RSA Conference 2019

March 4-8, 2019
Moscone Center, San Francisco, CA

FireEye is ready for RSA Conference 2019, the largest information security conference that is taking place at the Moscone Center in San Francisco from March 4-8. With hundreds of exhibitors expected at the show, we want to make sure you know what FireEye is up to throughout the conference. The following is a Who, What, Where and When for all things FireEye at RSA Conference 2019.

FireEye Booth Location: North Expo Hall, Booth #5959

Visit our command center to meet with a specialist, catch in-booth theater presentations from our experts, and explore our interactive demos on Mandiant Consulting, FireEye Intelligence and Managed Defense, and FireEye Solutions.

Video

FireEye Thought Leadership

Keynote Speaking Session

A View from the Front Lines of Cyber Security

Speakers: Kevin Mandia, CEO, FireEye / Sandra Joyce, VP of Global Intelligence Operations, FireEye
Date & Time: March 6, 2019, 4:05pm - 4:25pm
Location: West Stage

As one of the foremost experts in cyber security, Kevin Mandia will discuss today’s threat environment and its impact on enterprises and agencies around the world. He will be joined on stage by Sandra Joyce, FireEye’s Head of Global Intelligence, who will share insight into the threat actors, tactics and trends that are likely to play an integral role in the landscape of cyber security in the years to come.

FireEye @ North Expo Hall, Booth #5959

Speaking Sessions

Playing with Fire: How Cyber Physical Attacks Threaten Our Connected World

Speaker: Sandra Joyce, VP of Global Intelligence Operations, FireEye
Date & Time: March 5, 2019, 1:00pm - 1:50pm
Location: TBD

The scale and impact of malicious nation-state cyber activity is striking. Russian, North Korean and Iranian actors have conducted cyber operations to disrupt, and in some cases, to destroy, the computer networks of their targets. This increasingly reckless targeting of critical infrastructure and the hastening connection of physical devices to the internet raises the specter that future attacks could have more significant real-world unintentional consequences for the health, safety, and security of civilians worldwide.

Tales from the Front Lines

Moderator: Rob Sloan, Cybersecurity Research Director for The Wall Street Journal
Panelists: Stuart McKenzie, VP of EMEA, FireEye / Wendi Whitmore, Global Lead of IBM X-Force Incident Response and Intelligence Services / Tom Etheridge, VP of Services, CrowdStrike
Date & Time: March 6, 2019, 9:20am - 10:10am
Location: Moscone West 3002

This session will share insight from three of the world's best-known incident response companies. This panel will look at the stories behind the headlines to understand the scale of attack the US is facing and, specifically: How are organizations being attacked?; Who is attacking?; How are attacks mitigated and remediated?; What can attendees do to betters secure their organization?

Reverse Engineering Attribution: The Man Behind the Man Behind the Curtain

Speakers: John Miller, Deputy Director of Threat Intelligence, FireEye / Jayce Nichols, Senior Director of Research & Collection, FireEye
Date & Time: March 7, 2019, 1:30pm - 2:20pm
Location: TBD

Attackers can easily reverse engineer common attribution techniques to deliberately mislead investigators and security teams. This Hackers & Threats Classroom session will take a look at misattribution tactics and what the implications are for risk management. Be sure to reserve a seat.

Booth Presentations: Tuesday, April 17

Time Speaker, Title Presentation Title Description
10:30am - 11:00am 10:30am - 11:00am Luke McNamara, Principal Analyst Luke McNamara, Principal Analyst APT 37 APT 37 This presentation will cover APT37’s history, targeting, and tactics, as well as explain implications relevant to all organizations from our findings on this group. This presentation will cover APT37’s history, targeting, and tactics, as well as explain implications relevant to all organizations from our findings on this group.
11:00am - 11:30am 11:00am - 11:30am Brad Bell, Principal Consultant Brad Bell, Principal Consultant Strategic Trends in Critical Security Functions Strategic Trends in Critical Security Functions Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements. Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements.
11:30am - 12:00pm 11:30am - 12:00pm Julian Dana, Director Julian Dana, Director Executive Breach Preparedness Executive Breach Preparedness Description to come. Description to come.
12:15pm - 12:45pm 12:15pm - 12:45pm Paul Nguyen, Vice President, Product Strategy and Product Management Paul Nguyen, Vice President, Product Strategy and Product Management Building the SOC of the Future Building the SOC of the Future Learn about the future of security operations and the capabilities required to stay ahead of the curve. Learn about the future of security operations and the capabilities required to stay ahead of the curve.
1:00pm - 1:30pm 1:00pm - 1:30pm John Laliberte, SVP, Engineering John Laliberte, SVP, Engineering The Future of Endpoint Security The Future of Endpoint Security Protecting traditional and non-traditional endpoints at scale against adversaries that use fully automated playbooks to achieve their mission. Protecting traditional and non-traditional endpoints at scale against adversaries that use fully automated playbooks to achieve their mission.
1:45pm - 2:15pm 1:45pm - 2:15pm Luke McNamara, Principal Analyst Luke McNamara, Principal Analyst Cryptocurrencies & Cyber Threat Activity Cryptocurrencies & Cyber Threat Activity Beyond the news headlines, explore how cryptocurrencies are being used—and targeted—by adversaries, and what this says about changes in the cyber-crime landscape. Beyond the news headlines, explore how cryptocurrencies are being used—and targeted—by adversaries, and what this says about changes in the cyber-crime landscape.
2:30pm - 3:00pm 2:30pm - 3:00pm Josh Madeley, Principal Consulstant and Stu Reynolds, Senior Manager, Security & Intelligence Architecture Group Josh Madeley, Principal Consulstant and Stu Reynolds, Senior Manager, Security & Intelligence Architecture Group The Threat from Iran The Threat from Iran Come learn about FireEye’s insights into three Iranian threat actors—APT33, APT34, and APT35—and how their activity is becoming more prolific. Come learn about FireEye’s insights into three Iranian threat actors—APT33, APT34, and APT35—and how their activity is becoming more prolific.
3:15pm - 3:45pm 3:15pm - 3:45pm Christopher Glyer, Chief Security Architect Christopher Glyer, Chief Security Architect M-Trends 2018 M-Trends 2018 Review of key highlights and observations from Mandiant's 2017 investigations. Review of key highlights and observations from Mandiant's 2017 investigations.
4:00pm - 4:30pm 4:00pm - 4:30pm Vasu Jakkal, EVP & CMO Vasu Jakkal, EVP & CMO We Are FireEye We Are FireEye Learn how FireEye fights evil and protects customers by uniquely combining unparalleled frontline expertise and intelligence with world-class technology. Learn how FireEye fights evil and protects customers by uniquely combining unparalleled frontline expertise and intelligence with world-class technology.
4:45pm - 5:15pm 4:45pm - 5:15pm John Miller, Senior Manager, Analysis John Miller, Senior Manager, Analysis Threat Landscape Threat Landscape This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it. This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it.

Booth Presentations: Wednesday, April 18

Time Speaker, Title Presentation Title Description
10:30am - 11:00am 10:30am - 11:00am Julian Dana, Director Julian Dana, Director Executive Breach Preparedness Executive Breach Preparedness Description to come. Description to come.
11:00am - 11:30am 11:00am - 11:30am Barbara Massa, EVP, Worldwide Human Resources Barbara Massa, EVP, Worldwide Human Resources We Are FireEye We Are FireEye Learn how FireEye fights evil and protects customers by uniquely combining unparalleled frontline expertise and intelligence with world-class technology. Learn how FireEye fights evil and protects customers by uniquely combining unparalleled frontline expertise and intelligence with world-class technology.
11:30am - 12:00pm 11:30am - 12:00pm Luke McNamara, Principal Analyst Luke McNamara, Principal Analyst Cryptocurrencies & Cyber Threat Activity Cryptocurrencies & Cyber Threat Activity Beyond the news headlines, explore how cryptocurrencies are being used—and targeted—by adversaries, and what this says about changes in the cyber-crime landscape. Beyond the news headlines, explore how cryptocurrencies are being used—and targeted—by adversaries, and what this says about changes in the cyber-crime landscape.
12:30pm - 1:30pm 12:30pm - 1:30pm Christopher Glyer, Chief Security Architect Christopher Glyer, Chief Security Architect State of the Hack State of the Hack Description to come. Description to come.
1:45pm - 2:15pm 1:45pm - 2:15pm Josh Madeley, Principal Consulstant and Stu Reynolds, Senior Manager, Security & Intelligence Architecture Group Josh Madeley, Principal Consulstant and Stu Reynolds, Senior Manager, Security & Intelligence Architecture Group The Threat from Iran The Threat from Iran Come learn about FireEye’s insights into three Iranian threat actors—APT33, APT34, and APT35—and how their activity is becoming more prolific. Come learn about FireEye’s insights into three Iranian threat actors—APT33, APT34, and APT35—and how their activity is becoming more prolific.
2:30pm - 3:00pm 2:30pm - 3:00pm Brad Bell, Principal Consultant Brad Bell, Principal Consultant Strategic Trends in Critical Security Functions Strategic Trends in Critical Security Functions Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements. Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements.
3:15pm - 3:45pm 3:15pm - 3:45pm Christopher Glyer, Chief Security Architect Christopher Glyer, Chief Security Architect M-Trends 2018 M-Trends 2018 Review of key highlights and observations from Mandiant's 2017 investigations. Review of key highlights and observations from Mandiant's 2017 investigations.
4:00pm - 4:30pm 4:00pm - 4:30pm John Laliberte, SVP, Engineering John Laliberte, SVP, Engineering The Future of Endpoint Security The Future of Endpoint Security Protecting traditional and non-traditional endpoints at scale against adversaries that use fully automated playbooks to achieve their mission. Protecting traditional and non-traditional endpoints at scale against adversaries that use fully automated playbooks to achieve their mission.
4:45pm - 5:15pm 1:00pm - 1:30pm John Miller, Senior Manager, Analysis John Miller, Senior Manager, Analysis Threat Landscape Threat Landscape This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it. This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it.

Booth Presentations: Thursday, April 19

Time Speaker, Title Presentation Title Description
10:30am - 11:00am 10:30am - 11:00am John Miller, Senior Manager, Analysis John Miller, Senior Manager, Analysis APT 37 APT 37 This presentation will cover APT37’s history, targeting, and tactics, as well as explain implications relevant to all organizations from our findings on this group. This presentation will cover APT37’s history, targeting, and tactics, as well as explain implications relevant to all organizations from our findings on this group.
11:30am - 12:00pm 11:30am - 12:00pm John Miller, Senior Manager, Analysis John Miller, Senior Manager, Analysis Threat Landscape Threat Landscape This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it. This presentation will explain the most pressing cyber threats that are active today, drawing on FireEye’s unparalleled, global visibility into the attack surface and beyond it.
12:30pm - 1:00pm 12:30pm - 1:00pm Brad Bell, Principal Consultant Brad Bell, Principal Consultant Strategic Trends in Critical Security Functions Strategic Trends in Critical Security Functions Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements. Common attacker TTPs we observed during incident response investigations and further correlated by FireEye Threat Intelligence correspond to areas of weakness frequently seen during our strategic service engagements.
1:00pm - 1:30pm 12:15pm - 12:45pm Paul Nguyen, Vice President, Product Strategy and Product Management Paul Nguyen, Vice President, Product Strategy and Product Management Building the SOC of the Future Building the SOC of the Future Learn about the future of security operations and the capabilities required to stay ahead of the curve. Learn about the future of security operations and the capabilities required to stay ahead of the curve.

Come see FireEye at RSA Conference 2019