Featured
A Stakeholder-led Approach to Cyber Attribution
Dr Jamie Collier, Senior Threat Intel Advisor, Mandiant, Google Cloud; Shanyn Ronis, Senior Manager, Mandiant, Google Cloud
Attribution assessments are an essential component of intelligence analysis. With threat intelligence one of the critical functions in The Defender's Advantage, navigating the challenges of attribution is essential to developing a proactive security posture.
This webinar demystifies the cyber attribution process by outlining an approach that focuses first and foremost on a security function's resources and stakeholders. By understanding requirements of key stakeholders, a threat intelligence team is in a much better position to build an attribution process that directly addresses challenges facing an organization. We therefore advocate for a highly pragmatic approach to attribution that first focuses on tactical clustering and operational profiling.
All episodes
-
Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1
Kerry Matre, Sr. Director, Product, Solutions Marketing, Mandiant, Jennifer Guzzetta, Sr. Product Marketing Mgr, Mandiant
Learn how to activate the six critical functions of Cyber Defense to optimize your security program in the face of harmful adversaries. Building a best-in-class cyber defense organization will provide confidence in your ability to protect, defend and respond to sophisticated [and inevitable] threats that can cripple business operations.
As outlined in Mandiant’s award-winning book,“The Defender’s Advantage” organizations are defending against adversaries within their very own environment. Because the defender owns the environment in which they go head-to-head with these ruthless attackers, it’s important to remember that the defender has a fundamental advantage–however many organizations struggle to capitalize on it.
This multipart webinar series will provide helpful insights and best practices surrounding the six critical functions of cyber defense that make up The Defender’s Advantage.
Register for this first session to receive an executive overview of The Defender’s Advantage and its six critical functions of cyber defense—Threat Intelligence, Command and Control, Detect, Validate, Respond and Hunt. Each of these functions represents different responsibilities focused on distinctive goals, while collectively working together to rapidly identify and effectively respond to threats.
Who should attend:
CISOs
Cyber Defense Directors
SOC Managers
Seasoned and new Cybersecurity Practitioners -
Utilize Threat Intelligence, Establish Command & Control - Webinar Series Part 2
Danielle Restaino, Emily Cranston, Principal Consultants, Mandiant Jim Meyer, Sr. Principal Consultant, Mandiant
This session is the second in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical functions of cyber defense that make up The Defender’s Advantage.
In this webinar, join Mandiant experts for a discussion on how to understand and effectively implement your collective Threat Intelligence to make the right security decisions. We will also dive into the establishment of Command and Control to orchestrate the prioritization of activities performed by all six cyber defense functions to achieve security resilience and reduce the overall impact of cyber attacks.
Who should attend:
CISOs
Cyber defense directors
SOC managers
Seasoned and new cybersecurity practitioners -
Detect Risks & Validate Security Controls - Webinar Series Part 3
Jason Brown, Principal Consultant, Mandiant, Kyle Baird, Principal Consultant, Mandiant
This session is the third in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical functions of cyber defense that make up The Defender’s Advantage.
In this webinar, join Mandiant experts for a discussion on how to effectively contextualize, categorize, and prioritize cyber security incidents to rapidly Detect malicious activity and identify significant business risks. Also learn how to Validate your security control ecosystem to ensure the optimization and success of the detection process to ultimately protect your critical assets.
-
Respond to Resume Operations & Hunt to Prevent Compromise- Webinar Series Part 4
Omar Toor, Principal Consultant, Mandiant, Dan Nutting, Manager, Consulting, Mandiant
This session is the fourth in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical functions of cyber defense that make up The Defender’s Advantage.
In this webinar, join Mandiant experts for a discussion on how to properly Respond to resume normal business operations and effectively remove threats from the environment. Also learn how to proactively Hunt for evidence from a previous or existing compromise to enhance future response capabilities and realize new methods of threat detection.
-
A Stakeholder-led Approach to Cyber Attribution
Dr Jamie Collier, Senior Threat Intel Advisor, Mandiant, Google Cloud; Shanyn Ronis, Senior Manager, Mandiant, Google Cloud
Attribution assessments are an essential component of intelligence analysis. With threat intelligence one of the critical functions in The Defender's Advantage, navigating the challenges of attribution is essential to developing a proactive security posture.
This webinar demystifies the cyber attribution process by outlining an approach that focuses first and foremost on a security function's resources and stakeholders. By understanding requirements of key stakeholders, a threat intelligence team is in a much better position to build an attribution process that directly addresses challenges facing an organization. We therefore advocate for a highly pragmatic approach to attribution that first focuses on tactical clustering and operational profiling.