
Thoughtful Tuesdays
A new webinar, every Tuesday at 10:00AM GMT
#ThoughtfulTuesdays

Industry-Leading Cyber Security Insights Every Tuesday
The Mandiant Threat Intelligence Curriculum is a 4-step learning path, delivered entirely online, and dedicated to those organisations willing to build and/or improve their CTI skills. Our Mandiant Threat Intelligence experts will present an in-depth explanation of what it means to be intelligence-led, how organisations should seek to increase intelligence maturity and capability, and how to get started on this journey.
Whether you’re just starting your threat intelligence journey or have a dedicated intelligence team, the curriculum will equip you with forward-looking, high fidelity, adversary-focused intelligence and actionable advice.
Register for the sessions that best fit your needs!
January 12th - 10:00 am GMT
Improve Security Posture with MITRE ATT&CK Framework and Threat Intelligence
This session explores the benefits of tracking adversary TTPs during day-to-day hunt and incident response operations, and shows how to use the MITRE ATT&CK framework to align organizational cyber components over the long term. It also describes how you can use the framework to operationalize tactical intelligence and prioritize threat mitigation, as well as how to use intelligence to drive strategic decisions about security investments.
On Demand
Behind the Cyber Battlefield with a Mandiant Threat Intelligence Analyst
Cyber threat intelligence (CTI), IOCs, reports and feeds all contribute to stronger cyber visibility. But CTI holds a unique position and can be consumed operationally to enhance your security posture. Join us as a Mandiant Cyber Threat Analyst discusses her experiences from the cyber frontlines. She introduces real life examples of analyst personalities, their day-to-day activities and the value they add to customer interactions.
ON DEMAND
Operationalise Threat Intelligence with Mandiant Security Validation
This session reveals the actual state of cyber security based on real world data around cyber security controls across enterprise networks, from email, endpoint, network and the cloud. We'll also be taking the time to discuss and demonstrate how effective security validation can validate, consolidate, recoup and maximise the value from the existing security investments made by organisations.
ON DEMAND
The Outcome of Well-Used Intelligence
Cyber Threat Intelligence is a vital component in understanding the current and future threat landscape which faces organisations of all sizes, the world over. But the real question remains, how can organisations make better use of it? What are some of the common pitfalls that many commonly fall into and how can organisations expand usage across the entire organisation?
ON DEMAND
To Remediate or not to Remediate? That’s THE Question
The single most heated conversation during every incident response engagement has always centred around remediation. When to remediate, what to remediate, how to remediate, should we remediate? Join our upcoming webinar where we’ll analyse the topic from different angles to see why there’s no easy answer to this question.
ON DEMAND
Threat Intelligence Drives Effective Vulnerability Management
Threat Intelligence is an invaluable resource for organisations, as it provides relevant, contextual insight that can be used to inform their cyber-security decisions and investments. Join our upcoming webinar where we’ll be sharing how Mandiant Threat Intelligence can be utilised to drive effective vulnerability management.
ON DEMAND
A Red Teaming Case Study
Red Team assessments help organisations evaluate their readiness to defend against advanced attacks. They identify relevant weaknesses in current detection and response procedures that advanced threat actors routinely exploit to avoid detection, break in and complete their attack objectives. Join our upcoming webinar and understand the reality of Red Teaming with a real-world case study.
ON DEMAND
Threat Intel for Computer Network Defence, Focus on Iran
Operationalising Cyber Threat Intelligence (CTI) helps mitigate risk by focusing people, processes, and technology on the threat activity that matters. Join our upcoming webinar where we explore how CTI allows organisations to take a more proactive, structured, and holistic approach to security that reduces dwell time and shortens the time frame from identification to fix.
ON DEMAND
Managing Cyber Security Challenges in our New Remote-Working World
The ongoing COVID-19 pandemic has seen organisations across the globe impacted in a variety of ways, with remote working becoming increasingly common reality for many employees. While this situation is ongoing, it’s important to consider not only the present impact but also what the future might look like and how this might change an organisation’s security strategy.
ON DEMAND
Enhance your Security Posture with Managed Defence
A modern challenge for organisations the world over is finding, hiring and training cyber security experts capable of managing their cyber security 24 hours a day, seven days a week. Join our upcoming webinar where you’ll have the opportunity to learn how your organisation can effectively remedy this challenge through FireEye Managed Defense.
ON DEMAND
Ransomware Trends with a Focus on MAZE
Ransomware threat actors are upping their game along with their ransom demands, which are climbing into millions of dollars. Large organisations with significant security controls in place are still falling prey to the attackers' tactics. This session examines how ransomware has evolved, and what you can do about it.
ON DEMAND
Modern Cyber Risk Management for Better Decision Making
Most C-suite leaders believe their investment decisions in security risk management are not keeping up with the new and heightened levels of cyber risks. This is often due to their use of the decade old, top-down approach in leveraging risk models, which leaves gaps between attacker and defender behaviours. Register now for our webinar to learn more.
ON DEMAND
Intelligence Driven Security Validation
A recent SANS study showed that while organisations used threat intelligence to hypothesise where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem as organisations struggle to justify the high cost of their defences. Join our webinar and learn how Mandiant Threat Intelligence can provide the information that you need.
ON DEMAND
Cloud Threats from the Frontlines
For the last several years, organisations around the world have been moving applications and services to the cloud at an increasing pace. Despite this investment, many organisations fail to fully understand the security controls they have at their disposal. Join our webinar where we’ll share some perspectives around these challenges from the frontlines of cyber-security.
ON DEMAND
iboss Cloud and FireEye - Cloud Network Security as a Service
The network perimeter has eroded, making traditional network security appliances ineffective at securing users and devices that are no longer bound by network boundaries. Join us as we explore how iboss provides its users with constant connection to the iboss cloud, regardless of device or location to ensure all internet traffic is secured against common threats.
ON DEMAND
‘They Come in the Night’ Emerging Ransomware Threat Trends
Ransomware is an unfortunately common, yet potentially devastating threat to organisations globally. With this looming threat a constant concern for many business’ security leaders. Join our upcoming webinar to understand what these threats are and how Mandiant can arm you with the protection and intelligence you need.
ON DEMAND
2020 Mandiant Security Effectiveness Report Findings
The ability to understand the effectiveness of your cyber-security solution before an attack is invaluable. Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.
ON DEMAND
Breach Response Series - Part 3: Reduce the impact of security incidents
The ability to respond to cyber attacks remains the greatest strength. This webinar discusses ways you can evaluate your organisation’s ability to respond effectively to advanced attackers and business impacting malware, such as ransomware.
ON DEMAND
Breach Response Series - Part 2: TIBER-EU - Increasing Cyber Resilience
This webinar goes through some of the ways to test your defences and help improve your security posture by conducting TIBER-EU tests that mimic the tactics, techniques and procedures of real-life attackers, reveal your organisation's strengths and weaknesses and enable you to reach a higher level of cyber maturity.
ON DEMAND
Breach Response Series - Part 1: Anatomy of a cyber attack
In this session hear from a leading consultant who constantly interacts with customers dealing with issues from technical response to crisis management. FireEye investigates some of the most complex breaches: learn from a front-line specialist about both existing and emerging threat actors and their rapidly changing tactics, techniques and procedures.
ON DEMAND
Virtual Cyber Attack Simulation
Did you know that 90% of successful cyber-attacks rely on human error by any one member of staff? It is common to assume that cyber security is the sole responsibility of your IT or security team. However, the reality is that ALL members of an organisation have a responsibility to maintain good cyber-discipline. Our Virtual Cyber Attack simulation aims to simulate and challenge your response to a cyber incident.
ON DEMAND
How to maintain cyber hygiene?
In today's ever-changing threat landscape, it is more important than ever to use a cyber hygiene routine to help prevent hackers, intelligent malware, and advanced viruses from accessing and corrupting your company's data. How do you validate that your cyber strategy is as watertight as it could be? This webinar looks to answer these questions, and more.
ON DEMAND
Measure, improve and optimize your cybersecurity with Mandiant Security Validation
FireEye has developed a platform that allows you to accurately assess a company's security posture. With Mandiant Validation Solution, FireEye expands its capabilities by helping its clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.
ON DEMAND
Security Effectiveness Strategies
To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions. Mandiant Security Validation looks to provide comprehensive answers to these essential questions through industry-leading threat intelligence.
ON DEMAND
How do you gain cyber assurance?
Most organisations have invested heavily in their cyber-security, in order to defend against any would be attackers. However, how confident can you be in this defence without it being put to the test by a real attack? This webinar will discuss how an organisation can gain assurance that it is prepared to defend against and respond to a cyber incident.
ON DEMAND
Top 5 Cloud Security Myths Debunked
Through 2022, at least 95% of cloud security failures are predicted to be the customer’s fault (Gartner). But change how you think about cloud security, and you can be a success story. Our webinar helps to debunk several common myths that jeopardise the fast, secure, migration to the cloud that your organisation expects.
ON DEMAND
Defensive Security Techniques You Can Use Now
Many organisations struggle with how to prioritise hardening and protective security actions. Based on 15+ years of frontline incident response experience, FireEye Mandiant consultants have identified a number of technical and programmatic defensive trends and best practices to help you prepare for incidents and mitigate their impact. Watch our webinar to learn more.
ON DEMAND
More Cloud, More Problems?
As secure data moves to the cloud, so too do the security threats. Credential abuse, cloud misconfigurations and lack of central visibility leave your infrastructure vulnerable to breaches. Be sure to take the time to watch our webinar and ensure that your organisation’s cloud strategy is less of a problem than you might think.
ON DEMAND
How Managed Defense can help customers by identifying the most impactful threats
With the ever-changing nature of the cyber-security environment, Security Operation Centres (SOCs) are constantly under pressure to ensure they remain aware of and prepared to defend their organisation and its data against impactful threats. But what if your SOC can't keep up? Our webinar discusses how Mandiant Managed Defense can provide a solution to this common problem.
ON DEMAND
Protect All Files from Malware with a Content Firewall - FireEye/Accellion Integration
Security-first organisations deploy innovative technologies like LDAP/AD, SSO, ATP, DLP and others to protect customer data and other intellectual property from hackers. Despite these efforts, hackers still get in through vulnerable third parties like partners, suppliers, and customers. As a result, defending sensitive information requires not just a network firewall but a content firewall. Watch our webinar to learn more.