Skip to content
Explore All

Applying Mandiant's M-Trends Insights to Modern Defenses


Course
Enroll

Josh Iroko shares Mandiant's latest threat intelligence on exploit vectors, advanced persistent threat techniques and cloud misconfigurations requiring targeted monitoring approaches.

Modern enterprises face an accelerating threat landscape where attackers exploit vulnerabilities with increasing sophistication and speed. Organizations worldwide grapple with inherited vulnerabilities, asset management challenges, and the convergence of IT and operational technology environments that expand attack surfaces. Critical infrastructure entities must adopt an "assume breach" mindset as nation-state actors continuously target these high-value environments for espionage and disruption.

In this session, Josh Iroko, managing consultant, Mandiant, Google Cloud, will share insights on:

  • How exploits remain the primary initial infection vector with stolen credentials comprising 16% of incidents;
  • How advanced persistent threat groups utilize 71% of MITRE ATT&CK framework techniques during operations;
  • Cloud misconfigurations and insider threats create significant vulnerabilities requiring targeted monitoring approaches.
 

Here is the course outline:

Lessons From the Trenches: Applying Mandiant's M-Trends Insights to Modern Defenses

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate