FireEye + Mandiant - 4 Key Steps to Continuous Threat Protection

Presented by

Manish Gupta, SVP of Products, FireEye; Dave Merkel, CTO and VP of Products, Mandiant

About this talk

On January 2, FireEye announced that it had acquired Mandiant, the leading provider of security incident response management solutions, creating a united front against cyber threats. In a live webinar with FireEye and Mandiant executives, learn why traditional security technologies are unable to address today's threat landscape and why complete, continuous threat protection requires real-time detection, contextual threat intelligence, and rapid incident response. Why you should attend: •Learn about the FireEye acquisition of Mandiant. •Understand today's threat landscape, including the damage being caused from new advanced techniques. •Discover how FireEye and Mandiant together stop advanced attacks at the earliest phases of the attack lifecycle.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13397)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more