Browse communities
Browse communities
Presenting a webinar?

The Rising Costs of Targeted Attacks on Financial Institutions

Jerry Archer, SVP/CSO, Sallie Mae; Phil Lin, Ed Dembowski, FireEye
Next-generation threats are aggressively targeting sensitive data, from high value M&A information to consumer PII. And, the increasing regulations around consumer and transaction data makes it more critical than ever to safeguard both the confidentiality as well as the integrity of the information.

Due to the sophistication of malware as well as the explosion in the number and types of malware variants, traditional defenses like next-generation firewalls, IPS, antivirus, and gateways have been rendered ineffective. Also, with the many 3rd parties accessing your network, like auditors, consultants, and subsidiary organizations, it is increasingly difficult to maintain a secure network.

This webcast explores the rising costs of targeted attacks and how you can protect against sophisticated malware.

Learn more about:
• Dynamic defenses to stop targeted attacks
• How to block data exfiltration attempts over multiple protocols
• Integrating inbound and outbound filtering to stop spear phishing
Aug 23 2012
61 mins
The Rising Costs of Targeted Attacks on Financial Institutions
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (116)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Tales from the Crypt: Reversing Malware with the FLARE Team Apr 7 2015 5:00 pm UTC 60 mins
    Matt Graeber, Staff Reverse Engineer, Dimiter Andonov, Staff Reverse Engineer
    Join FireEye Labs Advanced Reverse Engineering (FLARE) team members Matt Graeber and Dimiter Andonov for another exciting deep dive on new malware case studies found during Mandiant investigations. FLARE is dedicated to malware analysis and the development of tools to assist reverse engineering. The two malware they’ll dissect as part of this interactive discussion include:

    1.Steganogram Shellcode Backdoor - The malware is a downloader and launcher that uses steganography to extract shellcode, commands, and data from PNG images. Which results in advanced modular backdoor capable of collecting wide range information related to the compromised system and executing even more shellcode!
    2.Hybrid 32/64-bit Malware - The malware mixes 32-bit and 64-bit code to inject into the explorer.exe process depending upon the target architecture. We’ll show how this broke our malware tools and our solution.

    Register today!
  • Cybersecurity Collaboration: Leveraging a Trusted Partner Recorded: Mar 24 2015 47 mins
    Josh Goldfarb, VP, CTO - Americas, FireEye
    Your adversaries are people: creative, nimble and persistent. They can bypass conventional security deployments almost at will, breaching systems in a wide swatch of industries and geographies.

    Technology alone will not defeat a determined attacker. You need a strategic defense partner that combines the most advanced technology platform with the leading cyber security expertise and the latest global threat intelligence from around the world. FireEye as a Service (FaaS) does exactly this, and allows you to detect, prevent, analyze, and respond to security incidents in minutes rather than months.

    Join FireEye, VP, CTO - Americas Josh Goldfarb, as he explores:

    - The current state of cybersecurity and the new threat landscape
    - The failure of traditional defense models in the face of a new adversary
    - The value of an Adaptive Defense strategy and working with a trusted partner
    - Real-world case studies

    As always, we will save plenty of time for Q&A. Be sure to register now to take part in this critical webinar.
  • Enhancing a Security Posture with Network Forensics Recorded: Mar 12 2015 36 mins
    Kevin Sheu, Sr. Manager, Product Marketing, FireEye
    Well-maintained perimeter defenses are a key part of any security strategy. Organizations increasingly recognize that they must also complement their perimeter defenses with strong forensics capabilities to investigate and analyze attacks. When attacked, an enterprise needs to be able to rapidly investigate and determine the scope and impact of the incident so they can effectively contain the threat and secure their network.
    In interactive this session, you will learn about:
    • The key use cases for network forensics
    • The typical organization that acquires network forensics technologies
    • How FireEye Enterprise Forensics enables the proper response to today’s cyber attacks
  • Protecting Government Assets in an Era of Cyber Warfare Recorded: Mar 5 2015 60 mins
    Tony Cole, VP/Global Government CTO (FireEye)
    FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • Behind the Syrian Conflict's Digital Front Lines Recorded: Feb 19 2015 59 mins
    Nart Villeneuve (FireEye), Daniel Regalado (FireEye), John Scott-Railton (The Citizen Lab)
    FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

    Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

    We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

    Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

    • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
    • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

    All webinar attendees will receive a free copy of the new Syrian report. Register today!
  • Top Predictions for Security in 2015 Recorded: Dec 12 2014 40 mins
    Bryce Boland, CTO, FireEye Asia Pacific
    From Cryptolocker to the Apple iOS vulnerability, there have been numerous high-profile breaches in 2014. With the ever-changing threat landscape and advanced cyber attacks showing no sign of slowing down, organizations need to be prepared as we head into 2015.

    Join our live webinar where Bryce Boland, CTO for Asia Pacific at FireEye, will share top, global security predictions and challenges for 2015. In this webinar:
    •Find out the top 10 security predictions for 2015 and how they impacts organizations
    •Discover the data that drove these predictions
    •Learn about key strategies to take a proactive stance against advanced attacks
  • Hacking the Street? FIN4 Likely Playing the Market Recorded: Dec 5 2014 58 mins
    Barry Vengerik, Principal Threat Intelligence Analyst, Kristen Dennesen, Sr. Threat Intelligence Analyst
    This week FireEye released a new report called Hacking the Street? FIN4 Likely Playing the Market. This report focuses on a targeted threat group that we call FIN4 (Financially Motivated Group 4), whose tactics are surprisingly low-tech yet insidiously effective at obtaining access to confidential discussions at the highest levels of targeted companies. Our research suggests that FIN4 is likely targeting these companies in order to obtain advance knowledge of “market catalysts,” or events that cause the price of stocks to rise or fall dramatically.

    Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

    • A deep dive into FIN4’s tactics and why they are simple yet surprisingly effective
    • How FIN4 may be monitoring insider communications for a trading advantage
    • Why FIN4 is different from other threat groups FireEye tracks
    • A profile of organizations at risk, and what they can do to protect themselves.

    All webinar attendees will receive a complimentary copy of the Hacking the Street? report.
  • APT 28: Cyber Espionage and the Russian Government? Recorded: Nov 4 2014 49 mins
    Edward Lucas, Senior Editor, The Economist and Jen Weedon, Manager of Threat Intelligence, FireEye
    FireEye just released a report called APT28: A Window Into Russia's Cyber Espionage Operations? The report focuses on a targeted threat group that we call APT28 (Advanced Persistent Threat group 28) and details ongoing, focused operations that we believe indicate a government sponsor - most likely the Russian government.

    Join us for a roundtable discussion with Russian security expert, Edward Lucas of The Economist, and Jen Weedon, Manager of Threat Intelligence at FireEye.

    Discussion topics will include:

    •Russia's intentions and motivations in cyberspace
    •Whether APT28's activity supports Russia's geopolitical strategy
    •How Russian and Chinese network operations compare
    •Which organizations and agencies are most at risk
  • Building a Better Budget for Advanced Threat Detection and Prevention Recorded: Oct 28 2014 57 mins
    Dave Shackleford, Lead Faculty, IANS, Josh Goldfarb, Chief Security Strategist - Enterprise Forensics, FireEye
    The cyber threat landscape is dramatically evolving, but one thing is certain – attackers are becoming more and more sophisticated, and most organizations are struggling to keep pace. In a recent IANS and FireEye survey, security practitioners and decision makers share their perspective on the type of attackers they’re dealing with, how they’re responding to the growing threat, and the effect on organizations that have experienced a breach.

    Join FireEye’s Chief Security Strategist (Forensics Group) Josh Goldfarb, and Dave Shackleford, IANS Lead Faculty, as they discuss:
    •The kinds of products and controls most organizations are implementing
    •What new technologies security teams are focusing on, and
    •How security budgets are changing to align with security’s growing importance to the enterprise

    This is one hour you will not want to miss!
  • Sidewinder Targeted Attack Against Android Recorded: Oct 14 2014 43 mins
    Dr. Tao Wei, Sr. Research Scientist, Yulong Zhang, Sr. Research Eng., Rob Rachwald, Sr. Dir. Mkt Research
    In this webinar, our experts will present one practical case of such attacks called "Sidewinder Targeted Attack." It targets victims by intercepting location information reported from ad libs, which can be used to locate targeted areas such as a CEO's office or some specific conference rooms. When the target is identified, "Sidewinder Targeted Attack" exploits popular vulnerabilities in ad libs, such as JavaScript-binding-over-HTTP or dynamic-loading-over-HTTP.

    Join us for this for this live session to learn:
    •How a Sidewinder Targeted Attack can disrupt and hijack the network where targeted victims reside
    •The risks of remote attacks on Android devices through apps downloaded from Google Play
    •Different forms of attacks to Android vulnerabilities
    •Current trends and best practices around mobile security
  • New Employee Success Tips: How to Drive Security Maturity Recorded: Sep 23 2014 45 mins
    Josh Goldfarb, Chief Security Strategist - Enterprise Forensics Group, FireEye
    Taking on security needs at a new organization can be complicated as you learn what’s currently in place, where the gaps are and the best way to drive change in your new organization. Get helpful guidance, beyond the technical details, from an experienced change agent.

    This talk will discuss some of the ways in which security can be approached as a business process, rather than as an enigma, including:

    •Your first 30 days: fame and foibles when taking over a new
    security program
    •Gauging your business executives: how to talk with senior
    business leaders and classify their responses to security in order
    to make your relationship more effective
    •Show me the money: how to review a security budget and quickly
    match it up against your new organization's risk profile
    •Finding strategic partners: a litmus test for discussions with key
    vendors to figure out who to trust and who is selling you a bridge
  • Reimagining Security – Adaptive Defense Strategy to Keep Pace with Attackers Recorded: Sep 19 2014 56 mins
    Dave Merkel, CTO, FireEye, Inc.
    Threat actors’ tactics and motivations are evolving. Successful security teams continuously adapt to anticipate new tactics. That means adopting new approaches. Join us for this webinar, where we share FireEye’s point of view about how organizations can implement adaptive defense strategies that position them to detect, analyze and respond to security incidents of all kinds.

    FireEye’s CTO, Dave Merkel, will discuss how security teams can reduce the time to detect and resolve security incidents.

    Register for this webinar here.
  • A New Approach to IPS – Reduce Your Exposure and Costs Recorded: Sep 4 2014 35 mins
    Rajiv Raghunarayan (FireEye), Srinivas Loke (FireEye)
    Current IPS products are deficient for lots of reasons—they’re signature-based, unable to detect modern threats, and, they create excessive alerts that require additional resources to manage. Using an outdated protection model results in distracting false positives and a lack of actionable threat intelligence. Organizations need a holistic view of multi-vector attacks that goes well beyond what conventional IPS tools offer.

    In just 30 minutes, you’ll learn how to:

    * Confirm attacks via timely and validated threat notifications
    * Minimize time and resource investments resulting from false alerts
    * Consolidate known and unknown threats on a single platform
    * Create actionable insights by correlating threats to derive richer intelligence and speed incident response times

    Join FireEye for this brief webinar and discover a new approach to IPS. You’ll quickly realize how you can save your organization time, money, and reduce your exposure to the threats lurking out there.
  • State of the Hack: Spotlight on Healthcare Recorded: Aug 28 2014 34 mins
    Laura Galante, Manager, Threat Intelligence, FireEye
    Join us for this webinar where we’ll share our latest intelligence and recommend how healthcare, pharmaceutical and medical device manufacturers can protect themselves from attackers that target these industries.

    In this webinar we will cover:
    • Which threat actors target these industries?
    • What information do they typically steal?
    • What type of tools and tactics do attackers use to gain access?
    • What can we expect from these threat actors in the coming year?
    • How can organizations protect themselves from the attackers that
    are targeting them?
  • FLARE on Fire: Reverse Engineering with the FLARE Team Recorded: Aug 26 2014 58 mins
    Willi Ballethin (Consultant, FireEye), Matt Graeber (Sr. Consultant, FireEye)
    Join us for this exciting webinar as we introduce the FireEye Labs Advanced Reverse Engineering (F.L.A.R.E.) and learn about:

    * FLARE's background, mission and industry-leading team members
    * Reversing Agent .BTZ (Case Study)
    * Reversing .NET samples (Case Study)
    * Proactive assessment of security software via RE (Case Study)

    You'll also get an in-depth look at two prevalent malware families and learn how to combat against these targeted attacks.
  • Speed Dating for Security Teams: Finding Alerts that Lead to Compromise Recorded: Aug 12 2014 46 mins
    Nicole Oppenheim (FireEye), Steve Miller (FireEye)
    This webinar will address the following topics:

    - How to quickly triage and validate the seemingly overwhelming volume
    of daily alerts
    - Strategies for prioritizing and throttling your workflow
    - Tools for querying intel and obtaining context
    - Approaches for creating an indicator management process
  • DeCryptoLocker: Relief for CryptoLocker Victims Recorded: Aug 6 2014 14 mins
    Uttang Dawda, Malware Researcher, FireEye
    Join Uttang Dawda, FireEye's resident Malware Researcher, as he gives us a comprehensive overview of CryptoLocker and the FireEye and Fox-IT decryption solution for victims.
  • Understanding the Adversary: The Role of Intelligence in Your Security Strategy Recorded: Jul 22 2014 61 mins
    Rick Holland (Forrester), Laura Galante (FireEye)
    • What is an intelligence-led defense?
    • What is “adversary intel”? Where do you get it and how can you
    act on it?
    • What is “attribution” and how important is it?
    • What intel should a security organization maintain internally? How
    should it supplement this with 3rd party intel?
    • What is the right balance between detection-based intel and
    adversary intel
  • Cybersecurity’s Maginot Line: A Real-World Assessment of Defense-in-Depth Recorded: Jun 25 2014 60 mins
    Dave Merkel, CTO, FireEye, Inc.
    Are you building another Maginot Line? France’s famed border defense was hailed as a military marvel in the run-up to World War II — and quickly rendered useless by new blitzkrieg-style warfare. In much the same way, many common cybersecurity tools are not stopping today’s attacks.
    In a first-of-its-kind study, we analyzed data from 1,216 organizations in 63 countries across more than 20 industries. FireEye sits behind other layers in the typical defense-in-depth architecture. That placement offers a unique vantage point to observe them in action.

    Here’s what we found:
    •97% of organizations were breached, even with multiple security layers.
    •More than one-fourth of all organizations experienced events consistent with advance persistent threat (APT) attacks.
    •Three fourths of organizations had active command-and-control communications.
    •Even after an organization was breached, attackers attempted to compromise the typical organization more than once per week (1.6 times) on average.

    Join us in a live briefing to discuss these findings and what they mean for your cyber defense plan.
  • Cover Your Assets: How to Keep Your Data Safe Recorded: Jun 12 2014 34 mins
    Carrie McDaniel, Product Marketing Manager, File Security Imperva
    Cyber security experts suggest that it’s likely your organization’s data has already been breached. So rather than asking “what if?”, it’s time to ask “now what?”. Hackers use spear phishing and malware to target your trusted insiders, and then leverage stolen credentials to navigate the company network and gain access to the data center. Your data center is the ultimate goal for these attacks because it contains a concentration of sensitive data, as well as critical business applications.

    This session will discuss a risk-based approach to protecting critical files, databases, and sensitive applications from compromised users. Join us to learn how to minimize downtime, save time, and keep your employees productive during the remediation process. We will also discuss how to track and analyze user activity once malware is detected.
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Rising Costs of Targeted Attacks on Financial Institutions
  • Live at: Aug 23 2012 6:00 pm
  • Presented by: Jerry Archer, SVP/CSO, Sallie Mae; Phil Lin, Ed Dembowski, FireEye
  • From:
Your email has been sent.
or close
You must be logged in to email this