Texture Top Right Grey 03

Empower Track

PLEASE CONTINUE TO CHECK BACK FOR NEWLY ADDED SESSIONS.

Proactive Security Operations: How MITRE ATT&CK and Intelligence-Led Validation Prove Effectiveness

JUNE 9, 2020 @ 9:00 AM (PT) | JUNE 9, 2020 @ 12:00 PM (ET)

With economic uncertainty and an evolving threat landscape, organizations must prove their effectiveness across various operational functions, especially cyber security. While they usually focus on detection and response capabilities, they need to do more to develop proactive security operations. Join this webinar as we highlight the:

  • MITRE ATT&CK knowledge base and how it can be used to help test your security posture and prove effectiveness
  • Importance of relevant threat intelligence for your organization and how its application can help pinpoint failure points
  • Impact of environmental drift on your security posture and how to plan for it
  • Evidence continuous validation delivers to prove effectiveness, reduce costs and optimize your security infrastructure
Chris Key

Chris Key

Senior Vice President, Mandiant Security Validation

Josh Zelonis

Josh Zelonis

Principal Analyst, Forrester

Rethink Cyber Defense Strategies by Starting with Threats

JUNE 9, 2020 @ 11:00 AM (PT) | JUNE 9, 2020 @ 2:00 PM (ET)

Many organizations define cyber defense strategies based on fears or fines: decisions makers are often influenced by the latest news headline or the next audit.

Today, threat intelligence content levels have evolved to reach new readers or enable innovative use cases. Consequently, threat intelligence can inform how you optimize cyber strategies, from essential high-quality detection to alert investigation and the reduction of enterprise threat surfaces. In this session, Peter Watts lays out:

  • A modern definition of threat intelligence with important milestones
  • How to recognize and develop critical success factors for producing or consuming threat intelligence
  • The impact of actionable threat intelligence on security risk leaders and their organizations
  • Future use cases that may reshape how we think about cyber defense and business value
Peter Watts

Peter Watts

Threat Intelligence Veteran and former Dir. for Cybersecurity Policy, National Security Council

Proactive Solutions to Stop Modern Ransomware in its Tracks

JUNE 9, 2020 @ 12:00 PM (PT) | JUNE 9, 2020 @ 3:00 PM (ET)

This webinar brings together Mandiant incident response, threat intelligence and managed detection and response experts to discuss strategic and tactical solutions that will help your organization:

  • Learn about modern ransomware trends and attacker behaviors observed on the frontlines
  • Realize why proactive assessment is critical when preparing for and preventing ransomware
  • Understand how threat intelligence, hunting and response provides the decision support and detection needed to outmaneuver ransomware actors
  • Implement effective mitigation strategies to stop ransomware attackers in their tracks
Nader Zaveri

Nader Zaveri

Incident Response Manager, Mandiant

Matt Bromiley

Matt Bromiley

Principal Consultant, Mandiant Managed Defense

Kimberly Goody

Kimberly Goody

Sr. Manager, Mandiant Threat Intelligence

Threat Intelligence as a Business Enabler

JUNE 10, 2020 @ 12:00 AM (PT) | JUNE 10, 2020 @ 8:00 AM (BST)

Accurate and relevant cyber threat intelligence can help organizations make smarter decisions around cyber defense, as well as alert and event prioritization. In this session, Jens Monrad, Head of Mandiant Threat Intelligence – EMEA discusses how cyber threat intelligence enables businesses to make decisions based upon the cyber threat landscape and their risk appetite.

Jens Monrad

Jens Monrad

Head of Threat Intelligence – EMEA, Mandiant

Ransomware Trends with a Focus on MAZE

JUNE 9, 2020 @ 7:30 PM (PT) | JUNE 10, 2020 @ 10:30 AM (SGT)

Ransomware Threat Actors are upping their game, and with it the price of their ransom is getting upped too. Companies are starting to see ransom demands in the millions of dollars. Large organizations with significant security controls in place are still falling prey to the attackers' tactics. We'll look at how ransomware has evolved, and more importantly what to do about it.

Steve Ledzian

Steve Ledzian

Vice President, Chief Technology Officer - APAC, FireEye

Modern Cyber Risk Management for Better Decision Making

JUNE 10, 2020 @ 11:00 AM (PT) | JUNE 10, 2020 @ 2:00 PM (ET)

Most C-suite leaders believe their investment decisions in security risk management do not keep up with new and heightened levels of cyber risk. This is because they often use a decade old, top-down approach to risk, which leaves gaps between attacker and defender behaviors.

You can do better, by transforming your risk management processes and the people behind them. But first, you need to align your organization’s security efforts with the risk appetite of data owners and business leaders.

Learn how you can:

  • Identify challenges in your current cyber risk management program
  • Establish a modern cyber risk management strategy
  • Shift the players and processes involved in your cybersecurity decision support
  • Integrate risk management priorities across the entire security function
  • Monitor progress with the right kind of security metrics
Matt Keane

Matt Keane

Principal Consultant, Mandiant

Jennifer Guzzetta

Jennifer Guzzetta

Product Marketing Manager, Mandiant

Mandiant’s Perspective on the Threat Actors in Europe

JUNE 11, 2020 @ 2:00 AM (PT) | JUNE 11, 2020 @ 10:00 AM (BST)

In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.

Adrien Bataille

Adrien Bataille

Sr. Consultant, Mandiant

C-Suite Conversations: The Value of Threat Intelligence

JUNE 11, 2020 @ 12:00 PM (PT) | JUNE 11, 2020 @ 3:00 PM (ET)

Economic changes put new pressures on cyber risk and threat management spending. All the while, attackers maintain or even increase their activities. So how to adapt to this new dilemma and communicate the value of threat intelligence to all stakeholders?

Join this session to hear Nigel Gardner, Cyber Threat Intelligence Leader at MGM Resorts discuss:

  • Types of threat intelligence consumers
  • Whether to use outcomes or operational metrics to communicate threat intelligence
  • Whether ROI-based justification is required to measure the success of threat intelligence
  • Use cases that illustrate working and nonworking approaches
Nigel Gardner

Nigel Gardner

Cyber Threat Intelligence Leader, MGM Resorts

Bart Lenaerts-Bergmans

Bart Lenaerts-Bergmans

Sr. Product Marketing Manager, Mandiant

Validate Security Performance to Rationalize Investments

JUNE 11, 2020 @ 1:00 PM (PT) | JUNE 11, 2020 @ 4:00 PM (ET)

Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

In this session you can learn:

  • Best practices for investment prioritization when it comes to hiring, training and security solution procurement
  • How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
  • Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
Major General Earl Matthews

Major General Earl Matthews

Vice President of Strategy, Mandiant Security Validation

Evolve Track

Innovate and evolve your cyber security posture.

Defend Track

Defend mission-critical public sector infrastructure.

FireEye Virtual Summit

#FireEyeVirtualSummit