Webinars

Upcoming Webinars

  • CPE Credits

    Mandiant is an Official (ISC)2 CPE Submitter for members of (ISC)2. Credit may only be given to live-webinar attendees.

Archived Webinars

  • From the Front Lines: It's the End of the Year as We Know It - 2014

    Original Date: December 03, 2014 ET

    2014 is drawing to a close, which means it’s time for Mandiant’s annual year-end review.

    View Archive

  • From the Front Lines: The Industrial Evolution - Transforming Security for Critical Infrastructure

    Original Date: November 06, 2014 ET

    Join Mandiant’s Chris Sistrunk and Dan Scali as they discuss threats to ICS, the challenges organizations face in securing it, and advanced strategies for detecting and responding to cyber security incidents that impact ICS.

    View Archive

  • From the Front Lines: What Really Happened at MIRcon

    Original Date: October 23, 2014 ET

    Join Mandiant’s Richard Bejtlich, Dave Merkel and Ryan Kazanciyan as they discuss highlights from Mandiant’s Incident Response Conference, MIRcon. As always, we will save plenty of time for Q&A.

    View Archive

  • Fresh Prints of Malware - Retail Therapy: An Analysis of Retail Breaches and Card Theft

    Original Date: September 25, 2014 ET

    Join Mandiant’s Nick Pelletier and Manny Jean-Georges as they dive into the realm of retail breaches. They will discuss the tools and tactics leveraged by attackers in compromising retail organizations to obtain payment card data.

    In addition, they’ll provide recommendations on how to enhance your security posture against such breaches. Attendees will also gain an understanding in lessons learned and discussion points for containing and responding to such a breach should they be required to do so.

    As always, we will leave plenty of time for Q&A.

    View Archive

  • Fresh Prints of Malware: The Wild Wild Web (WWW)

    Original Date: August 14, 2014 ET

    Join Mandiant’s own Robert Verderame & Jed Mitten as they provide attendees with unique ways that Mandiant consultants exploited flaws in business logic, authorization, and application workflows to gain unauthorized access to data or functionality.

    View Archive

  • Fresh Prints of Mal-ware: Secret SQL: MSSQL Forensic Techniques

    Original Date: July 17, 2014 ET

    Join Mandiant’s own Jeff Hamm & Gerry Stellatos as they describe methods, approaches, and techniques to use when investigating potential database compromise. Additionally, they will describe how organizations can take steps to improve their detection and response to database access by attackers.

    View Archive

  • Mandiant Webinar: We're Halfway There - 2014

    Original Date: June 12, 2014 ET

    Join Mandiant’s own Christopher Oetting and Mike Middleton as they provide a mid-year update on current attacker trends, investigative techniques, and remediation strategies.

    View Archive

  • Mandiant Webinar: Cyber Governance - Top Actions Every Organisation Needs to Address

    Original Date: May 22, 2014 ET

    MI5 and GCHQ have requested that the FTSE350 report on their status in relation to “Cyber Governance.” Similar requests are being made across the boards of organisations throughout Europe. Join Mandiant’s Paul Dwyer and Mike East as they answer the questions “What is Cyber Governance?” and “What should an organisation be doing to ensure that they are aligning with cyber governance best practices?”

    View Archive

  • Fresh Prints of Mal-ware: IR Survivor - Building Your Bug-Out Bag

    Original Date: April 17, 2014 ET

    Join us for this webinar as Mandiant’s James Gimbi and Jim Aldridge review capabilities organizations should develop to effectively survive an incident.

    View Archive

  • State of the Hack: M-Trends 2014

    Original Date: April 10, 2014 ET

    In this webinar, we will discuss the inner workings of attacker trends identified in 2013. The details presented in M-Trends only begin to scratch the surface of what Mandiant saw during last year’s investigations.

    View Archive

  • State of the Hack – Mind the Gap: Best Practices to Combat the Advanced Persistent Threat

    Original Date: March 06, 2014 ET

    Join Richard Harris, Operations Manager, SOC Dublin and Richard Bejtlich, Chief Security Strategist at FireEye, as they examine effective strategies to respond to computer security incidents using the latest case study illustrations from Mandiant.

    View Archive

  • Fresh Prints of Mal-ware - Get with the Flow: Tips for Leveraging Network Data

    Original Date: February 13, 2014 ET

    Join Mandiant’s Vijay Bolina and Nick Pelletier as they cover techniques for detecting and investigating network intrusions by using netflow data.

    View Archive

  • Fresh Prints of Mal-ware: Keep Your Network Out of the Danger Zone

    Original Date: January 23, 2014 ET

    Join Mandiant’s Lianis Oliva and Evan Peña as they cover advanced malware beaconing techniques and covert communication channels that avoid typical signature-based network IDS/IPS detection.

    View Archive

  • State of the Hack: M-Trends® 2013

    Original Date: March 28, 2013 ET

    In this webinar, Mandiant’s Marshall Heilman and Jason Rebholz will discuss the inner workings of attacker trends identified in 2012. The details presented in M-Trends® only begin to scratch the surface of what Mandiant saw during last year’s investigations.

    View Archive

  • State of the Hack: M-Trends 2012

    Original Date: March 16, 2012 ET

    In this webinar Richard Bejtlich, Chief Security Officer; Michael J. Graven, Director; and Grady Summers, Vice President of Customer Success, survey the key findings from Mandiant’s annual threat report.

    View Archive