Hi [[ session.user.profile.firstName ]]

Inside a Malware Supply Chain: Is the Industrial Age of APTs Here?

Over the last two years, a number of industries were hit by 11 different advanced persistent threat (APT) campaigns. At first pass, these campaigns appeared unrelated—but further investigation by the FireEye Labs research team revealed an eerie pattern: key links in the tools and code that indicated a shared APT development and logistics infrastructure.

In a live briefing, FireEye Labs delves into these findings and discusses why this model of centralized APT planning and development may suggest a much more sinister and more coordinated threat than most organizations realize.

Why you should attend:

- Examine the APT Campaigns - Get a detailed look into the APT campaigns that FireEye investigated.

- Understand the Organized Threat - Learn how centralized development, logistics, and malware-builder tools are driving APT campaigns today.

- Know the Targets, Know the Trend - Find out which industries are targets of these interconnected campaigns and what this trend suggests.
Recorded Nov 13 2013 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
FireEye Labs Research Team
Presentation preview: Inside a Malware Supply Chain: Is the Industrial Age of APTs Here?
  • Channel
  • Channel profile
  • Cyber Defense Lessons Learned in 2017 for a More Secure 2018 Recorded: Nov 14 2017 58 mins
    Jeff Groman, Mandiant Senior Manager & Chris Porter, Chief Intelligence Strategist
    Cyber security attackers become more innovative each year with threat activities progressing on a global scale. Coverage of cyber attacks by major media outlets continues to rise year after year, and 2017 seems to have done nothing to buck that trend.

    In the last 12 months, we’ve seen reports of compromises at government entities, cable companies, automobile manufacturers, law firms, insurers, delivery companies, and more. Looking back at these headlines leaves us asking two questions above all: What didn’t work in cyber defense in 2017 and what can be done to be better prepared for future attacks?

    We will address those questions and many others during our webinar, “Cyber Defense Lessons Learned in 2017 for a More Secure 2018,” presented by Jeff Groman, Mandiant Senior Manager and Chris Porter, Chief Intelligence Strategist. Tune in to learn about:

    • The more disruptive opportunistic attacks in 2017
    • More advanced and increasingly frequent attacks being carried out by nation-states

    It wouldn’t be a proper discussion if we didn’t also cover the lessons learned from these successful attacks so that organizations will be better prepared in the future.
  • Emerging Global Cyber Threats Recorded: Nov 2 2017 59 mins
    John Hultquist, Director, Analysis, GSI, FireEye, Inc.
    To properly establish your cyber defenses, you must know your opponent.

    Cyber attackers are constantly innovating; their threat activities continue to grow on a global scale. Regimes use advanced cyber capabilities to harass their foes, boost their finances and even subvert democracy.

    Cyber crime that affects businesses can be directly connected to geopolitical drivers such as the nuclear deal with Iran and sanctions for North Korean proliferation. Your organization needs to ensure that it adapts to the realities of the evolving threat landscape and business risks.

    Attend this webinar to see John Hultquist, Director of Intelligence Analysis at FireEye, offer:

    • An overview of emerging threats from around the world
    • Insights into the most impactful threats affecting your cyber security operations
    • Expert assessments and implications your organization should consider, provided by the FireEye Threat Intelligence Team


    REGISTER NOW

    Part two of a two-part series.

    Don’t miss part one: Cyber Threat Intelligence: Learn How It Drives World-Class Security

    Please visit: https://www2.fireeye.com/Webinar-How-CTI-Drives-World-Class-Security.html
  • Why Mid-Enterprises Must Go Beyond AV Products to Smarter Endpoint Security Recorded: Nov 1 2017 41 mins
    Dan Reis, FireEye Director of Product Marketing, Endpoint Security
    High-profile data breaches of corporate giants make the headlines, but 77% of cyber-crime targets small and mid-size enterprises (SMEs). Experts predict this trend will only continue to rise.  Regardless of limited budgets and resources, you need to stay one step ahead of advanced attacks.
     
    FireEye Endpoint Security offers such a solution for the mid-enterprise. It combines investigation, threat intelligence and antivirus and anti-spam technologies in a single, affordable lightweight agent. 

    Join us on November 1st to learn more about:
    • What legacy AV technologies miss and how you might be at risk today
    • Why real-time, integrated threat intelligence is a critical component of any cyber strategy
    • How to streamline your approach and extend visibility into every endpoint that matters
    • Why you need to detect known and unknown threats targeting your business
  • Bridging the Gap Between the SOC and the Boardroom Recorded: Oct 26 2017 32 mins
    Freud Alexandre, Enterprise Architect Security & Manager – City of New Orleans
    Bridging the Gap Between the SOC and the Boardroom: How to talk in a language your Chief Executive can understand.

    Most C-Suite occupants don’t speak security: Real-world examples will be used to demonstrate how to communicate in a manner that even the most technology averse executive can understand.

    Use of a common vocabulary helps executives fully comprehend the impact of risk, and the correlation between investment and risk mitigation (and to understand the implications of underfunding a security program).

    By paying close attention to the details, there are frequently key warning signs and patterns that can identified prior to a breach occurring – By addressing common disconnects, this presentation offers a guide to help bridge the gap between the SOC and the boardroom.

    Cyber threats continue to escalate in volume and sophistication – being able to eloquently articulate the risks and the necessary mitigation strategy is a critical skill for every security professional.

    The signs are all there but if you can’t deliver the message you might as well leave the front door open!
  • The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products Recorded: Oct 26 2017 51 mins
    Jim Waggoner, Sr. Director, Product Management
    Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses.

    Join Jim Waggoner, Sr. Director, Product Management for FireEye, as he details:

    •Why endpoint security products have not provided complete protection
    •Capabilities required for a comprehensive endpoint protection solution
    oAV with threat intelligence
    oDetection and response
    oBehavior and exploit analysis
    oVisibility and automation
    •How the latest FireEye Endpoint Security solution enables you to go from detection to investigation and remediation quickly, all with a single agent

    Attend this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
  • How Was that Breach Detected? Recorded: Oct 26 2017 57 mins
    Jeff Hamm, Technical Director, Mandiant
    Mandiant has done thousands of IR investigations across multiple industry types and networks. In each case, the customer was either altered by a third party about the breach or discovered something “not quite right” in the network. In several cases the alerts the customer discovered led to discovery of a targeted attacker in the environment - and a subsequent incident response investigation.

    In this presentation, we will use international case examples Mandiant investigated to take a closer look at how the breach was discovered and what security lessons can be learned from the alerts - for example how a performance monitor on a domain controller spiked, which led to discovery of credential harvesting. The take away will be actionable in many environments.
  • Intelligence-First: How Intelligence Enriches Security Consulting Services Recorded: Oct 25 2017 62 mins
    Jeff Berg, Sr. Manager, Cyber Threat Intelligence & Brad Bell, Mandiant Principal Consultant
    Join Jeff Berg, Sr. Manager of Cyber Threat Intelligence, and Brad Bell, Mandiant Principal Consultant, as they share the role of cyber threat intelligence in strategic security consulting services and why services based on compliance-based best practices and industry standards may not be an effective way to protect your organization against a rapidly evolving threat landscape.

    Key takeaways:

    • The role cyber threat intelligence plays in strategic security consulting services
    • Why services rooted in compliance-based best practices and industry standards aren’t effective
    • Case studies where different types of intelligence added value to service portfolio
  • GDPR – Being Prepared and Response-Ready Recorded: Oct 25 2017 54 mins
    Stuart McKenzie, Vice President, Mandiant Consulting & Dan Wire, Sr. Director, Marketing Communications
    The new European Global Data Protection Regulation (GDPR) requires businesses to report data breaches within 72 hours – how will you manage the process?

    This regulation applies to all organizations with employees and/or customers in the European Union.

    In a crisis, being organized and informed enough to provide an accurate notification to affected customers (or indeed regulators) is a difficult task on its own. When combined with a mandatory incident response processes – identifying the cause, containing and remediating the vulnerability, and determining the extent of the damage, it makes the situation a lot more difficult and time sensitive.

    In this webinar we will tackle the importance of having an effective and actionable incident response plan, and how to develop a crisis communications strategy that minimizes the impact of a data breach.
  • Partner Session: A Gold Standard for Industrial Control System Security Recorded: Oct 25 2017 57 mins
    Andrew Ginter, Vice President, Industrial Security, Waterfall Security Solutions & Gary Fisk, Solutions Architect, FireEye
    The first generation of Industrial Control System (ICS) cyber security advice looked to IT security best practices as their "gold standard," even though parts of IT security best practices were acknowledged as poor fits for the needs of ICS networks. The most recent ICS security standards and advice embrace the differences between IT and ICS networks, and document a gold standard for ICS cyber security that differs from IT best practices in important ways. This presentation reviews the evolution of ICS security best practices and explores how the new FireEye and Waterfall Security Solutions partnership is supporting and extending this evolution.
  • Delivering Advanced Security Capabilities to Any Organization: FireEye Helix Recorded: Oct 24 2017 52 mins
    Paul Nguyen, Vice President and General Manager of Helix and Orchestration
    Today’s security operations are frequently disjointed and plagued by limited visibility and false alerts. As a result, organizations are unable to quickly and cost-effectively prioritize and respond to threats. FireEye can help deliver advanced security operations to any organization while disrupting the economics of security. In this live webinar:

    - Learn about how a centralized security operations platform:
    o Improves visibility across your entire cyber security infrastructure
    o Surfaces and provides context for the most critical alerts
    o Empowers decision making to decrease the time from detection to response
    -See a demo of how Helix identifies and responds to an alert
    -Have the opportunity to ask questions in a live Q&A session
  • Evaluating Managed Detection and Response Vendors Recorded: Oct 24 2017 53 mins
    Gareth Maclachlan, Vice President, Product and Market Strategy, Global Services and Intelligence
    Evaluating Managed Detection and Response Vendors: Key Considerations that Cut Through the Hype

    You’re fighting an asymmetric battle. You’ve invested millions in protection technologies but unknown attackers still find a way in. SIEMs and MSSPs provide event monitoring - but in 85% of incident response engagements conducted by Mandiant consultants last year, the client had an existing MSSP or SIEM.

    A new class of managed detection and response services (MDR) has emerged to help organizations improve their threat detection and incident response capabilities. However, solution providers offer varied approaches and capabilities making it challenging for security leaders to understand and compare offerings.

    In this webinar, you will learn:

    •Why standard cyber security solutions still leave you vulnerable and why the market is transitioning to MDR
    •Which capabilities are critical to improving threat detection and response
    •What to consider when evaluating managed detection and response service providers
  • Answers to 5 Cyber Security Challenges for the Midsize Enterprise Recorded: Oct 18 2017 52 mins
    Dan Reis, FireEye Director of Product Marketing, Endpoint Security
    Large corporations aren’t the only targets for sophisticated advanced attacks. In fact, cyber criminals find that small and midsize enterprise (SME) companies are easier targets because their security is not as advanced and they don’t have proper cyber defenses.

    FireEye SME customers are more prepared to defend their company’s digital assets. Join us for a live problem-solving webinar based on real-world examples from your peers and learn:

    •What best practices will increase cyber awareness
    •How to conduct a security assessment to identify gaps and a
    strategy
    •How to align security needs and reduce vulnerabilities

    Register today to gain insights into SME cyber warfare and more effectively protect your business from advanced attacks.
  • Cyber Threat Intelligence: Learn How It Can Drive World-Class Security Recorded: Oct 5 2017 57 mins
    Jeff Berg, Principal Consultant, Cyber Threat Intelligence & Jeff Compton, Principal Consultant, Cyber Threat Intelligence
    The adoption of Cyber Threat Intelligence (CTI) is increasing across organizations like yours—adding value to all segments of security operations and the business.

    When it is better utilized, CTI significantly enhances an organization’s ability to anticipate, identify, respond to, and remediate threats.

    Attend this webinar to see cyber security veterans Jeff Berg and Jeff Compton share a case study to show how you can:
    •Identify and leverage core competencies to build an intelligence-led strategy
    •Develop a best-in-class CTI program framework
    •Scope your intelligence function
    •Sidestep common pitfalls and resistance
    •Establish growth and maturity metrics
    •Anticipate and recognize near and long-term wins


    REGISTER NOW!

    This is part one of a two-part series.

    Don’t miss part 2: Emerging Global Cyber Threats on November 2.

    To learn more visit: https://www2.fireeye.com/Webinar-Emerging-Global-Threats.html
  • The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products Recorded: Sep 26 2017 55 mins
    Jim Waggoner, Sr. Director, Product Management
    Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses.

    On September 26, Jim Waggoner, Sr. Director, Product Management for FireEye will detail:
    •Why endpoint security products have not provided complete protection
    •Capabilities required for a comprehensive endpoint protection solution
    oAV with threat intelligence
    oDetection and response
    oBehavior and exploit analysis
    oVisibility and automation
    •How the latest FireEye Endpoint Security solution enables you to go from detection to investigation and remediation quickly, all with a single agent

    Attend this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
  • Are You Ready to Respond? Recorded: Jul 20 2017 59 mins
    Troy Scavella, FireEye Principal Consultant and Ahmet Rifki, Sr. Consultant
    “In our current state of cyber security, security breaches are inevitable.” -- Kevin Mandia, CEO, FireEye

    In 2016 there were 1,093 publicized cyber security breaches. That’s a 40% increase from 2015. Given this era’s up surge in breach activity, it’s no longer about whether you’ll be breached. It’s how you’ll respond when you are breached. Organizations with a well-designed response capability are better off.

    Join Troy Scavella, FireEye Principal Consultant and Ahmet Rifki, Sr. Consultant, for our webinar on July 20. They will cover several topics including:

    •Six primary areas of focus for an effective response plan
    •Best practices for each of those areas
    •Examples of how deficiencies in any area reduce an organization’s ability to effectively detect and respond to a cyber security incident, whether targeted or opportunistic
  • APT32: New Cyber Espionage Group Recorded: May 24 2017 57 mins
    Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company
    Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How your organization can improve your ability to detect, prevent and remediate APT32 attacks
  • Tips & Tricks: Make the Most of FireEye Network Security Recorded: May 18 2017 55 mins
    Bikram Gupta, Director of Product Marketing
    Although FireEye Network Security is ready to use out-of-the-box, simplicity does not imply a lack of sophistication. There may be a variety of capabilities that practitioners can take advantage of when maximizing the value of their Network Security solution.

    In this webinar, we present variety of tips, tricks, and secrets collected from FireEye engineers, architects, incident responders, and analysts to:

    •Enhance detection efficacy
    •Accelerate response to alerts
    •Streamline system administration
    •Improve alert management
    •Perform health checks.

    SPECIAL OFFER: All attendees will be offered a free FireEye Network Security health check at the end of the webinar.
  • Smarter Endpoint Security: How to Go Beyond Prevention Recorded: May 2 2017 49 mins
    Jim Waggoner, Sr. Director, Endpoint Product Management
    Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Comprehensive endpoint protection requires prevention, AV, endpoint detection and response (EDR) and other capabilities. Even when organizations adopt multiple point products, there are still gaps in their endpoint protection.

    Some companies tout “next-generation endpoint security,” but what does that mean? Jim Waggoner, Sr. Director of Endpoint Product Management at FireEye will tell you how to make sure your next-generation endpoint security solution is delivering a comprehensive. In this webinar, you will:

    > Learn about the current endpoint security landscape and the challenges it poses
    > Find out what makes EDR capabilities valuable
    > Understand why threat intelligence is important and how it affects endpoint threat detection and prevention
    > Discover why a single endpoint agent should include (1) Multiple detection and prevention engines, (2) Integrated workflows from detection to investigation to remediation, and (3) Scalable, multiple form factors and breadth of OS support
  • 10 Security Best Practices for Government Organizations Recorded: Apr 20 2017 53 mins
    Tony Cole, Vice President and Global Government Chief Technology Officer, FireEye
    Government networks, critical infrastructure and data are under a constant state of attack. The nature of these threats evolve on a daily basis. Hacktivists, nation states and cyber criminals push people, processes and technologies that make up Government cyber defenses to their breaking points.

    In this webinar, Tony Cole, Vice President and Global Government Chief Technology Officer at FireEye, will be sharing how to:

    -- Interpret and respond to trends in adversary capabilities and motivations.
    -- Integrate and apply cyber intelligence to reduce risk, cost and operational overhead.
    -- Improve readiness and response to minimize the impact of a breach.

    Learn how you can apply best practices in intelligence-led security into your defenses.
  • Containing the Career Impact of Cybercrime Recorded: Feb 23 2017 55 mins
    Chris Leach, Chief Technologist, HPE. Josh Goldfarb, VP & CTO - Emerging Technologies, FireEye.
    Cyber truths and CEOs
    Security industry experts say that the nature and complexity of today’s cyberattacks are beyond the scope of even the largest companies. We’ve seen the headline making news. Big brand companies once thought to be impenetrable, have fallen victim to targeted cyberattacks inflicting significant financial damages to their businesses.

    Financial fall out and executive reputation
    Such breaches are hitting corporations where it hurts the most: the bottom line. A prominent bank recently felt the staggering loss of $81 million resulting from a breach.

    Elevate and propagate
    Battling hackers, state actors, and sophisticated cybercrime organizations may seem like a never-ending, daunting task.

    Please join us as FireEye and HPE Chief Technology Officers reveal a five-point tactical plan to mitigate risk and keep your reputation intact.

    What you’ll learn:

    1.Creating a Risk Profile to assess your organization’s risk level.
    2.CEO engagement. Understanding the amount of time, resources and commitment needed to minimize threat exposure.
    3.Roles and investment. Guidelines for technology, personnel, and budget.
    4.Risks and ramifications. Pinpoint the gaps.
    5.Seek the advice of experts. Don’t stake your reputation by going it alone.

    See you online!

    The FireEye HPE team
The leading provider of next generation threat protection
FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Inside a Malware Supply Chain: Is the Industrial Age of APTs Here?
  • Live at: Nov 13 2013 7:00 pm
  • Presented by: FireEye Labs Research Team
  • From:
Your email has been sent.
or close