
2020 Empower Track
Rethink Cyber Defense Strategies by Starting with Threats
JUNE 9, 2020 @ 11:00 AM (PT) | JUNE 9, 2020 @ 2:00 PM (ET)
Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.
Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces. In this session, Peter Watts lays out:
- A modern definition of threat intelligence with important milestones
- How to recognize and develop critical success factors for producing or consuming threat intelligence
- The impact of actionable threat intelligence on security risk leaders and their organizations
- Future use cases that may reshape how we think about cyber defense and business value

Peter Watts
Threat Intelligence Veteran, former Dir. for Cybersecurity Policy – National Security Council
Proactive Solutions to Stop Modern Ransomware in its Tracks
JUNE 9, 2020 @ 12:00 PM (PT) | JUNE 9, 2020 @ 3:00 PM (ET)
This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:
- Learn about modern ransomware trends and attacker behaviors observed on the frontlines
- Realize why proactive assessment is critical when preparing for and preventing ransomware
- Understand how threat intelligence, hunting and response provides the decision support and detection needed to outmaneuver ransomware actors
- Implement effective mitigation strategies to stop ransomware attackers in their tracks

Nader Zaveri
Incident Response Manager – Mandiant

Matt Bromiley
Principal Consultant, Managed Defense – Mandiant

Kimberly Goody
Sr. Manager, Threat Intelligence – Mandiant
Threat Intelligence as a Business Enabler
JUNE 10, 2020 @ 12:00 AM (PT) | JUNE 10, 2020 @ 8:00 AM (BST)
Accurate and relevant cyber threat intelligence can help organizations make smarter decisions around cyber defense, as well as alert and event prioritization. In this session, Jens Monrad, Head of Mandiant Threat Intelligence – EMEA discusses how cyber threat intelligence enables businesses to make decisions based upon the cyber threat landscape and their risk appetite.

Jens Monrad
Head of Threat Intelligence, EMEA – Mandiant
Ransomware Trends with a Focus on MAZE
JUNE 9, 2020 @ 7:30 PM (PT) | JUNE 10, 2020 @ 10:30 AM (SGT)
Ransomware Threat Actors are upping their game, and with it the price of their ransom is getting upped too. Companies are starting to see ransom demands in the millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. We'll look at how ransomware has evolved, and more importantly what to do about it.

Steve Ledzian
Vice President, Chief Technology Officer, APAC – FireEye
Modern Cyber Risk Management for Better Decision Making
JUNE 10, 2020 @ 11:00 AM (PT) | JUNE 10, 2020 @ 2:00 PM (ET)
Most C-suite leaders believe their investment decisions in security risk management do not keep up with new and heightened levels of cyber risk. This is because they often use a decade old, top-down approach to risk, which leaves gaps between attacker and defender behaviors.
You can do better, by transforming your risk management processes and the people behind them. But first, you need to align your organization’s security efforts with the risk appetite of data owners and business leaders.
Learn how you can:
- Identify challenges in your current cyber risk management program
- Establish a modern cyber risk management strategy
- Shift the players and processes involved in your cybersecurity decision support
- Integrate risk management priorities across the entire security function
- Monitor progress with the right kind of security metrics

Matt Keane
Principal Consultant – Mandiant

Jennifer Guzzetta
Product Marketing Manager – Mandiant
Mandiant’s Perspective on the Threat Actors in Europe
JUNE 11, 2020 @ 2:00 AM (PT) | JUNE 11, 2020 @ 10:00 AM (BST)
In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.

Adrien Bataille
Sr. Consultant – Mandiant
C-Suite Conversations: The Value of Threat Intelligence
JUNE 11, 2020 @ 12:00 PM (PT) | JUNE 11, 2020 @ 3:00 PM (ET)
Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders?
Join this session to hear Nigel Gardner, Cyber Threat Intelligence Leader at MGM Resorts discuss:
- Types of threat intelligence consumers
- Whether to use outcomes or operational metrics to communicate threat intelligence
- Whether ROI-based justification is required to measure the success of threat intelligence
- Use cases that illustrate working and nonworking approaches

Nigel Gardner
Cyber Threat Intelligence Leader – MGM Resorts

Bart Lenaerts-Bergmans
Sr. Product Marketing Manager – Mandiant
Validate Security Performance to Rationalize Investments
JUNE 11, 2020 @ 1:00 PM (PT) | JUNE 11, 2020 @ 4:00 PM (ET)
Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.
In this session you can learn:
- Best practices for investment prioritization when it comes to hiring, training and security solution procurement
- How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
- Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value

Major General Earl Matthews
Vice President of Strategy, Security Validation – Mandiant