Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Mandiant Podcasts

show episodes
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
The Security Perspectives Podcast is a show that explores the world of information security and provides valuable insights into starting and advancing a career in this exciting field. Hosted by Nikolas Behar, each episode features a guest who shares their unique perspective on the latest trends, challenges, and opportunities in information security. From red team operators to chief information security officers, guests offer valuable advice and practical tips for listeners looking to break i ...
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
  continue reading
 
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
  continue reading
 
Loading …
show series
 
Karen is a genuine global leader in the cyber-legal space. She manages the relationship between Google Mandiant and its law firm and insurance partners. She has had a remarkable cyber career…think FireEye, Safeguard Cyber, Mandiant and now Google Mandiant! Karen and I caught up at the IAPP Global Conference in Washington D.C. and then again at the …
  continue reading
 
What goes into creating effective software protections? This episode features a conversation with Tim Blazytko, Chief Scientist and Head of Engineering at Emproof, about the essential strategies for protecting software intellectual property. We cover the core concepts of code obfuscation and anti-reverse engineering and discuss practical, modern ap…
  continue reading
 
Nick Guttilla and Emily Astranova, from Mandiant Consulting's Offensive Security team, join host Luke McNamara for an episode on voice-based phishing, or "vishing." Nick and Emily cover their respective blogs and experiences, diving into how they employ vishing techniques to social engineer organizations--both organically and using AI-powered voice…
  continue reading
 
Guest Alan Braithwaite, Co-founder and CTO @ RunReveal Topics: SIEM is hard, and many vendors have discovered this over the years. You need to get storage, security and integration complexity just right. You also need to be better than incumbents. How would you approach this now? Decoupled SIEM vs SIEM/EDR/XDR combo. These point in the opposite dir…
  continue reading
 
After initial scepticism, Crypto is making its way into the UK regulatory perimeter. In the sixth episode of the FSR Brief, Jon Ford and Michael Tan are joined by Chris Ninan and Elizabeth Stephens to discuss the road to regulation, with a focus on the recently published statutory instrument from the UK Government, and the FCA's "DP25/1: Regulating…
  continue reading
 
(REPLAY) This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for securing your …
  continue reading
 
Guests: Eric Foster, CEO of Tenex.AI Venkata Koppaka, CTO of Tenex.AI Topics: Why is your AI-powered MDR special? Why start an MDR from scratch using AI? So why should users bet on an “AI-native” MDR instead of an MDR that has already got its act together and is now applying AI to an existing set of practices? What’s the current breakdown in labor …
  continue reading
 
Marina Reason and Ioannis Asimakopoulos discuss the scope of the new UK crypto rules and highlight the top 3 takeaways. They consider the draft legislation that will bring certain cryptoassets within the financial services regulatory perimeter. They also outline the key aspects of a related Financial Conduct Authority (FCA) discussion paper that se…
  continue reading
 
In this episode of The Cyber Threat Perspective, we dive into why a “we couldn’t get in” result on a pentest isn’t always the victory it seems—and why it can be a great sign if interpreted correctly. We break down the real defensive controls that prevented compromise, explore what might still be hiding under the surface, and share why even a clean …
  continue reading
 
Tune into our 27th episode of Inside IR, in which IR experts Rohan Doyle (Partner) and Emma Vautin (Senior Associate) are joined by Steve Bell, Managing Partner and Safety lead, to discuss “Managing picket lines at the workplace – the crossover between IR and safety”. In this episode, the team share their extensive experience in working alongside c…
  continue reading
 
Artificial intelligence is upon us, but are schemes ready? Trustees may not yet be offering AI tools, but members have been quick off the mark. In this second episode, we discuss how members are using AI, before closing with practical tips for trustees. Our guest, again, is comms consultant Thomas Joy (Quietroom). Subscribe to our Pensions Notes Bl…
  continue reading
 
Tim Stutt, Anna Coroneo and Isabella Kelly delve into the integration of sustainability reports into annual reports, exploring the challenges and strategies for clear and effective climate-related disclosures. They cover a broad spectrum of topics including the potential for ASIC relief applications, complexities of cross-referencing and implicatio…
  continue reading
 
Guest: Christine Sizemore, Cloud Security Architect, Google Cloud Topics: Can you describe the key components of an AI software supply chain, and how do they compare to those in a traditional software supply chain? I hope folks listening have heard past episodes where we talked about poisoning training data. What are the other interesting and unexp…
  continue reading
 
JP Glab (Mandiant Consulting) joins host Luke to discuss responding to activity from North Korean IT workers. He walks through what initially triggered the investigation at this organization, how it progressed in parallel with an HR investigation, and ultimately what was discovered. For more on the DPRK IT workers and trends in incident response, c…
  continue reading
 
In this episode of The Cyber Threat Perspective, we tackle the crucial first step in cybersecurity: preventing initial compromise. We'll dissect common attack vectors like phishing and exploitation and explore layered defenses ranging from MFA and patch management to DMZs and WAFs. Get actionable guidance to integrate these controls into your secur…
  continue reading
 
In the first episode of the podcast, hosted by Steve Bell and Nerida Jessup, we focus on a contemporary issue for Australian workplaces - psychosocial health and safety. Traditionally centred on physical risks, there has been a significant shift over the past five years towards managing non-physical risks such as bullying and sexual harassment. Thi…
  continue reading
 
In this episode of the Talking Shop podcast, we delve into the role of Intellectual Property (IP) as a tool for sustainability. We explore how technology and IP can be leveraged to reduce waste while simultaneously increasing value for a brand, and the balance between innovation, sustainability, and IP protection.…
  continue reading
 
In this episode, we’re joined by Thomas Roccia, a security researcher at Microsoft. Thomas discusses the growth of the Unprotect Project, how AI is changing security research, and the impact of data visualizations for conveying technical information. Drawing on his experience, Thomas offers a unique perspective on the intersection of open-source co…
  continue reading
 
Hosts: David Homovich, Customer Advocacy Lead, Office of the CISO, Google Cloud Alicja Cade, Director, Office of the CISO, Google Cloud Guest: Christian Karam, Strategic Advisor and Investor Resources: EP2 Christian Karam on the Use of AI (as aired originally) The Cyber-Savvy Boardroom podcast site The Cyber-Savvy Boardroom podcast on Spotify The C…
  continue reading
 
Guest: Diana Kelley, CSO at Protect AI Topics: Can you explain the concept of "MLSecOps" as an analogy with DevSecOps, with 'Dev' replaced by 'ML'? This has nothing to do with SecOps, right? What are the most critical steps a CISO should prioritize when implementing MLSecOps within their organization? What gets better when you do it? How do we adap…
  continue reading
 
Artificial intelligence is upon us, but are schemes ready? Like it or not, members are already turning to AI to guide their pension decisions. In the first of two episodes, we focus on the opportunities and challenges for trustees. Thomas Joy, from comms consultants Quietroom, joins to discuss with pensions partner Michael Aherne. Subscribe to the …
  continue reading
 
In this episode of The Cyber Threat Perspective, we break down how attackers steal credentials and hijack sessions to gain unauthorized access to systems and data. From phishing to cookie stealing to session token theft, we’ll explore the most common techniques and how to defend against them. Whether you're an IT admin or security pro, you’ll walk …
  continue reading
 
Our M&A and Trade experts from the UK (Alex Kay), Europe (Morris Schonberg), Asia (Nanda Lau) and Australia (Andrew Rich) discuss the current economic and geopolitical headwinds impacting M&A activity in the consumer sector, reflect on the biggest transactions from the past year and make predictions for deal activity in the next 12 months.…
  continue reading
 
In our first episode of The Third Wheel for 2025, Tim Stutt, Anna Coroneo and Suzannah Hewson explore the key themes and latest trends in climate and sustainability reporting both globally and in Australia. They offer practical advice for companies preparing for new regulatory requirements and conducting climate reporting readiness initiatives, inc…
  continue reading
 
Matt Lin (Senior Incident Response Consultant, Mandiant) and Daniel Spicer (Chief Security Officer, Ivanti) dive into the research and response of UNC5221's campaigns against Ivanti. They cover how this threat actor has evolved from earlier campaigns, the continued focus of edge infrastructure by APT actors, and the shared responsibility of securit…
  continue reading
 
Guests: no guests, just us in the studio Topics: At RSA 2025, did we see solid, measurably better outcomes from AI use in security, or mostly just "sizzle" and good ideas with potential? Are the promises of an "AI SOC" repeating the mistakes seen with SOAR in previous years regarding fully automated security operations? Does "AI SOC" work according…
  continue reading
 
As part of Government's relentless drive to grow the economy, regulators have been challenged on how they can support the growth agenda. In Episode 5 of the FSR Brief, Jon Ford and Michael Tan are joined by Jenny Stainsby and Tim Parkes to discuss how this is playing out in Financial Services, and how regulators are responding. At the same time as …
  continue reading
 
In this episode Spencer and Brad review the M-Trends 2025 Report. M-Trends 2025 is Mandiant's annual report that shares frontline learnings from its global incident-response engagements—over 450 000 hours of investigations in 2024—providing sanitized, data-driven analysis of evolving attacker tactics, dwell times, industry and regional trends, and …
  continue reading
 
Guests: Kirstie Failey @ Google Threat Intelligence Group Scott Runnels @ Mandiant Incident Response Topics: What is the hardest thing about turning distinct incident reports into a fun to read and useful report like M-Trends? How much are the lessons and recommendations skewed by the fact that they are all “post-IR” stories? Are “IR-derived” secur…
  continue reading
 
In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strateg…
  continue reading
 
Guests: No guests [Tim in Vegas and Anton remote] Topics: So, another Next is done. Beyond the usual Vegas chaos, what was the overarching security theme or vibe you [Tim] felt dominated the conference this year? Thinking back to Next '24, what felt genuinely different this year versus just the next iteration of last year's trends? Last year, we po…
  continue reading
 
This episode shines a light on abuse.ch, a vital non-profit project built by and for the global cybersecurity community. We chat with founder Roman Huessy about the collective effort behind tracking malware and botnets for over a decade. Discover the journey of maintaining a crucial shared resource—the technical challenges of hosting an open platfo…
  continue reading
 
In this Easter edition of the public law podcast, Jasveer Randhawa is joined by HSF partners Nusrat Zar and James Wood. Together, they discuss the application and availability of public law in a contractual context. They then delve into the cases of Sarcp and Clifford to consider the duty to consult and the Gunning principles. To conclude, they exp…
  continue reading
 
Reforms to the ‘tipping off’ offence under section 123 of the Australian Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (Cth) came into force from the 31st of March. The revised offence differs significantly from the former regime and will have significant implications for the day-to-day practices of many Australian businesses. In t…
  continue reading
 
Guests: Michael Cote, Cloud VRP Lead, Google Cloud Aadarsh Karumathil, Security Engineer, Google Cloud Topics: Vulnerability response at cloud-scale sounds very hard! How do you triage vulnerability reports and make sure we’re addressing the right ones in the underlying cloud infrastructure? How do you determine how much to pay for each vulnerabili…
  continue reading
 
In this episode, we cross examine Mark Rigotti, Managing Director and Chief Executive Officer of the Australian Institute of Company Directors (AICD), technically the largest director institute in the world with 53,000 members. Mark has had a remarkable career, including as Global CEO at Herbert Smith Freehills for two terms over 2014-2020 (based i…
  continue reading
 
In this episode we discuss "bear hugs", that is where a potential bidder for a target goes public about its possible offer without the target board's consent and appeals directly to the target's shareholders.We talk about: why a bear hug might be used by a bidder; where we have seen them used in recent months; and why we are seeing more of them.…
  continue reading
 
Host Luke McNamara is joined by GTIG Senior Security Researcher Rohit Nambiar to discuss Rohit's recent blog on some interesting usage of RDP by UNC5837. Rohit covers the discovery of the campaign, and the novel functionalities they were using to likely support cyber espionage goals. He delves into these findings and the usage of RemoteApps and vic…
  continue reading
 
Guest: Steve Ledzian, APAC CTO, Mandiant at Google Cloud Topics: We've seen a shift in how boards engage with cybersecurity. From your perspective, what's the most significant misconception boards still hold about cyber risk, particularly in the Asia Pacific region, and how has that impacted their decision-making? Cybersecurity is rife with jargon.…
  continue reading
 
In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about DMARC, DKIM, and SPF and how to elevate them to help protect your organization from attacks like Business Email Compromise (BEC). Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreat…
  continue reading
 
Join our experts as they discuss how to approach legal professional privilege in the context of collaboration platforms such as Microsoft Teams, Slack and WhatsApp, particularly in light of possible requirements to produce documents to regulators, discovery obligations and other litigation processes.…
  continue reading
 
Guest: Henrique Teixeira, Senior VP of Strategy, Saviynt, ex-Gartner analyst Topics: How have you seen IAM evolve over the years, especially with the shift to the cloud, and now AI? What are some of the biggest challenges and opportunities these two shifts present? ITDR (Identity Threat Detection and Response) and ISPM (Identity Security Posture Ma…
  continue reading
 
Recorded 31 March 2025 This election special of Inside IR looks at the upcoming 2025 Australian Federal Election through an industrial relations and employment lens. Given the vast amount of reform over the last 3 years, what does the next term of federal politics look like? Our team explores how the major parties are approaching their election cam…
  continue reading
 
In this episode of The Cyber Threat Perspective, we explore the strategic integration of deception technology like canaries and honeypots into your cybersecurity defenses. Discover how these tools allow you to detect threat actors earlier in their attack sequence, disrupt malicious activities, and mitigate potential damage to your organization. Joi…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play