Take Off 2017

Thursday 2 February | Exclusive Networks & BigTec Offices

Exclusive Networks and BigTec invite you to a short update session on Thursday 2 February 2017.

Content

  • What's new at BigTec and Exclusive Networks

  • Quick vendor overview & update

  • Quick services overview


Timing

16h00 - 18h00 followed by the New Year Drink


REGISTER HERE

Useful Information When You Need It

Notable Features

Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

ACCURATE ANALYTICS

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

SOCIAL INTERACTION

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

WORLD-WIDE SUPPORT

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

MULTIPLE GAMES

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

ACCURATE ANALYTICS

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

SOCIAL INTERACTION

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

WORLD-WIDE SUPPORT

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

MULTIPLE GAMES

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

FireEye Cyber Defense Live

Government Forum | Tuesday 6 June - Brussels


Operationalizing Security in a New Era

In order to protect themselves, state and local governments and their partners need a clearer picture of the rapidly-evolving threat landscape that has drastically changed with new rules of engagement. Nation-state actors, cyber criminals and hackers have become less predictable. The attack surface continues to grow with the rise in connectivity, data loads and access to industrial control systems.

To identify, assess, respond and mitigate threats such as ransomware, extortion, espionage and zero-day attacks, as well as predict and prevent the “unknown threat,” agencies need to build intelligence-led security operations. CIOs and CISOs are drowning in their own security stack while analysts are exhausted by “alert fatigue.”

Operationalizing security enables security professionals to rapidly collect, analyse and disseminate threat intelligence across the enterprise, assess risk based on an adversary’s motivation and capability and align resources to the most impactful threats.

If this resonates and you would like to learn more please join FireEye & our selected partners to dive deeper.


Agenda

08h00

Welcome Coffee in Partners Exhibition Area

09h00

Welcome & Agenda

09h15

Cyber Security: The Strategic View
Kah-Kin Ho, Senior Director Government EMEA FireEye

09h45

Keynote: NATO JCYBER
Brigadier General Christos Athanasiadis

10h15

Cyber Operations and Incident Management in the Age of Putin
Ron Bushar, VP Mandiant Services

10h45

Coffee break

11h00

Achieving Effective Threat Prioritization
Jens Monrad, Senior Intelligence Analyst FireEye

11h30

Keynote followed by Panel on Operationalizing Security in a New Era
Moderated by Tony Cole, VP CTO Global Government, FireEye

12h30

Networking lunch

13h30

Helix Workshop
Pierre Buijsman, Director Systems Engineering FireEye

14h15

FireEye MVX
Marco Van der Aar, Consulting Systems Engineer FireEye

15h00

Coffee break

15h30

Intelligence-Led Security Workshop: Powering the Future of Cyber Defense
Kevin Tongs, Senior Technical Manager iSight Intelligence

16h30

Hunting demo
FireEye as a Service Team

17h:30

Networking drink

18h00

End

Location
Hotel Amigo
Rue de l'Amigo 1
1000 Bruxelles


SPONSORS

sponsors_cyberdefenseLIVE2017.png



Register your interest
in this forum now.


Want To Try Us?

Just put your email below
and you'll receive your download link.