping us stuck? In Part One of this two-part series, Larry Ponemon joins Mandiant to discuss the most recent Ponemon Report findings, new insights into the economics and effectiveness of SOCs.
    In this first installment of the webinar series, learn which variables of the SOC contribute to overall ineffectiveness and worsening ROI, and explore new methodologies that address those issues. Key topics:
    -Cost comparison of In-house SOC vs. Outsourced SOC
    -The cost of skill attrition and hiring
    -Alternative solutions
  • M-Trends 2021: As Principais Tendências e Ameaças Cibernéticas Recorded: Jun 24 2021 61 mins
    Arthur Cesar Oreana
    O relatório anual M-Trends da FireEye Mandiant tem servido como uma fonte confiável de evidências de primeira linha para profissionais de segurança por mais de uma década. Este relatório muito procurado fornece dados e percepções oportunas com base em investigações globais de ataques cibernéticos e remediações de alto impacto.

    Junte-se aos especialistas da FireEye Mandiant para saber mais das últimas métricas de resposta a incidentes, tendências, comportamentos de atacantes e destaques do estudo de caso do relatório de 2021.

    Registre-se agora!
  • Part 3 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Jun 23 2021 38 mins
    Mandiant Security Validation Experts
    In our third session in the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness”, we'll explore the importance of aligning your security validation program to relevant industry attack frameworks such as MITRE ATT&CK.

    Register to attend and discover why you need a depth of industry framework content based on active threat data and its role in security validation.

    Refer to the attachment section of this webinar, to register for upcoming and previous parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speakers:
    Major General Earl Matthews USAF (Ret), Vice President, Strategy, Mandiant Security Validation
    Henry Peltokangas, Director of Product, Mandiant Security Validation
  • Higher Education Under Siege: Cyber Attacks on the Rise Recorded: Jun 22 2021 28 mins
    Vernon Aldershoff, Enterprise Account Manager – education & Chris Candaffio, consulting sales engineer
    Universities, colleges and schools are seeing unprecedented cyber security attacks, breaches and extortion. Higher education institutions face unique threats – we must allow access to networks, face a constant churn of new users, have to accommodate thousands of devices, and are often resource constrained and face a skills shortage. Add compliance to federal regulations and mandates, and it’s an uphill battle to ensure we establish and validate our security posture to ensure we are prepared for ever evolving cyber attacks.
    Join the FireEye & Mandiant experts to learn how you can:
    • Improve your security posture
    • Automate manual tasks
    • Unify your data
    • Create a holistic, secure cloud strategy
    • Block the most dangerous email threats - malicious attachments, phishing sites and impersonation attacks
    • Provide comprehensive endpoint defense
  • Las Principales Tendencias y Ataques Cibernéticos: M-Trends 2021 Recorded: Jun 17 2021 63 mins
    Stephen Fallas, Sr. Cybersecurity Architect Strategist, FireEye/Mandiant LATAM
    El informe anual M-Trends de FireEye Mandiant ha servido como una fuente confiable de evidencia y liderazgo intelectual para los profesionales de la seguridad durante más de una década. Este informe proporciona información y datos oportunos basados en investigaciones globales de ciber ataques y remediaciones de alto impacto.

    Únase a nosotros este 17 de junio a las 10:00 am, para conocer las métricas de respuesta a incidentes más recientes, las tendencias y comportamientos de los atacantes y los aspectos más destacados de los estudios de caso del informe de 2021.
  • Part 2 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Jun 16 2021 33 mins
    Mandiant Security Validation Experts
    As we continue the webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness", part two will explore why emulation of real attacks is critical when testing performance of your security program. Attack simulations are inauthentic and often not recognized by security controls, and can give you a false sense of security.

    Register to attend and gain valuable information about why testing with real attacks is key to your security validation efforts, and best practices for execution across security controls, people, and processes.

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series " Move Beyond Attack Simulation to Validate Security Effectiveness".

    Mandiant Security Validation Speakers:
    Robert Potter, VP of Customer Success, Mandiant Security Validation
    Devon Goforth, Senior Director, Security Instrumentation and Effectiveness, Mandiant Security Validation
  • Executive Intelligence Briefing 6/15 Recorded: Jun 15 2021 27 mins
    Andrew Kopcienski, Senior Analyst, Mandiant Intelligence for Executives
    A weekly intelligence briefing that empowers customer executives and their supporting staff with FireEye’s latest observations, analysis of current events, and special “behind the scenes” insights clients need to better understand the evolving threat landscape.
  • Part 1 | Move Beyond Attack Simulation to Validate Security Effectiveness Recorded: Jun 9 2021 32 mins
    Brian Contos, CISO & VP Technology Innovation, Mandiant Security Validation
    With the rise of costly ransomware and malware attacks, security professionals are under pressure to continuously prove the value of security to business leadership. A common approach has been Breach and Attack Simulation (BAS) which is widely believed to provide a comprehensive view of an organization’s cybersecurity posture. But it falls short in many ways. True security validation requires a specific set of capabilities to generate the evidence needed to bolster cyber defenses, justify security investments, and minimize risk – capabilities that BAS can’t deliver.

    In this webinar series, we’ll outline the critical requirements of security validation, and present important considerations for evaluating traditional BAS versus a security validation platform.

    You’ll learn:

    ● June 9, 2021 at 1PM ET: Part 1 | The Importance of Threat Intelligence and Adversary Knowledge to Prioritize Risks
    ● June 16, 2021 at 1PM ET: Part 2 | Simulation vs Emulation: Why Real Attacks Matte
    ● June 23, 2021 at 1PM ET: Part 3 | Align Security Validation to the MITRE ATT&CK
    ● June 30, 2021 at 1PM ET: Part 4 | Achieving Operational Competency through Validation

    Refer to the attachment section of this webinar, to register for previous or upcoming parts of this webinar series "Move Beyond Attack Simulation to Validate Security Effectiveness".
  • Enter the arena, live the experience and discover how you will react Recorded: Jun 2 2021 88 mins
    David Grout, CTO EMEA, FireEye & Gareth Grindal, Principal Security Consultant, Mandiant Consulting
    Combining our experience in the field with our in-depth knowledge of attackers and their techniques, we have built a unique, immersive and interactive session which challenges you to make the necessary key decisions during a cyber attack.

    During our Cyber Attack Simulation, attendees will be guided through the stages of a ransomware attack, whilst also receiving guidance around the decisions you may need to make. Will you pay, delay or ignore? Are you ready to take the risks and look at the possible outcomes? If yes, you cannot miss this session!
  • Resposta a Incidentes – Quando Devo Acionar o Telefone Vermelho? Recorded: May 27 2021 62 mins
    Lucas Donato, Arthur Cesar Oreana
    Quando já é consenso que todas as organizações são passíveis de sofrerem brechas de segurança, parte do esforço deve se dar na mitigação dos impactos delas, sejam estes impactos de natureza financeira, legal, operacional, regulatória, entre outras.

    Em muitos incidentes, cada minuto transcorrido sem resposta pode ser significativo na gama de impactos acima. Nestas horas, contar com um contrato pré-estabelecido com um parceiro de segurança, economizando horas ou dias em um processo de contratação, pode representar uma diferença substancial na hora de mensurar os impactos resultantes.

    Neste webinar o time da Mandiant apresentará como um Incident Response Retainer oferece mais tranquilidade quando um incidente de segurança é declarado.

    Registre-se agora!
  • Ransomware: What Emulating Ransomware Groups Shows About Your Defenses Recorded: May 26 2021 61 mins
    David Grout, CTO EMEA, Jay Christiansen, Principal Consultant, Red Team Operations, Mandiant Consulting
    One of the hardest questions to answer for any organization is “Could we actually detect a ransomware attack before it’s too late?” With attacker sophistication increasing all the time, there is no guarantee that the policies and plans of yesteryear will still work, nor that the products and automated detections will get there in time.

    The only way to know for sure is to learn from the worst and carry out a sophisticated cyber-attack wearing the mask of a ransomware group attacker. Using the unmatched Threat Intel, the FireEye Mandiant Red Team have been able to conduct such engagements using the tools and techniques of the world’s leading ransomware threat actors and find those spaces between the defensive dream and risk-filled reality that could cost you dearly.

    In this session, our experts reveal some of the results from these engagements which can be adopted into your ongoing security program.
  • How to Make Threat Intelligence Actionable Recorded: May 25 2021 51 mins
    Mike Armistead, Senior Vice President of Mandiant Advantage Products; Dr. Edward Amoroso, CEO, TAG Cyber
    Automate and Simplify the SOC.

    Organizations need every advantage they can get to protect their people, critical systems and data from constantly evolving threats. Their best starting point is to understand the adversaries and types of threats likely to target their infrastructure and design a security program to match their capabilities.

    Threat Intelligence is critical here, and defenders must learn to use all available information to measure the effectiveness of existing security infrastructure and automatically apply intelligence to detection and response.

    Join Mike Armistead, Senior Vice President of Mandiant Advantage Products, with Dr. Edward Amoroso, CEO of TAG Cyber, discussing Dr. Amoroso’s report, The Role of Threat Intelligence in Continuous Validation and Monitoring.

    They’ll cover how threat intelligence should be operationalized to:

    - Validate that security controls can effectively prevent and detect attacks
    - Monitor for threats actively targeting your industry or organization
    - Inform business stakeholders of critical organizational risk.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Transformação Digital na Prática: Assuma o Controle!
  • Live at: Sep 23 2021 1:00 pm
  • Presented by: Arthur Cesar Oreana, Daniel Gomes
  • From:
Your email has been sent.
or close