The Defender's Advantage Podcast

By Mandiant

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Mandiant

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 78
Reviews: 0
Episodes: 150

Description

The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: Listen to Kevin Bordlemay each month for this series focusing on thoughts, ideas, and initiatives for narrowing the skills gap in cyber security.

Episode Date
Assessing the State of Multifaceted Extortion Operations
Apr 11, 2024
Hunting for "Living off the Land" Activity
Mar 29, 2024
Director of NSA's Cybersecurity Collaboration Center on Trends in 2024
Mar 14, 2024
The North Korean IT Workers
Feb 21, 2024
Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO
Feb 07, 2024
Is The CTI Lifecycle Due For An Update?
Jan 25, 2024
Threat Trends: Hacktivists' Continued Use of DDoS
Jan 10, 2024
Threat Trends: Tales from the 2023 Trenches
Dec 12, 2023
Threat Trends: DHS Secretary Alejandro Mayorkas in Conversation with Kevin Mandia
Oct 25, 2023
Threat Trends: Addressing Risk in the Cloud with Wiz
Oct 19, 2023
Threat Trends: Unraveling WyrmSpy and DragonEgg Mobile Malware with Lookout
Sep 20, 2023
Threat Trends: The Implications of the MOVEit Compromise
Jul 20, 2023
Threat Trends: A Requirements-Driven Approach to Cyber Threat Intelligence
Jun 16, 2023
Frontline Stories: Crisis Communications During a Breach
Jun 06, 2023
Threat Trends: UNC961 and How Managed Defense Approaches Threat Hunting
May 26, 2023
Frontline Stories: The Executive's Role in Cybersecurity
May 17, 2023
Threat Trends: Bonus Episode - How Will AI Impact Threat Intelligence?
May 09, 2023
Threat Trends: M-Trends 2023
Apr 24, 2023
Frontline Stories: Exposure Management Beyond Vulnerabilities
Apr 11, 2023
Threat Trends: How APT43 Targets Security Policy Experts Focused on North Korea
Mar 28, 2023
Threat Trends: A Retrospective on Zero-Days in 2022 with Project Zero and Mandiant
Mar 20, 2023
Threat Trends: Head of TAG on Commercial Spyware, Cyber Activity in Eastern Europe and More
Feb 23, 2023
Frontline Stories: A CISO's Perspective on Managing a Breach
Feb 16, 2023
Threat Trends: An Episode (Mostly) About Non-Ransomware Cyber Crime
Feb 10, 2023
Threat Trends: APT by USB
Jan 19, 2023
Skills Gap: Addressing the Cyber Mobilization Crisis
Jan 12, 2023
Frontline Stories: Get the Facts on Fraud
Jan 05, 2023
Threat Trends: A Year in Review with Sandra Joyce
Dec 15, 2022
Frontline Stories: A Conversation on Third-Party Risk Management
Dec 08, 2022
Skills Gap: Transitioning from Military Service to a Role in Cyber
Dec 01, 2022
Threat Trends: Reflections on Russian Cyber Threat Activity During the War in Ukraine
Nov 23, 2022
Frontline Stories: Cyber Insurance to Make Companies Safer
Nov 17, 2022
Threat Trends: Tracking DPRK Use of Cryptocurrencies
Nov 10, 2022
Skills Gap: Finding Your Fit in Cyber
Nov 03, 2022
Threat Trends: Inside Google Cloud's Threat Horizons Report
Oct 27, 2022
Skills Gap: More Than a Resume
Oct 20, 2022
Threat Trends: The Threat Landscape in APJ
Oct 13, 2022
Frontline Stories: The Evolution of the CISO
Oct 06, 2022
Threat Trends: Metador, Mercenaries, and LABScon with SentinelOne
Sep 29, 2022
Threat Trends: The Security Landscape Facing Manufacturing
Sep 21, 2022
Skills Gap: Expanding Diversity in Cyber Security
Sep 15, 2022
Threat Trends: APT42 - Crooked Charms, Cons, and Compromises
Sep 07, 2022
Frontline Stories: Discussing the Impact of CISA KEV with Nucleus Security
Sep 01, 2022
Skills Gap: Building a Successful Security Operations Team
Aug 18, 2022
Threat Trends: Building Cyber Resiliency Within Financial Services with FS-ISAC
Aug 11, 2022
Frontline Stories: Shields Up, Mandiant
Aug 04, 2022
Threat Trends: Securing the Vote in 2022
Jul 28, 2022
Skills Gap: Looking Beyond the Unicorn Candidate
Jul 21, 2022
Threat Trends: How Adversaries Are Leveraging AI in Cyber Operations
Jul 14, 2022
Bonus: Securing OT/ICS Systems with Nozomi Networks
Jul 07, 2022
Threat Trends: An Interview with the Danish Tech Ambassador
Jun 30, 2022
Skills Gap: Bridging the Skills Gap
Jun 23, 2022
Threat Trends: Tracking Threat Actor Usage of Cryptocurrencies with Chainalysis
Jun 16, 2022
Frontline Stories: Introducing Mandiant Digital Risk Protection
Jun 06, 2022
Threat Trends: After the Headlines - Practical Experience of Rebuilding Trust After a Breach
Jun 02, 2022
Frontline Stories: OT/ICS Security
May 26, 2022
Threat Trends: Information Operations Surrounding the Russian Invasion of Ukraine
May 18, 2022
Threat Trends: UNC3524 - Eye Spy on Your Email
May 02, 2022
Threat Trends: Breaking Down the 2022 M-Trends Report
Apr 15, 2022
Threat Trends: The Evolving Threat Landscape in Europe
Apr 01, 2022
Welcome to the Defender's Advantage Podcast
Mar 30, 2022
Left on Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity
Feb 24, 2022
Cyber Threats to the Olympics
Feb 10, 2022
The Role of Contractors in Cyber Operations
Jan 27, 2022
A Year in Review with Kevin Mandia
Dec 15, 2021
Conflict and Escalation in Cyberspace
Dec 01, 2021
Leveraging Military Experience in an InfoSec Career
Nov 11, 2021
Analyzing Vulnerability and Exploitation Activity in 2021
Nov 02, 2021
Covering Cyber Threats and Trends
Oct 15, 2021
The FIN12 Episode
Oct 07, 2021
Disentangling the DPRK
Sep 23, 2021
The Evolving Ransomware Landscape
Sep 07, 2021
Tackling Supply Chain Security
Aug 20, 2021
Assessing Iranian Threat Actors’ Usage of Ransomware
Jul 30, 2021
Fostering CTI Development with Mandiant Intelligence Services
Jul 13, 2021
Filling the CTI Skills Gap with Mandiant On-Demand Cyber Intelligence Training
Jun 15, 2021
Low Sophistication Threat Actors Continue to Target OT
Jun 10, 2021
How Mandiant is Helping Governments Build Cyber Capacity
May 19, 2021
Pandemic Impacts to the Cyber Threat Landscape
May 04, 2021
Automated Defense Brings New Features to Mandiant Advantage
Apr 28, 2021
The Making of an M-Trends Report
Apr 22, 2021
The "Big Four": Spotlight on Russia
Apr 12, 2021
The "Big Four": Spotlight on China
Mar 24, 2021
An Inside Look into How Reddit Fights Cyber Threats
Mar 16, 2021
Tackling Digital Safety for Women
Mar 08, 2021
The "Big Four": Spotlight on Iran
Feb 22, 2021
Breaking Down Malicious Insider Threats
Feb 16, 2021
The Cyber Landscape in Latin America
Jan 21, 2021
The "Big Four": Spotlight on North Korea
Jan 11, 2021
Protecting Healthcare and Academia Against Cyber Threats
Dec 03, 2020
A Look Back and a Look Forward
Nov 16, 2020
Cyber Security Through the Eyes of a Journalist
Oct 26, 2020
The Inception of Mandiant Advantage
Oct 14, 2020
Back to School: Training the Cyber Workforce in 2020
Sep 30, 2020
Ransomware and Observations from Recent IR Investigations
Sep 16, 2020
The Ghostwriter Campaign and Trends in Disinformation Today
Aug 31, 2020
Making Sense of Cyber Threats at Scale with Strategic Intel
Aug 21, 2020
Behind the Scenes with Mandiant Security Validation
Jul 31, 2020
Unique Threats to OT and Cyber Physical Systems
Jul 15, 2020
Eye on APAC: Cyber Security & Threats in Asia Pacific
Jun 16, 2020
Stay Secure While Using Collaboration Platforms
May 13, 2020
Getting Ready for a New Era of COVID-19 Related Phishing
May 05, 2020
A Deeper Discussion About M-Trends 2020, Part Two
Apr 21, 2020
A Deeper Discussion About M-Trends, Part One
Apr 18, 2020
S3E3: M-Trends 2020 Dwell Time is a Swell Time
Mar 24, 2020
The Cloud Revolution and the Future of the SOC
Nov 19, 2019
What to Anticipate When Migrating to the Cloud
Nov 19, 2019
Validating Detection & Response with Purple Team Assessments
Oct 22, 2019
Scaling Up with Digital Threat Monitoring
Oct 15, 2019
The EMEA Cyber Security Threat Landscape
Sep 26, 2019
Innovation Architecture: A New Way of Protecting Our Custome
Aug 26, 2019
Beyond Compliance: Cyber Threats and Healthcare
Aug 21, 2019
FireEye and Beazley: Twice the Defense Against Email Threats
Jul 15, 2019
Protection Beyond the Traditional Secure Email Gateway
Mar 14, 2019
Expertise On Demand with a Click of a Button
Mar 12, 2019
Tracking a Cyber Crime Group: FIN7 at a Glance
Aug 15, 2018
Staying Ahead of a Changing Email Threat Landscape
Jul 16, 2018
Busting the Myths of Vulnerability Management
May 16, 2018
M-Trends 2018: Tales from the Trenches
May 09, 2018
The Future is Bright for FireEye Email Security
Apr 24, 2018
Cyber Threats and the Manufacturing Industry
Jan 08, 2018
Looking Ahead at 2018 w/ FireEye CTO for Cloud Martin Holste
Dec 04, 2017
Looking Ahead at 2018 with FireEye CSO Steve Booth
Nov 29, 2017
Focusing on the Analyst with Helix
Nov 01, 2017
Cyber Threats and The Utilities Sector
Oct 10, 2017
FireEye Govt Email Threat Prevention Receives FedRAMP
Jul 17, 2017
One Year In Review with Kevin Mandia
Jun 15, 2017
Threat Intelligence in the Current Threat Landscape
Apr 05, 2017
The State of Security in the Healthcare Sector
Mar 14, 2017
Critical Infrastructure and ICS Cybersecurity Issues
Oct 12, 2016
Detection Innovations
Sep 16, 2016
Orchestration: Combatting Broken Security Processes
Sep 01, 2016
An Interview with Michael Sikorski, Director, FLARE
Aug 11, 2016
Going Beyond Detect, Respond, Contain
Aug 09, 2016
How 'Not Fitting In’ Changed The Future For Kevin Mandia
Aug 08, 2016
Approaching Security Operational Readiness with Red Team Ops
Aug 02, 2016
People Behind FaaS: Chris Tannery
Jul 08, 2016
People Behind FaaS: Nicole Oppenheim
Jul 08, 2016
People Behind FaaS: Pete Smith
Jul 08, 2016
Findings From The EMEA Regional Advanced Threat Report
May 25, 2016
Security Drills
Apr 27, 2016
John Watters - Discussing Cyber Security and Upcoming Cyber
Apr 05, 2016
Red, Blue and Intuit
Mar 30, 2016
Dropbox and Cloud Security
Mar 24, 2016
Is Your Board On Board with Cyber Strategies?
Mar 22, 2016
Invotas and iSIGHT Partners Acquisition
Mar 17, 2016
Eye on Security: M-Trends 2016
Mar 08, 2016
FireEye Podcast: Signal to Noise
Feb 17, 2016
Eye on Security: Good Enough Is Not Good Enough
Jan 27, 2016
Eye on Security: FireEye Solutions Integration
Jan 12, 2016