Mandiant | The cybersecurity experts you need, when you need them
Mandiant & Google Cloud Security
Mandiant | The cybersecurity experts you need, when you need them
0:31
Cybersecurity Conversations with the C-Suite and Board
Mandiant & Google Cloud Security
Cybersecurity Conversations with the C-Suite and Board
36:15
Google SecOps Community Rules: How to Contribute
Mandiant & Google Cloud Security
Google SecOps Community Rules: How to Contribute
5:11
EP06 Duncan Ogilvie - Piano Tuning & Debugging: The Story of x64dbg
Mandiant & Google Cloud Security
EP06 Duncan Ogilvie - Piano Tuning & Debugging: The Story of x64dbg
46:16
What to Watch For in 2025
Mandiant & Google Cloud Security
What to Watch For in 2025
44:32
Signals of Trouble
Mandiant & Google Cloud Security
Signals of Trouble
26:04
TEASER: From Credit Cards to Crypto: The Evolution of Cybercrime
Mandiant & Google Cloud Security
TEASER: From Credit Cards to Crypto: The Evolution of Cybercrime
1:04
EP05 Saumil Shah - From Black Hat to RingZer0: Shaping the World of Reverse Engineering
Mandiant & Google Cloud Security
EP05 Saumil Shah - From Black Hat to RingZer0: Shaping the World of Reverse Engineering
1:06:32
From Credit Cards to Crypto: The Evolution of Cybercrime
Mandiant & Google Cloud Security
From Credit Cards to Crypto: The Evolution of Cybercrime
13:12
Agentic AI in Cybersecurity
Mandiant & Google Cloud Security
Agentic AI in Cybersecurity
26:41
Vertiv cuts threat investigation time in half with Google SecOps
Mandiant & Google Cloud Security
Vertiv cuts threat investigation time in half with Google SecOps
1:52
EP04 Stephen Eckels - A Journey From Game Modding to SolarWinds: How One Gamer Became a Renowned ...
Mandiant & Google Cloud Security
EP04 Stephen Eckels - A Journey From Game Modding to SolarWinds: How One Gamer Became a Renowned ...
1:05:37
How ThreatSpace prepares customers for real-world threats with Google Cloud Security
Mandiant & Google Cloud Security
How ThreatSpace prepares customers for real-world threats with Google Cloud Security
2:46
How Mandiant Managed Defense enhances services with Google Security Operations
Mandiant & Google Cloud Security
How Mandiant Managed Defense enhances services with Google Security Operations
3:01
BPI builds a reliable, scaled security program with Google Cloud Security
Mandiant & Google Cloud Security
BPI builds a reliable, scaled security program with Google Cloud Security
2:58
How UST HealthProof optimizes security operations with CyberProof and Google SecOps
Mandiant & Google Cloud Security
How UST HealthProof optimizes security operations with CyberProof and Google SecOps
2:47
EP03 Ryan Chapman - From Software Cracking to Threat Hunting: A Reverse Engineering Story
Mandiant & Google Cloud Security
EP03 Ryan Chapman - From Software Cracking to Threat Hunting: A Reverse Engineering Story
53:03
Google SecOps: YARA-L Rule Variables
Mandiant & Google Cloud Security
Google SecOps: YARA-L Rule Variables
5:34
Google SecOps: YARA-L Rule Operators & Modifiers
Mandiant & Google Cloud Security
Google SecOps: YARA-L Rule Operators & Modifiers
4:31
Google SecOps: YARA-L Rule Basics
Mandiant & Google Cloud Security
Google SecOps: YARA-L Rule Basics
3:22
Google SecOps: Statistical Functions - Standard Deviation and Variance
Mandiant & Google Cloud Security
Google SecOps: Statistical Functions - Standard Deviation and Variance
5:17
Google SecOps: Statistical Functions - Median
Mandiant & Google Cloud Security
Google SecOps: Statistical Functions - Median
5:07
Google SecOps: Statistical Functions - Mean and Mode
Mandiant & Google Cloud Security
Google SecOps: Statistical Functions - Mean and Mode
5:57
Google SecOps: Functions - strings.base64_decode
Mandiant & Google Cloud Security
Google SecOps: Functions - strings.base64_decode
3:57
Google SecOps: Functions - strings_to_upper / strings_to_lower
Mandiant & Google Cloud Security
Google SecOps: Functions - strings_to_upper / strings_to_lower
5:02
Google SecOps: String Functions - Working with a Substring
Mandiant & Google Cloud Security
Google SecOps: String Functions - Working with a Substring
6:00
Google SecOps: String Function - Length
Mandiant & Google Cloud Security
Google SecOps: String Function - Length
5:13
Google SecOps: String Functions - Counting Substrings
Mandiant & Google Cloud Security
Google SecOps: String Functions - Counting Substrings
6:28
Google SecOps: String Functions - Contains and Starts With
Mandiant & Google Cloud Security
Google SecOps: String Functions - Contains and Starts With
8:23
Google SecOps: Functions - strings.concat
Mandiant & Google Cloud Security
Google SecOps: Functions - strings.concat
7:08
Google SecOps: Functions - strings.coalesce
Mandiant & Google Cloud Security
Google SecOps: Functions - strings.coalesce
5:40
Google SecOps: Statistical Search - More Than a Count
Mandiant & Google Cloud Security
Google SecOps: Statistical Search - More Than a Count
7:09
Google SecOps: Getting Started with Statistical Search
Mandiant & Google Cloud Security
Google SecOps: Getting Started with Statistical Search
6:28
Google SecOps: Building a Single Event Rule - String Match
Mandiant & Google Cloud Security
Google SecOps: Building a Single Event Rule - String Match
4:09
Google SecOps: Building a Single Event Rule Using a Regular Expression
Mandiant & Google Cloud Security
Google SecOps: Building a Single Event Rule Using a Regular Expression
7:01
Google SecOps: Setting a Threshold in Conditions
Mandiant & Google Cloud Security
Google SecOps: Setting a Threshold in Conditions
6:02
Google SecOps: YARA-L Rule Options
Mandiant & Google Cloud Security
Google SecOps: YARA-L Rule Options
3:58
Google SecOps: Rule Editor Navigation
Mandiant & Google Cloud Security
Google SecOps: Rule Editor Navigation
2:54
Google SecOps: Functions: re.replace
Mandiant & Google Cloud Security
Google SecOps: Functions: re.replace
4:28
Google SecOps: Functions: re.regex
Mandiant & Google Cloud Security
Google SecOps: Functions: re.regex
4:31
Google SecOps: Reference List - String
Mandiant & Google Cloud Security
Google SecOps: Reference List - String
5:08
Google SecOps: Reference List - Regex
Mandiant & Google Cloud Security
Google SecOps: Reference List - Regex
5:16
Google SecOps: Reference List - CIDR
Mandiant & Google Cloud Security
Google SecOps: Reference List - CIDR
4:42
Google SecOps: Functions: re.recapture
Mandiant & Google Cloud Security
Google SecOps: Functions: re.recapture
4:21
Google SecOps: Introducing Outcomes in a Single Event Rule
Mandiant & Google Cloud Security
Google SecOps: Introducing Outcomes in a Single Event Rule
5:31
Google SecOps: Outcomes: Risk Score, Conditional Logic & Mathematical Operators
Mandiant & Google Cloud Security
Google SecOps: Outcomes: Risk Score, Conditional Logic & Mathematical Operators
6:42
Google SecOps: Outcomes in Multi Event Rules: Max, Min & Sum
Mandiant & Google Cloud Security
Google SecOps: Outcomes in Multi Event Rules: Max, Min & Sum
5:14
Google SecOps: Outcomes in Multi Event Rules: Counts
Mandiant & Google Cloud Security
Google SecOps: Outcomes in Multi Event Rules: Counts
4:12
Google SecOps: Outcomes in Multi Event Rules: Arrays
Mandiant & Google Cloud Security
Google SecOps: Outcomes in Multi Event Rules: Arrays
4:12
Google SecOps: Functions: network.ip_in_range_cidr
Mandiant & Google Cloud Security
Google SecOps: Functions: network.ip_in_range_cidr
5:54
Google SecOps: Using a Sliding Window in a Multi Event Rule
Mandiant & Google Cloud Security
Google SecOps: Using a Sliding Window in a Multi Event Rule
7:53
Google SecOps: Ordering Events in a Multi Event Rule
Mandiant & Google Cloud Security
Google SecOps: Ordering Events in a Multi Event Rule
6:47
Google SecOps: Creating Multiple Joins and Thresholds in a Multi Event Rule
Mandiant & Google Cloud Security
Google SecOps: Creating Multiple Joins and Thresholds in a Multi Event Rule
6:38
Google SecOps: Building a Multi Event Rule - Joining Events
Mandiant & Google Cloud Security
Google SecOps: Building a Multi Event Rule - Joining Events
5:59
Google SecOps: Time Function: get_timestamp
Mandiant & Google Cloud Security
Google SecOps: Time Function: get_timestamp
6:47
Google SecOps: Time Functions: Converting a Time in a String to a Time Value
Mandiant & Google Cloud Security
Google SecOps: Time Functions: Converting a Time in a String to a Time Value
6:14
Google SecOps: Aggregating Events in Rules
Mandiant & Google Cloud Security
Google SecOps: Aggregating Events in Rules
5:23
The Art of Remediation in Incident Response
Mandiant & Google Cloud Security
The Art of Remediation in Incident Response
41:01
EP02 Victor Manuel Alvarez - Motivation, Community, and the Future with YARA-X: Building the Futu...
Mandiant & Google Cloud Security
EP02 Victor Manuel Alvarez - Motivation, Community, and the Future with YARA-X: Building the Futu...
31:52
CISO Community Talks: Cybersecurity Forecast 2025
Mandiant & Google Cloud Security
CISO Community Talks: Cybersecurity Forecast 2025
2:26
Cybersecurity Forecast 2025 with Phil Venables
Mandiant & Google Cloud Security
Cybersecurity Forecast 2025 with Phil Venables
2:10
Cybersecurity Forecast 2025 with Sunil Potti
Mandiant & Google Cloud Security
Cybersecurity Forecast 2025 with Sunil Potti
1:42
Cybersecurity Forecast 2025 with Sandra Joyce
Mandiant & Google Cloud Security
Cybersecurity Forecast 2025 with Sandra Joyce
2:47
Cybersecurity Forecast 2025 with Charles Carmakal
Mandiant & Google Cloud Security
Cybersecurity Forecast 2025 with Charles Carmakal
2:19
EP01 Nick Harbour - Early Days of Incident Response, Mandiant History and FLARE-ON
Mandiant & Google Cloud Security
EP01 Nick Harbour - Early Days of Incident Response, Mandiant History and FLARE-ON
1:04:54
How to Run an Effective Tabletop Exercise
Mandiant & Google Cloud Security
How to Run an Effective Tabletop Exercise
29:15
Using LLMs to Analyze Windows Binaries
Mandiant & Google Cloud Security
Using LLMs to Analyze Windows Binaries
36:41
How Threat Actors Bypass Multi-Factor Authentication
Mandiant & Google Cloud Security
How Threat Actors Bypass Multi-Factor Authentication
27:21
Mandiant Academy — Election Security On Demand
Mandiant & Google Cloud Security
Mandiant Academy — Election Security On Demand
3:52
Mandiant Academy — Incident Response in Google Cloud Course
Mandiant & Google Cloud Security
Mandiant Academy — Incident Response in Google Cloud Course
1:44
Mandiant Academy — DFIR Bootcamp
Mandiant & Google Cloud Security
Mandiant Academy — DFIR Bootcamp
2:41
Mandiant Academy — Election Cybersecurity Seminar
Mandiant & Google Cloud Security
Mandiant Academy — Election Cybersecurity Seminar
1:11
TAG's Work Tracking Commercial Surveillance Vendors
Mandiant & Google Cloud Security
TAG's Work Tracking Commercial Surveillance Vendors
23:59
Mandiant Academy — Cyber Intelligence for Critical Infrastructure
Mandiant & Google Cloud Security
Mandiant Academy — Cyber Intelligence for Critical Infrastructure
1:48
Mandiant Red Team Series, Part 6: Key Reasons for Red Teaming
Mandiant & Google Cloud Security
Mandiant Red Team Series, Part 6: Key Reasons for Red Teaming
2:48
Mandiant Red Team Series, Part 5: Red Team vs. Purple Team
Mandiant & Google Cloud Security
Mandiant Red Team Series, Part 5: Red Team vs. Purple Team
1:09
Mandiant Red Team Series, Part 4: Service Differentiators
Mandiant & Google Cloud Security
Mandiant Red Team Series, Part 4: Service Differentiators
1:08
Mandiant Red Team Series, Part 3: Today's Top 3 Findings
Mandiant & Google Cloud Security
Mandiant Red Team Series, Part 3: Today's Top 3 Findings
1:02
Mandiant Red Team Series, Part 2: An Executive Perspective
Mandiant & Google Cloud Security
Mandiant Red Team Series, Part 2: An Executive Perspective
3:40
Mandiant Red Team Series, Part 1: The Need for Red Teaming
Mandiant & Google Cloud Security
Mandiant Red Team Series, Part 1: The Need for Red Teaming
2:08
What Iranian Threat Actors Have Been Up To This Year
Mandiant & Google Cloud Security
What Iranian Threat Actors Have Been Up To This Year
36:14
Mandiant's Approach to Securely Using AI Solutions
Mandiant & Google Cloud Security
Mandiant's Approach to Securely Using AI Solutions
32:01
Lessons Learned from Responding to Cloud Compromises
Mandiant & Google Cloud Security
Lessons Learned from Responding to Cloud Compromises
30:17
The ORB Networks
Mandiant & Google Cloud Security
The ORB Networks
29:55
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances
Mandiant & Google Cloud Security
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances
27:48
Google Threat Intelligence Demo
Mandiant & Google Cloud Security
Google Threat Intelligence Demo
4:51
Optimized Vulnerability Management with Google Threat Intelligence
Mandiant & Google Cloud Security
Optimized Vulnerability Management with Google Threat Intelligence
2:26
Uncover External Threats with Google Threat Intelligence
Mandiant & Google Cloud Security
Uncover External Threats with Google Threat Intelligence
2:34
Threat Intelligence and Advanced Threat Hunting with Google Threat Intelligence
Mandiant & Google Cloud Security
Threat Intelligence and Advanced Threat Hunting with Google Threat Intelligence
3:45
Empower Incident Response and Forensic Capabilities with Google Threat Intelligence
Mandiant & Google Cloud Security
Empower Incident Response and Forensic Capabilities with Google Threat Intelligence
2:32
Automate IOC Enrichment and Alert Prioritization with Google Threat Intelligence
Mandiant & Google Cloud Security
Automate IOC Enrichment and Alert Prioritization with Google Threat Intelligence
2:05
Introducing Google Threat Intelligence
Mandiant & Google Cloud Security
Introducing Google Threat Intelligence
0:34
How to Maximize Vulnerability Remediation Efforts Through the Power of Threat Intelligence
Mandiant & Google Cloud Security
How to Maximize Vulnerability Remediation Efforts Through the Power of Threat Intelligence
21:21
Beyond Simulation: Empowering Cyber Defenders with Mandiant & SimSpace
Mandiant & Google Cloud Security
Beyond Simulation: Empowering Cyber Defenders with Mandiant & SimSpace
15:10
M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher
Mandiant & Google Cloud Security
M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher
25:54
Assessing the State of Multifaceted Extortion Operations
Mandiant & Google Cloud Security
Assessing the State of Multifaceted Extortion Operations
40:55
Hunting for "Living off the Land" Activity
Mandiant & Google Cloud Security
Hunting for "Living off the Land" Activity
42:33
Director of NSA's Cybersecurity Collaboration Center on Trends in 2024
Mandiant & Google Cloud Security
Director of NSA's Cybersecurity Collaboration Center on Trends in 2024
25:49
Board Conversation:  The Role of AI in Cybersecurity
Mandiant & Google Cloud Security
Board Conversation: The Role of AI in Cybersecurity
1:14
Mandiant Digital Threat Monitoring  - Compromised Credential Overview
Mandiant & Google Cloud Security
Mandiant Digital Threat Monitoring - Compromised Credential Overview
7:28