- 261
- 1 539 732
mWISE Conference (from Mandiant)
เข้าร่วมเมื่อ 26 ส.ค. 2022
Mandiant Worldwide Information Security Exchange (mWISE) joins Google Cloud Next in 2025! Learn more: cloud.withgoogle.com/next
Supercharge Your Frontlines: Purpose-Built CTI for IR & SOC Success
This presentation outlines a framework for building a CTI team optimized to support incident response and SOC operations. Attendees will learn how to align CTI output with operational needs and integrate it into incident response and SOC processes for improved threat detection and response.
มุมมอง: 109
วีดีโอ
Developing Effective SOC Capabilities using a Knowledge-Based Approach to People, Processes, Tech
มุมมอง 132หลายเดือนก่อน
Existing industry tools and frameworks do not address developing effective Security Operations Center (SOC) capabilities. Our research has developed an Ontology for SOC Creation Assistance and Replication (OSCAR) to fill this gap and provide a new tool for teams developing SOC capabilities.
Improving Healthcare Incident Response in the Wake of Recent Healthcare Breaches
มุมมอง 37หลายเดือนก่อน
In this talk, we will discuss approaches to improve and modernize incident management programs using the NIST incident response framework as a template. This talk will focus on proposed improvements to the preparation, detection, containment, and recovery phases in the healthcare sector.
From Job Interview to Crypto Heist: How North Korea sponsored threat actor stole crypto currencies
มุมมอง 121หลายเดือนก่อน
This talk sheds insights into a campaign into a crypto heist performed by a North Korean threat actor. The threat actor used social engineering, source code review and exploit the logic vulnerability to steal crypto currency worth millions of dollars.
Turning Chaos into Privileges: Processing Attacker Data with AI
มุมมอง 44หลายเดือนก่อน
Turning Chaos into Privileges: Processing Attacker Data with AI
The SIEM Isn't Dead: Comparing SIEMs and Data Lakes in Modern Cybersecurity
มุมมอง 81หลายเดือนก่อน
SIEMs may not be dead, but the SecOps landscape is evolving. This talk offers a real and honest discussion on comparing SIEMs and data lakes, leveraging AI/ML for modern SecOps, understanding the challenges and costs of migration, and selecting what's best for your organization.
Wholesome Hashes for a DNS Breakfast: How to Chew Through Adversary Automation
มุมมอง 144หลายเดือนก่อน
Fuzzy hash searches across all content hosted on the open internet create unique opportunities to fingerprint malicious content and find it as it’s spun up. Minor or even major changes powered by scripts become identifying key details that can be used for defense before an attack is launched.
At the breaking point: is your email safe against ransomware and state-sponsored attacks?
มุมมอง 84หลายเดือนก่อน
As cyber threats become increasingly sophisticated, driven by generative AI, organizations need robust, proactive defenses. This session reveals how AI-powered collaboration tools using the principles of Zero Trust provide a critical first line of defense against email-based attacks, empowering secure work from anywhere.
Unlocking eBPF: The Future of App and Data Security
มุมมอง 147หลายเดือนก่อน
Explore how eBPF revolutionizes application, API, and data security by extending Linux kernel capabilities to achieve unparalleled visibility. Seamless installation, instant adoption, and high programmability make eBPF a game changer.
Securing AI Systems: Detecting and Stopping GenAI-Enabled Threat Actors
มุมมอง 57หลายเดือนก่อน
Generative AI has opened new avenues for enabling cyber threat actors to conduct phishing, vulnerability research, and other abuse. After months of tracking actors attempting to abuse Google's AI systems, we will share lessons learned in how to detect and stop abuse and exploitation of AI systems.
Threat Modeling as a Fitness Function - Iteratively Improving the Security Posture of your Software
มุมมอง 92หลายเดือนก่อน
Threat modeling is a tool for understanding what could go wrong in a software architecture. We often miss opportunities by threat modeling in silos without iteratively integrating with all the capabilities of our engineering and security teams. This talk details building such an iterative model.
Effective ROI: Practical Controls to Protect Against Impacts of Data Theft and Ransomware
มุมมอง 80หลายเดือนก่อน
Multi-faceted extortion via ransomware or data theft is a popular end goal for attackers. This presentation will focus on programmatic and technical controls that can not only protect organizations, but also demonstrate a positive return on investment by better protecting the business.
Security Controls: Stupid but Important
มุมมอง 982 หลายเดือนก่อน
Application teams are expected to develop secure and compliant solutions, often with no well lit path to follow. We will review how Equifax’s simplified approach enables teams to meet business-critical compliance requirements, and use the compliance framework to also meet security objectives.
Rites of Passage as a CISO
มุมมอง 682 หลายเดือนก่อน
Kevin Mandia and seasoned CISOs discuss what you need to know to be a successful CISO.
Looking Around Corners and Defending Against 'the security hotness'
มุมมอง 562 หลายเดือนก่อน
Cyber defenders struggle to balance security and innovation. This talk offers a framework for CISOs to evaluate and integrate new technologies BEFORE the next threat or "hotness" becomes real.
Build a High Value Quantitative Risk Management Program on a Budget
มุมมอง 902 หลายเดือนก่อน
Build a High Value Quantitative Risk Management Program on a Budget
Unmasking the Hidden Danger: The Critical Role of Insider Threat Penetration Testing
มุมมอง 822 หลายเดือนก่อน
Unmasking the Hidden Danger: The Critical Role of Insider Threat Penetration Testing
Lessons Learned from the Summer of Supply Chain Attacks
มุมมอง 622 หลายเดือนก่อน
Lessons Learned from the Summer of Supply Chain Attacks
I Wish I'd Known This Before We Got Sued
มุมมอง 402 หลายเดือนก่อน
I Wish I'd Known This Before We Got Sued
The Good, the Bad, and the “What the Hell Were you Thinking': Clarifying the Rules of Engagement
มุมมอง 442 หลายเดือนก่อน
The Good, the Bad, and the “What the Hell Were you Thinking': Clarifying the Rules of Engagement
How GenAI is Shifting the Defender Landscape
มุมมอง 1072 หลายเดือนก่อน
How GenAI is Shifting the Defender Landscape
Leveling Up: Empowering Security Operations with AI
มุมมอง 772 หลายเดือนก่อน
Leveling Up: Empowering Security Operations with AI
The Dark Side of Innovation: Generative AI in Cybercrime
มุมมอง 1412 หลายเดือนก่อน
The Dark Side of Innovation: Generative AI in Cybercrime
The Data Must Flow: An Analyst-First Perspective on the Next Age for SOCs
มุมมอง 1172 หลายเดือนก่อน
The Data Must Flow: An Analyst-First Perspective on the Next Age for SOCs
Secure Remote Identity Verification in the Era of Generative AI
มุมมอง 562 หลายเดือนก่อน
Secure Remote Identity Verification in the Era of Generative AI
Securing the Future: A Secure by Design Approach to AI Systems
มุมมอง 1352 หลายเดือนก่อน
Securing the Future: A Secure by Design Approach to AI Systems
From Manual Mayhem to AI-Powered SOC: How Generative AI is Revolutionizing Security Operations
มุมมอง 1282 หลายเดือนก่อน
From Manual Mayhem to AI-Powered SOC: How Generative AI is Revolutionizing Security Operations
Geopolitical Catalyst - How the Russia-Ukraine War has changed the Hacktivist Landscape
มุมมอง 1412 หลายเดือนก่อน
Geopolitical Catalyst - How the Russia-Ukraine War has changed the Hacktivist Landscape
Analyzing VirusTotal's Malware Executables Collection with LLMs
มุมมอง 1062 หลายเดือนก่อน
Analyzing VirusTotal's Malware Executables Collection with LLMs
You know what else the greatest stories have in common? They were told and others heard them. They werent censored by CISA like every dissident opinion (later admitted fact) about Covid. CISA is a DHS propaganda and censorship agency. It is the tip of the spear in the government's effort to destroy the 1st Amendment.
So a security guy needs to learn generative AI or machine learning ?
One of the worst titles I've ever seen. If you are talking about SOC, write it within the first 4 words. There is also no clarity on what SOC actually stands for, Security Operation Center? System On a Chip?
Well done Geordie!
Excellent, important and real world. Is the deck available?
Wow... great Geordie and the information really valuable and interesting...keep up the great job you're performing there...congrats!!!
This is really great - relevant and real. Thanks Kevin!
Thanks for the video!
Thanks for the video presentation!
Make more amazing videos. Use a service like 'Promosm'!!!
Just leaving a comment for the algorithm