Save your spot
Chief Product Officer, Anomali
Chief Technology Officer, Mandiant
About The Event
Join the virtual event to learn about Best Practices for Detecting and Mitigating Advanced Persistent Threats from Mandiant and Anomali. This virtual event will bring the community together to discuss threat intelligence challenges, requirements, and best practices.
Who Should Attend
This session is intended for both CXO and senior technical staff. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their environments.
|8:00am PT||Chris Needs, Anomali||Opening|
|8:05am PT||Mark Alba, Anomali & Marshall Heilman, Mandiant||Q&A Discussion|
|8:35am PT||Mark Alba, Anomali||It’s Great to Detect a Breach, but Better to Detect the Attacker|
|9:10am PT||Marshall Heilman, Mandiant||Knock Knock – Do You Know Who Is There? You Should. Going Beyond the Basics Using Threat Intelligence to Secure Your Organization|
|9:45am PT||Chris Needs, Anomali||Closing|
Q&A DiscussionMark Alba, Anomali | Marshall Heilman, Mandiant | Chris Needs, Anomali
New attacker techniques, trends across attacker groups, and extended detection and response (XDR).
It’s Great to Detect a Breach, but Better to Detect the AttackerMark Alba, Chief Product Officer, Anomali
The “cat-and-mouse” game between Attackers and Defenders is as old as the LoveLetter virus. And while script-kiddies have matured to become cyber criminals, hacktivists, and state-sponsored adversaries, it sometimes feels like Defenders are stuck in 1999. We deploy anti-virus and monitor the perimeter and then wait and see. Yes, today’s security technology is “Next Gen,” “2.0,” and “Meta,” but the concept is the same. Set the trap and wait to be attacked.
And while the focus has been on stopping the active Attacker in the act, innovations in Big Data now allow us to detect the Attacker targeting your organization and stop them before they strike. To be clear, we are not talking about intelligence feeds managed through a platform, but rather a new approach to detection that harnesses the insights of intelligence to profile the Attacker, pattern the attack, and align the Attacker’s intent with the reality of your security posture.
Join us for this Detect LIVE session and learn how understanding your relevant threat landscape helps influence your detection, investigation, and response.
Knock Knock – Do You Know Who Is There? You Should. Going Beyond the Basics Using Threat Intelligence to Secure Your OrganizationMarshall Heilman, Chief Technology Officer, Mandiant
Like all things security, if it isn’t current, it isn’t useful. Threat intelligence is no exception. Benjamin Franklin once said, “If you fail to plan, you are planning to fail!” Proper planning includes arming your organization with threat intelligence that allows them to prepare their defenses against eminent attacks. Equipping your security team with high fidelity, frontline-vetted threat data and expertise helps to accelerate their ability to make security and risk decisions.
We all know the threat landscape is evolving. Adversaries change their tools and methods of attack regularly and you need to be prepared. Your threat intelligence needs to provide you with relevant and real-time information. With threat intelligence that gives insights into who is most likely to attack, how they are going to attack and what tools they will use to attack, your organization is better prepared to understand active threats and improve your cyber defenses.
Join us for this Detect LIVE session to learn how your organization can use threat intelligence to be better prepared for attacks and respond to breachers faster.
Earn CPE Credits
Are you a certified CISSP? You can earn up to 1.75 CPE credit for attending this event. Instructions for claiming your CPE will be sent over email following the conclusion of the event.