Video

New Essentials of Incident Response

Ashar Aziz, Founder and CTO, FireEye
New Essentials of Incident Response

Today's high-profile attacks have fundamentally changed the way organizations approach incident response. What are the new essentials? Ashar Aziz of FireEye leads a panel discussion on this vital topic.

See Also: Top Security Priority: Network Detection and Response

The point of entry, detection and containment are among the essentials discussed. Joining Aziz are:

  • Jeff Schilling, Director of Global Incident Response, Dell SecureWorks;
  • Jon Miller, Vice President, Research & Development, Accuvant, Inc.;
  • Marc Maiffret , Chief Technology Officer, BeyondTrust.

Aziz founded FireEye in 2004 and now serves as vice chairman of the board, CTO, and chief strategy officer. Since founding the company, he has also served as CEO through November 2012 and has led the technical and business strategies for FireEye. He is the original inventor of the core set of technologies behind the groundbreaking FireEye Malware Protection System. This work has led to the filing of over 18 patents on various aspects of FireEye technologies. Aziz has received over 20 patents in the areas of networking, cryptography, network security, and data center virtualization for work done prior to FireEye.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.