Webinars

Webinars

  • M-Trends At Work: Making It All Count

    M-Trends 2022 provides an inside look at the evolving cyber threat landscape directly from global incident response investigations and threat intelligence analysis of high-impact attacks and remediations around the globe. With all the information from the frontlines, the most important question is – how do we make it work for us? Join two of Mandiant’s solution experts as they discuss how Mandiant brings it all together. Topics will include: • Who is targeting you and how we collect, analyze and share insights • How attackers see you and how we show you the opportunities you present to them • How you can know whether you are prepared • How to make an informed response when you are compromised Read More

  • The rise of evasive threats and why it’s vital to prevent them

    Join Kaspersky to hear about the changing threat landscape, why evasive threats are so dangerous and how to prevent or mitigate them. This session will review topics such as: - tools beyond EPP - do you need them? - ransomware prevention checklist - EDR vs MDR - how to maximize limited, skilled resources - incident response strategies Read More

  • Hidden Active Directory Misconfigurations: Red Team Style

    Active Directory is the most common on-premises identity provider solution for organizations around the globe. With the rise of cloud adoption, it is now frequently used in a cloud/on-premises hybrid model to manage and sync user identities between the environments. Over the last year, Mandiant has observed a higher volume of misconfigurations with Active Directory and hybrid identity models which resulted in successful vertical privilege escalation and stealthy persistence. These configuration missteps put organizations at a higher risk for harmful compromise, which calls for increased focus on hardening Active Directory setup and processes. Join Andrew, one of Mandiant’s frontline consultants, as he walks us through an Active Directory attack lifecycle—Red Team style. Topics of discussion will include: • Modern attacker TTPs for Active Directory • Hidden misconfigurations that can lead to domain compromise • Dangers associated from this type of compromise • Proven mitigation strategies and recommendations Read More

  • The top cyberattacks to watch for in 2022

    The rapid shift to remote and hybrid work has created unprecedented opportunities for cybercriminals to strike organizations across all industries. Companies must be proactive and understand the top threats lurking before they fall victim, costing them monetary and reputational damage. Tune into this expert panel as they explain leading cybersecurity threats facing organizations and what they can do to keep their data, employees and customers safe. We'll discuss: - How to define and choose and incident response framework - Recent high profile cyber attacks and what we can learn from them - Latest state of ransomware and its new variants - The increase in DDoS attacks Read More

  • Ransomware: New Attacker TTPs and Recovery Strategies for Security Teams

    Ransomware attacks are not slowing down, and neither are the evolving techniques used by adversaries who will stop at nothing to achieve their mission of financial gain. With a median dwell time of only five days for ransomware deployment (compared to 36 days for non-ransomware intrusions), security teams must be steadfast in their ransomware detection, response, and remediation preparedness. M-Trends 2022 provides unique insights into new attacker TTPs used to deploy ransomware rapidly and efficiently with focus on virtualization infrastructures as a prime/growing target of entry. In addition, organizations must do more to plan and execute recovery operations that stand the test of time. Join two of Mandiant’s frontline principal consultants as they discuss the evolving ransomware landscape and recovery strategies that security teams can put into motion. Topics of discussion will include: • Newly observed attacker tools, tactics, and procedures • Latest recommended mitigation activities • Common themes that help (and hinder) recovery operations • Critical components of an effective response • Considerations for effective recovery actions Read More

  • Fuelling the Digital Experience Economy with Connected Products

    Delivering enhanced digital experiences have become a competitive advantage for any organization. As a result, business models have moved towards the digital experience economy. Technologies such as application programming interfaces (APIs), integration platforms, identity and access management solutions, cloud offerings, and big data enable a steady observability layer to understand consumer usage patterns and trends. In addition, connected products enhance the number of data points fed into the observability layer at the edge. In this keynote, Asanka will look at how a connected product can be brought into a digital ecosystem to enhance customer experiences and increase revenue. He will share reference architectures and real-world success stories to provide a pragmatic approach to digital strategists and crafters. Bio for Asanka Abeysinghe: Asanka’s goal is to connect humans and technology by helping organizations implement digital transformation programs that result in consumer-driven digital applications. In his current role as the Chief Technology Evangelist, Asanka drives efforts to create, refine, and enhance WSO2’s corporate reference architecture and is responsible for spearheading a thought leadership outlook that defines WSO2’s corporate reference methodology for development, customer success, and implementation. Working closely with customers, partners, and analysts, he evangelizes WSO2’s technology vision. Asanka has over 20 years of industry experience, which includes designing and implementing highly scalable distributed systems, SOA and microservice architectures in the financial domain, mobile platforms, and various business integration solutions. He is also a committer of the Apache Software Foundation. Asanka is a regular speaker at numerous global events, and many tech meetups in the San Francisco Bay Area. Read More

  • How New Technology Increases Chance of Breach and Avoiding Detection

    Cybersecurity attacks are increasing in all sectors, with many of them successful. In many ways, new technology has enabled this by focusing on usability, ubiquitous access and functionality. While cloud service adoption has accelerated in response to the COVID-19 pandemic, we have outsourced many critical services to third parties while failing to properly update security controls and processes. In this talk, we'll explore some of these new challenges are and how many of them are simply variations on old themes. We'll discuss what you can expect by way of challenges and obstacles in addressing these risks. But most importantly, we will explore what organizations, regardless of size and resources, can realistically do to both reduce the likelihood of breaches as well as responding when they do occur. Key Takeaways • Why we are in a more precarious situation when it comes to the likelihood of successful cyber attacks and breaches. • Identify unique challenges deriving from both technology advancements and new work models. • Identify old problems reappearing in newer ways i.e. ITAM. • Formulate a high level game plan on breach prevention and how to respond to successful attacks Read More

  • The Evolution of China’s Approach to Cyber Operations

    M-Trends 2022 provides insights on the changing strategies behind China’s approach to cyber operations. Historically, China has used its cyber capabilities to secure regional power and ensure it is a vital component of the world’s economy and global supply chain. China’s cyber activities have undergone several changes and reorganizations over the years. Join Cristiana, one of Mandiant’s principal threat analysts, as she provides an overview of China’s cyber operations including strategic realignments and retooling within groups that closely align to priorities of the implementation of China’s 14th Five-Year Plan. Stay ahead of this nation-state threat by understanding the attacker characteristics and what they could mean for your organization’s security posture. Topics of discussion will include: • Restructuring and centralization of power • Attacker tactics, techniques, and procedures (TTPs) • Geopolitics and regional outlook Read More

  • Today’s Top Cyber Trends and Attacks: By the Numbers

    The M-Trends 2022 report is packed with timely data from Mandiant’s frontline incident response experience and unparalleled threat intelligence, offering insight into the most impactful breaches and attacker operations around the world. Join two of Mandiant’s top threat analysts as they dive into the latest trends and walk you through what these findings mean for your organization. Topics for discussion include: • Global and Regional Dwell Times • Detection by Source Trends • Industry Targeting Metrics • New and Notable Threat Groups • Top Infection Vectors and Malware Families • Most Prevalent Attacker Techniques • And more! Read More