<!-- do not remove the plaintext nor xmp tags --> <plaintext /> <xmp>.

Cloud Security Webinars and Podcasts

Tune in to on-demand webinars and podcasts for the latest on how to prevent, detect, investigate and respond to security incidents.
1 year ago
ondemand_video On demand
Google Cloud Security 2024 Podcasts
Luke McNamara
1 year ago
ondemand_video On demand
Security Talks December 2023
Transform your cybersecurity with frontline intelligence, expertise and AI-powered cloud innovation.

December 19, 2023
Speakers: Johney Burke, Kelly Anderson, J.R. Wikes, Andrew Kopcienski, Chris Corde, Daniel Fabian, Farzan Karimi, Connie Fan, Royal Hansen, Tiffany Wissner, Luke McNamara, Emil Kiner, Vijay Ganti, Anton Chuvakin, Mitch Christow, Adrian Corona, Javier Dominguez, Vandhana Ramadurai, Aakashi Kapoor, Spencer Lichtenstein
1 year ago
ondemand_video On demand
Security Talks October 2023
Transform your cybersecurity with frontline intelligence, expertise and AI-powered cloud innovation.

October 25, 2023
Speakers: Royal Hansen, Andrew Kopcienski, J.R. Wikes, Chris Corde, Connie Fan, Johney Burke, Kelly Anderson, Daniel Fabian, Farzan Karimi
1 year ago
ondemand_video On demand
Attack Surface Discovery at Scale
Attack surface data is the ever-increasing amount of information that attackers can use to exploit vulnerabilities in an organization's systems and networks. One of the biggest challenges in parsing through attack surface data is its sheer volume and complexity. Attackers are constantly developing new techniques and tools to exploit vulnerabilities, and organizations need to be able to keep up.
This means that security teams need to be able to quickly and accurately identify and prioritize vulnerabilities, even if they are buried in a sea of data.

Join the Mandiant team for a live discussion on outcome-based asset discovery, an easy-to-use method of understanding attack surface exposures. The team will discuss and demo:

  • How to define the outcomes or success criteria of asset discovery
  • The various use cases external attack surface management can solve for
  • The different ways to operationalize attack surface findings across the organization
Speakers: Valerie Williamson, Product Manager and Alexa Rzasa, Product Marketing Manager
1 year ago
ondemand_video On demand
AI & Cybersecurity: How Mandiant Consultants Accelerate Detection & Response
For cybersecurity, artificial intelligence (AI) has the potential to benefit both the defenders and their adversaries.

Threat actors are using AI to instantly generate sophisticated and evasive attacks, while security teams are now using AI-powered security tools to better protect against them. Today, Mandiant consultants are leveraging AI to help defenders reduce the amount of time needed to detect, respond, and remediate these attacks.

Tune into this webinar to learn how Mandiant consultants use AI on the front lines to improve engagement efficiency and effectiveness—alongside their hands-on expertise and embedded threat intelligence.

Attendees will learn from Mandiant speakers Trisha Alexander, Ron Craft, and Jennifer Guzzetta how to use AI as a starting point to:
• Accelerate the investigation process of incident response events
• Streamline the generation of baseline threat detections
• Apply diverse query languages for navigation across multiple security platforms

Speakers: Trisha Alexander, Senior Consultant Ron Craft, Senior Consultant Jennifer Guzzetta, Product Marketing (Moderator)
1 year ago
ondemand_video On demand
AI & Cybersecurity: Leveraging AI to Create Outcome-oriented Security Teams
Threat intelligence is foundational to all aspects of a security program, from SecOps to vulnerability management to risk management and leadership. However, many organizations struggle to operationalize threat intelligence across functions to reduce risk faster. Additionally, the volume can be unmanageable if you don’t know what threats are most critical to your organization.

Mandiant (now part of Google Cloud) is leveraging AI to help security teams of all abilities see the threats that matter to them and use natural language to produce AI-driven search summarization.

Watch this upcoming webinar as Mandiant Threat Intelligence experts—Josh Bass, Megan DeBlois, and TJ Alldridge—demonstrate the new AI capabilities in Mandiant Threat Intelligence and share best practices. Attendees will learn:
• Why a personalized threat profile is important to quickly understand your threats today
• How to leverage natural language search prompts for easy to action results
• How AI can help you quickly understand and reduce risk from emerging threats

Speakers: Josh Bass, Group Product Manager, Megan DeBlois, Product Manager, TJ Alldridge, Product Marketing (Moderator)
1 year ago
ondemand_video On demand
Respond to Resume Operations & Hunt to Prevent Compromise- Webinar Series Part 4
This session is the fourth in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical functions of cyber defense that make up The Defender’s Advantage.

In this webinar, join Mandiant experts for a discussion on how to properly Respond to resume normal business operations and effectively remove threats from the environment. Also learn how to proactively Hunt for evidence from a previous or existing compromise to enhance future response capabilities and realize new methods of threat detection.

Speakers: Omar Toor, Principal Consultant, Mandiant, Dan Nutting, Manager, Consulting, Mandiant
1 year ago
ondemand_video On demand
Detect Risks & Validate Security Controls - Webinar Series Part 3
This session is the third in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical functions of cyber defense that make up The Defender’s Advantage.

In this webinar, join Mandiant experts for a discussion on how to effectively contextualize, categorize, and prioritize cyber security incidents to rapidly Detect malicious activity and identify significant business risks. Also learn how to Validate your security control ecosystem to ensure the optimization and success of the detection process to ultimately protect your critical assets.

Speakers: Jason Brown, Principal Consultant, Mandiant & Kyle Baird, Principal Consultant, Mandiant
1 year ago
ondemand_video On demand
Utilize Threat Intelligence, Establish Command & Control - Webinar Series Part 2
This session is the second in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical functions of cyber defense that make up The Defender’s Advantage.

In this webinar, join Mandiant experts for a discussion on how to understand and effectively implement your collective Threat Intelligence to make the right security decisions. We will also dive into the establishment of Command and Control to orchestrate the prioritization of activities performed by all six cyber defense functions to achieve security resilience and reduce the overall impact of cyber attacks.

Who should attend:
CISOs
Cyber defense directors
SOC managers
Seasoned and new cybersecurity practitioners

Speakers: Danielle Restaino, Emily Cranston, Principal Consultants, Mandiant & Jim Meyer, Sr. Principal Consultant, Mandiant
1 year ago
ondemand_video On demand
Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1
Learn how to activate the six critical functions of Cyber Defense to optimize your security program in the face of harmful adversaries. Building a best-in-class cyber defense organization will provide confidence in your ability to protect, defend and respond to sophisticated [and inevitable] threats that can cripple business operations.

As outlined in Mandiant’s award-winning book,“The Defender’s Advantage” organizations are defending against adversaries within their very own environment. Because the defender owns the environment in which they go head-to-head with these ruthless attackers, it’s important to remember that the defender has a fundamental advantage–however many organizations struggle to capitalize on it.↵↵This multipart webinar series will provide helpful insights and best practices surrounding the six critical functions of cyber defense that make up The Defender’s Advantage.

Register for this first session to receive an executive overview of The Defender’s Advantage and its six critical functions of cyber defense—Threat Intelligence, Command and Control, Detect, Validate, Respond and Hunt. Each of these functions represents different responsibilities focused on distinctive goals, while collectively working together to rapidly identify and effectively respond to threats.

Who should attend:
CISOs
Cyber Defense Directors
SOC Managers
Seasoned and new Cybersecurity Practitioners

Speakers: Kerry Matre, Sr. Director, Product, Solutions Marketing, Mandiant & Jennifer Guzzetta, Sr. Product Marketing Mgr, Mandiant
12345

Sign in or create account

To register for events

Forbidden

Sorry, you do not have permission to access this resource.

User account conflict

Sorry, the user account you are using is now linked to Google. Please sign in with Google to use this account.

Forbidden

Sorry, you do not have permission to access this private event.

We'll be right back

We are having temporary difficulties, and are working to fix the issue.

Error authenticating user

There was an error during authentication. Please refresh to try again. If this issue persists, please sign out and sign back in after reloading.

You're currently offline

Refresh the page when your connection is restored to return to the app.