learnings from the frontlines


Spending on cyber security has increased rapidly over the years, with many organizations deploying on average between 30-701 tools, but how do you know whether your investments are working and can you prove it?

Increasingly, CISOs are being asked to rationalize spending and demonstrate operational competence to the C-suite and board. Without a reliable security validation program, providing empirical proof of the effectiveness of your people, processes and technology against the latest attacks is impossible.

Having a validation strategy enables key decision makers to not only see the effectiveness of the technology but also how staff respond to a real live attack. Real attacks provide proof of the performance of your controls when an actual attack takes place, giving key decision makers the evidence they need to demonstrate to the board what is working and what needs improving. 

Every business has different priorities and different approaches to security. By using an intelligence-driven approach to identify the attackers targeting your industry and geography, you can plan your strategy to identify the effectiveness of your security controls against the known TTPs used to attack others in your sector. Additionally, companies can use this intelligence to map the techniques attackers use against the MITRE ATT&CK framework.  

In our latest learning series, we will discuss the importance of security validation and how an intelligence-led approach supports teams to continually assess, optimise, improve and rationalise their security stack.

Watch our FREE online webinar series as we uncover how a robust validation strategy helps build confidence at board level and beyond.  

[1] Cybersecurity Ventures (June 2019) Cybersecurity Market

Threat Intelligence

The Series

Step 1

Remove assumptions.
Prove security every day.

Why security validation is critical in maintaining or improving your brand reputation and market position.

The need to validate security is clear: many organizations are not as secure as they think they are, attacks are increasing in sophistication, budgets are under scrutiny and adversaries are rapidly morphing their tactics. To outmaneuver highly motivated cyber criminals, organizations need to safely test their security programs with real attacks that they are likely to be facing daily to expose and remediate gaps in their defenses.

Watch this panel to learn more about how Intelligence-driven Security Validation programs can effectively test and adapt to an ever-changing threat landscape.

Mike Batten – EMEA Vice President, Sales Engineering, FireEye
Gregg Gerber – EMEA Vice President, Global Solution Specialists FireEye Mandiant
David Grout – EMEA CTO, FireEye

Step 2

Security Validation in Action.

Real Life Use Cases from Non-Technical to Technical.

By operationalizing Mandiant’s award-winning threat Intelligence and security validation platform, organizations gain the evidence they need to prove whether their existing investments are protecting their environments.

In this session, Mandiant’s EMEA subject matter expert Amr Baseem will reveal how intelligence-led security validation is delivering positive business outcomes and how our customers are using this strategy to secure and develop their security programs.

Amr Baseem – Consulting Systems Engineer, FireEye
David Grout – EMEA CTO, FireEye

Step 3

The C-Suite Roundtable.

How to prove the return on security investments

Companies today need a strong security posture and must be able to demonstrate its impact on the organization’s financial stability. CFOs and business leaders are looking to CIOs and CISOs to provide customers and key stakeholders with the confidence they need in the organization’s ability to reduce risk, improve its overall security posture and protect its assets. 

Watch our session where we will be discussing business outcomes that customers are seeing from this strategy.

David Grout – EMEA CTO, FireEye
Jack Charlton – EMEA Technical Account Manager, Mandiant Security Validation