SlideShare a Scribd company logo
1 of 29
DEFENDING THE ACADEMY
FROM CYBER THREATS
REVISION 005 / UPDATED 16 MAY 2017
Christian Schreiber, CISM, PMP
Consulting SE – Global Pursuit Specialist
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.
Nearly 20 years IT and information security experience
► Global Pursuit Specialist team at FireEye
► CISO & HIPAA Security Officer at the University of Arizona before joining FireEye
► Earlier security and IT leadership positions:
- SunGard Data Systems (now Ellucian)
- University of Wisconsin – Whitewater
- University of Wisconsin – Madison
- Central Michigan University
Education & Professional Certifications
► Masters Certificate in Project Management, University of Wisconsin – Madison
► Bachelor of Science in Business Administration, Central Michigan University
► Certified Information Security Manager (CISM)
► Project Management Professional (PMP)
PERSONAL BACKGROUND
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.2
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.3
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.4
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.5
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.6
FIREEYE. MANDIANT M-TRENDS REPORT. 2017.
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.7
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.9
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.10
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.11
FIREEYE. MAGINOT REVISITED: MORE REAL-WORLD RESULTS FROM REAL-WORLD TESTS. 2015.
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.12
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.13
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.14
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.15
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.16
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.17
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.18
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.19
FIREEYE. MANDIANT M-TRENDS REPORT. 2015.
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.20
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.21
PONEMON INSTITUTE. THE COST OF MALWARE CONTAINMENT. JANUARY 2015.
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.22
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.23
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.24
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.25
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.26
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.27
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.28
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.29
Provide your management with answers, not alerts
Evaluate your security investments
High efficacy
alerts
Context from
alerts
Visibility into
patterns
Integration &
Automation
Experts to manage
your response
Improve your cyber resilience
Strengthen your
authentication
Strengthen your
architecture
Extend your
visibility
Hunt for threats
Continuous
improvement
QUESTIONS?
Christian Schreiber, CISM, PMP
christian.schreiber@FireEye.com
COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.30

More Related Content

What's hot

Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)
Christopher Ward
 
Seguridad inform tica
Seguridad inform ticaSeguridad inform tica
Seguridad inform tica
GloriaJazz95
 

What's hot (20)

Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real WorldIntelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
 
Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)Chris Ward Short Bio and CV 2016 (1)
Chris Ward Short Bio and CV 2016 (1)
 
Bill checkpoint
Bill checkpointBill checkpoint
Bill checkpoint
 
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber SecurityITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
 
Ransomwarever1
Ransomwarever1Ransomwarever1
Ransomwarever1
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
 
Cyber Defense in 2016
Cyber Defense in 2016Cyber Defense in 2016
Cyber Defense in 2016
 
Seguridad inform tica
Seguridad inform ticaSeguridad inform tica
Seguridad inform tica
 
さくらのVPSユーザーミートアップ「さくらのVPSの歩みと今後」
さくらのVPSユーザーミートアップ「さくらのVPSの歩みと今後」さくらのVPSユーザーミートアップ「さくらのVPSの歩みと今後」
さくらのVPSユーザーミートアップ「さくらのVPSの歩みと今後」
 
Nixu Cyber Defense Center - You have one fear less.
Nixu Cyber Defense Center - You have one fear less.Nixu Cyber Defense Center - You have one fear less.
Nixu Cyber Defense Center - You have one fear less.
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
4 Social Engagement Essentials for 4Q2016
4 Social Engagement Essentials for 4Q20164 Social Engagement Essentials for 4Q2016
4 Social Engagement Essentials for 4Q2016
 
Fostering Maturity Through a Security Lifecycle: An OSS Case Study
Fostering Maturity Through a Security Lifecycle: An OSS Case StudyFostering Maturity Through a Security Lifecycle: An OSS Case Study
Fostering Maturity Through a Security Lifecycle: An OSS Case Study
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
JP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness CartoonsJP Cybersecurity Awareness Cartoons
JP Cybersecurity Awareness Cartoons
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Seguridad inform tica
Seguridad inform ticaSeguridad inform tica
Seguridad inform tica
 
Are open source and embedded software development on a collision course?
Are open source and embedded software development on a  collision course?Are open source and embedded software development on a  collision course?
Are open source and embedded software development on a collision course?
 
Cloud Data Security
Cloud Data SecurityCloud Data Security
Cloud Data Security
 

Similar to Defending the Academy from Cyber Threats

How to Manage Strategic & Reputation Risk in Turbulent Times
How to Manage Strategic & Reputation Risk in Turbulent TimesHow to Manage Strategic & Reputation Risk in Turbulent Times
How to Manage Strategic & Reputation Risk in Turbulent Times
PECB
 

Similar to Defending the Academy from Cyber Threats (20)

Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017Financial Services Forum_New York, May 17, 2017
Financial Services Forum_New York, May 17, 2017
 
Department of State IT Sales Opportunities: FY17, 18, and Beyond
Department of State IT Sales Opportunities: FY17, 18, and BeyondDepartment of State IT Sales Opportunities: FY17, 18, and Beyond
Department of State IT Sales Opportunities: FY17, 18, and Beyond
 
Compliance vs. Risk Management: Two Perspectives on Supply Chain Risk Management
Compliance vs. Risk Management: Two Perspectives on Supply Chain Risk ManagementCompliance vs. Risk Management: Two Perspectives on Supply Chain Risk Management
Compliance vs. Risk Management: Two Perspectives on Supply Chain Risk Management
 
Big Data Analytics for Insurance Business
Big Data Analytics for Insurance BusinessBig Data Analytics for Insurance Business
Big Data Analytics for Insurance Business
 
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsLearn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
A Day in the Life of a GDPR Breach - September 2017: France
A Day in the Life of a GDPR Breach - September 2017: France A Day in the Life of a GDPR Breach - September 2017: France
A Day in the Life of a GDPR Breach - September 2017: France
 
Nielsen investor-day-consolidated-deck full
Nielsen investor-day-consolidated-deck fullNielsen investor-day-consolidated-deck full
Nielsen investor-day-consolidated-deck full
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1
 
Securely Setting Information Night: A dive
Securely Setting Information Night: A diveSecurely Setting Information Night: A dive
Securely Setting Information Night: A dive
 
The Future of SaaS is Product Led. Are You Ready?
The Future of SaaS is Product Led. Are You Ready? The Future of SaaS is Product Led. Are You Ready?
The Future of SaaS is Product Led. Are You Ready?
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany A Day in the Life of a GDPR Breach - September 2017: Germany
A Day in the Life of a GDPR Breach - September 2017: Germany
 
A Day in the Life of a GDPR Breach
A Day in the Life of a GDPR BreachA Day in the Life of a GDPR Breach
A Day in the Life of a GDPR Breach
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
 
How to Spiel Like Spielberg: Using Videos to Showcase Your Business
How to Spiel Like Spielberg: Using Videos to Showcase Your Business How to Spiel Like Spielberg: Using Videos to Showcase Your Business
How to Spiel Like Spielberg: Using Videos to Showcase Your Business
 
How to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety ExcellenceHow to Establish a Culture of Safety Excellence
How to Establish a Culture of Safety Excellence
 
How to Manage Strategic & Reputation Risk in Turbulent Times
How to Manage Strategic & Reputation Risk in Turbulent TimesHow to Manage Strategic & Reputation Risk in Turbulent Times
How to Manage Strategic & Reputation Risk in Turbulent Times
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Defending the Academy from Cyber Threats

  • 1. DEFENDING THE ACADEMY FROM CYBER THREATS REVISION 005 / UPDATED 16 MAY 2017 Christian Schreiber, CISM, PMP Consulting SE – Global Pursuit Specialist COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.
  • 2. Nearly 20 years IT and information security experience ► Global Pursuit Specialist team at FireEye ► CISO & HIPAA Security Officer at the University of Arizona before joining FireEye ► Earlier security and IT leadership positions: - SunGard Data Systems (now Ellucian) - University of Wisconsin – Whitewater - University of Wisconsin – Madison - Central Michigan University Education & Professional Certifications ► Masters Certificate in Project Management, University of Wisconsin – Madison ► Bachelor of Science in Business Administration, Central Michigan University ► Certified Information Security Manager (CISM) ► Project Management Professional (PMP) PERSONAL BACKGROUND COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.2
  • 3. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.3
  • 4. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.4
  • 5. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.5
  • 6. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.6
  • 7. FIREEYE. MANDIANT M-TRENDS REPORT. 2017. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.7
  • 8. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.9
  • 9. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.10
  • 10. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.11
  • 11. FIREEYE. MAGINOT REVISITED: MORE REAL-WORLD RESULTS FROM REAL-WORLD TESTS. 2015. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.12
  • 12. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.13
  • 13. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.14
  • 14. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.15
  • 15. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.16
  • 16. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.17
  • 17. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.18
  • 18. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.19
  • 19. FIREEYE. MANDIANT M-TRENDS REPORT. 2015. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.20
  • 20. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.21
  • 21. PONEMON INSTITUTE. THE COST OF MALWARE CONTAINMENT. JANUARY 2015. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.22
  • 22. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.23
  • 23. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.24
  • 24. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.25
  • 25. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.26
  • 26. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.27
  • 27. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.28
  • 28. COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.29 Provide your management with answers, not alerts Evaluate your security investments High efficacy alerts Context from alerts Visibility into patterns Integration & Automation Experts to manage your response Improve your cyber resilience Strengthen your authentication Strengthen your architecture Extend your visibility Hunt for threats Continuous improvement
  • 29. QUESTIONS? Christian Schreiber, CISM, PMP christian.schreiber@FireEye.com COPYRIGHT © 2017, FIREEYE, INC. ALL RIGHTS RESERVED.30