148 episodes

The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: Listen to Kevin Bordlemay each month for this series focusing on thoughts, ideas, and initiatives for narrowing the skills gap in cyber security.

The Defender's Advantage Podcast Mandiant

    • Technology
    • 4.7 • 30 Ratings

The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: Listen to Kevin Bordlemay each month for this series focusing on thoughts, ideas, and initiatives for narrowing the skills gap in cyber security.

    Director of NSA's Cybersecurity Collaboration Center on Trends in 2024

    Director of NSA's Cybersecurity Collaboration Center on Trends in 2024

    Morgan Adamski, Director of the NSA's Cybersecurity Collaboration Center (CCC) joins host Luke McNamara to discuss the threat posed by Volt Typhoon and other threat actors utilizing living off the land (LotL) techniques, zero-day exploitation trends, how the CCC works with private sector organizations,  and more. 

    • 25 min
    The North Korean IT Workers

    The North Korean IT Workers

    Principal Analyst Michael Barnhart joins host Luke McNamara to discuss Mandiant's research into the threat posed by the Democratic People's Republic of Korea's (DPRK) usage of IT workers to gain access to enterprises. 

    For more on Mandiant's analysis of North Korea's cyber capabilities, please see: https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023

    • 34 min
    Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO

    Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO

    Taylor Lehmann (Director, Google Cloud Office of the CISO) and Bill Reid (Security Architect, Google Cloud Office of the CISO) join host Luke McNamara to discuss their takeaways from the last year of threat activity witnessed by enterprises within healthcare and life sciences. They discuss applying threat intelligence to third-party risk management, threat modeling, and more. 

    For more on the work of Google Cloud's Office of the CISO: https://cloud.google.com/solutions/security/board-of-directors?hl=en#additional-thought-leadership-resources

    • 44 min
    Is The CTI Lifecycle Due For An Update?

    Is The CTI Lifecycle Due For An Update?

    Mandiant Intelligence Advisor Renze Jongman joins host Luke McNamara to discuss his  blog on the CTI Process Hyperloop and applying threat intelligence to the needs of the security organization and larger enterprise. 

    For more on this topic, please see: https://www.mandiant.com/resources/blog/cti-process-hyperloop

    • 28 min
    Threat Trends: Hacktivists' Continued Use of DDoS

    Threat Trends: Hacktivists' Continued Use of DDoS

    For our first episode of 2024, host Luke McNamara is joined by Mandiant Senior Technical Director Jose Nazario and Principal Analysts Alden Wahlstrom and Josh Palatucci, to discuss the hacktivist DDoS activity they tracked over the last year. 

    • 44 min
    Threat Trends: Tales from the 2023 Trenches

    Threat Trends: Tales from the 2023 Trenches

    Doug Bienstock and Josh Madelay, Regional Leads for Mandiant Consulting, join host Luke McNamara to walk through some of the trends they have witnessed responding to breaches in 2023.  Josh and Doug cover what is happening with business email compromise (BEC), common initial infection vectors, social engineering tactics, and more. 

    • 37 min

Customer Reviews

4.7 out of 5
30 Ratings

30 Ratings

ASobering ,

🔥💪

Relevant and timely information delivered in an easy to consume format! Thank you to the Mandiant team for putting together such a helpful and valuable resource!

KyleTromblee ,

Audio quality needs improvement

The episodes are hit or miss, as some of them sound like they were recorded with a potato.

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
No Priors: Artificial Intelligence | Machine Learning | Technology | Startups
Conviction | Pod People
TED Radio Hour
NPR
Acquired
Ben Gilbert and David Rosenthal

You Might Also Like

CyberWire Daily
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Malicious Life
Malicious Life
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis
Click Here
Recorded Future News
Smashing Security
Graham Cluley & Carole Theriault