2017 Cyber Security PredictionsJoin us to hear from some of FireEye's top experts about our predictions for 2017 which draw from our executive team, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs.
The Rise of Security Orchestration: Myths and TruthsJoin this webinar with Paul Nguyen, VP of Orchestration and Integration at FireEye and guest speaker Joseph Blankenship of Forrester to learn:
- Why we are seeing a rise in security orchestration
- Where the market is moving
- How to get the most out of orchestration
Make 2017 a Year of Countering the Evolving Threat LandscapeTis the season of predictions looking ahead to 2017 and paying lip service to the threat landscape. Not a fan of either of those? You’re not alone. Join FireEye in this BrightTalk webinar where we’ll discuss more than just the threats that may or may not be awaiting us in 2017. We’ll discuss real attacker tactics and techniques, along with how you can actually counter the risk they present.
The Real World Value of Cyber Threat IntelligenceLaura Galante (Dir, Threat Intel Analysis), Jayce Nichols (Dir, Threat Intel Research) and Richard Bejtlich (Chief Security Strategist) define cyber threat intelligence and speaks to having an intel-led security program.
10 Components for Proactive CybersecurityIn this webinar, Mandiant Sr. Manager Nick Slaughter will discuss the benefits of proactive preparedness and 10 key areas that should be considered in order to form a holistic security program.
Crisis Communication After an AttackVitor De Souza (FireEye, VP of Global Communications) joins Chris Leach (Chief Technologist, HPE) to discuss the building blocks of a solid crisis-communication plan.
Exploring Russia’s Cyber OperationsDan McWhorter, Chief Intelligence Strategist at FireEye, discuss why organisations need to take note of these activities in Russia and steps to ensure your organisation is able to defend against these threats.
Industrial Cyber Security: Real World Scenarios You Should KnowIn this presentation, ICS experts David Meltzer, Chief Research Officer for Belden/Tripwire and Ryan Brichant, Vice President and Chief Technology Officer at FireEye, will discuss specific real-world ICS compromises. They will explain what threat indicators to watch for and offer practical techniques for protecting the uptime, reliability, and safety of PLC, RTU, IED, and DCS equipment.
An Analytical Approach to APTJoin this webinar with Josh Goldfarb, CTO – Emerging Technologies at FireEye to learn:
- How are attackers changing the tools, techniques, and procedures that they use?
- What can organisations do to guard against the threats of today and prepare for the threats of tomorrow?
- How can taking an analytical approach to APT benefit your organisation and improve its security posture?
Privileged Accounts and the Cyber Attack Life CycleAdam Bosnian (EVP, Global Bus. Dev, CyberArk) and Milan Gavran (TAP Sales Mgr., FireEye) walk through a few data breach cases and show how combining intel from both systems is used to assist detection and response acceleration.
The Eye of the Security CyberstormKevin Jackson (TAP Security Specialist, FireEye) and Chris Olive (Sr. Sales Engineer, Vormetric) outline how to easily monitor privileged user activity to identify APT activity.
The Importance of Attribution Against Today's Cyber AdversariesWith the sophistication of today's cyber attacks it is almost impossible to expect a security manager to be able to stop all of them, so in the event of a breach it is important to have the intelligence to allow the security manager to establish the depth of an attack.
Are European Enterprises Ready to Respond to a Cyber Breach?Stuart Davis (Mandiant Director of META) joins Dominic Trott (Sr. Analyst, Pierre Audoin Consultants) to share results of a study of 200 decision-makers in large companies in the UK, France and Germany, to understand their motivations and drivers with regards to Incident Response.