150 episodes

The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: Listen to Kevin Bordlemay each month for this series focusing on thoughts, ideas, and initiatives for narrowing the skills gap in cyber security.

The Defender's Advantage Podcast Mandiant

    • Technology
    • 4.7 • 30 Ratings

The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: Listen to Kevin Bordlemay each month for this series focusing on thoughts, ideas, and initiatives for narrowing the skills gap in cyber security.

    Assessing the State of Multifaceted Extortion Operations

    Assessing the State of Multifaceted Extortion Operations

    Kimberly Goody, Head of Mandiant's Cyber Crime Analysis team and Jeremy Kennelly, Lead Analyst of the same team join host Luke McNamara to breakdown the current state of ransomware and data theft extortion. Kimberly and Jeremy describe how 2023 differed from the activity they witnessed the year prior, and how changes in the makeup of various groups have played out in the threat landscape, why certain sectors see more targeting, and more.

    • 40 min
    Hunting for "Living off the Land" Activity

    Hunting for "Living off the Land" Activity

    Host Luke McNamara is joined by Mandiant consultants Shanmukhanand Naikwade and Dan Nutting to discuss hunting for threat actors utilizing "living off the land" (LotL) techniques. They discuss how LotL techniques differ from traditional malware based attacks, ways to differentiate between normal and malicious use of utilities, Volt Typhoon, and more. 

    • 42 min
    Director of NSA's Cybersecurity Collaboration Center on Trends in 2024

    Director of NSA's Cybersecurity Collaboration Center on Trends in 2024

    Morgan Adamski, Director of the NSA's Cybersecurity Collaboration Center (CCC) joins host Luke McNamara to discuss the threat posed by Volt Typhoon and other threat actors utilizing living off the land (LotL) techniques, zero-day exploitation trends, how the CCC works with private sector organizations,  and more. 

    • 25 min
    The North Korean IT Workers

    The North Korean IT Workers

    Principal Analyst Michael Barnhart joins host Luke McNamara to discuss Mandiant's research into the threat posed by the Democratic People's Republic of Korea's (DPRK) usage of IT workers to gain access to enterprises. 

    For more on Mandiant's analysis of North Korea's cyber capabilities, please see: https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023

    • 34 min
    Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO

    Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO

    Taylor Lehmann (Director, Google Cloud Office of the CISO) and Bill Reid (Security Architect, Google Cloud Office of the CISO) join host Luke McNamara to discuss their takeaways from the last year of threat activity witnessed by enterprises within healthcare and life sciences. They discuss applying threat intelligence to third-party risk management, threat modeling, and more. 

    For more on the work of Google Cloud's Office of the CISO: https://cloud.google.com/solutions/security/board-of-directors?hl=en#additional-thought-leadership-resources

    • 44 min
    Is The CTI Lifecycle Due For An Update?

    Is The CTI Lifecycle Due For An Update?

    Mandiant Intelligence Advisor Renze Jongman joins host Luke McNamara to discuss his  blog on the CTI Process Hyperloop and applying threat intelligence to the needs of the security organization and larger enterprise. 

    For more on this topic, please see: https://www.mandiant.com/resources/blog/cti-process-hyperloop

    • 28 min

Customer Reviews

4.7 out of 5
30 Ratings

30 Ratings

ASobering ,

🔥💪

Relevant and timely information delivered in an easy to consume format! Thank you to the Mandiant team for putting together such a helpful and valuable resource!

KyleTromblee ,

Audio quality needs improvement

The episodes are hit or miss, as some of them sound like they were recorded with a potato.

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Deep Questions with Cal Newport
Cal Newport
In Her Ellement
Boston Consulting Group BCG
Hard Fork
The New York Times

You Might Also Like

Risky Business
Patrick Gray
Risky Business News
risky.biz
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
CyberWire Daily
N2K Networks
Click Here
Recorded Future News
Malicious Life
Malicious Life