Changing Trends in Cyber Risk w/ Kevin Mandia

September 22, 2020
Harris Allgeier

Episode 13:

Changing Trends in Cyber Risk w/ Kevin Mandia

COVID has affected every business differently, forcing many to make increasingly difficult decisions, many of which have unintended consequences for cybersecurity. 

On this episode of What Lies Beneath, we talk to Kevin Mandia, the CEO of FireEye. Prior to assuming his current role, Kevin served as FireEye’s President, and before that was the founder and CEO of his own company Mandiant, which rose to national prominence in 2013 after exposing Chinese cyber-espionage. We talk about:

  • The top 5 Risks in Cyber right now
  • Unique challenges presented by data Storage 
  • How achievable is the Zero Trust Supply Chain?
  • Check out our October 1 Digital Summit here for more from Kevin, along with Sen. Mark Warner (D-VA), Dr. Richard Haass, Jim Routh (MassMutual), and others!

Listen & Subscribe!

To learn more, check out the podcast above, or on Stitcher, Apple Podcasts, Google Play, Spotify, or wherever you listen to podcasts. If you like what you hear, please rate and review the show, or share it with a friend! New episodes air every other Tuesday.

To learn more about how Interos can help you with Section 889 Part B compliance, visit Interos.ai.

 

Guest Bio

 

Kevin Mandia: The CEO of FireEye. Prior to assuming his current role, Kevin served as FireEye’s President, and before that was the founder and CEO of his own company Mandiant, which rose to national prominence in 2013 after exposing Chinese cyber-espionage. A veteran of U.S. Air Force, Kevin served as a Computer Security Officer in the Pentagon’s 7th Communications Group and was a special agent in the Air Force Office of Special Investigation.

 

View next

Ensure Operational Resilience

Request Contact

Build operational resiliency into your extended supply chain:

  • 889 compliance – ensure market access
  • Data sharing with 3rd parties and beyond – protect reputation
  • Concentration risk – ensure business continuity
  • Cyber breaches – assess potential exposure
  • Unethical labor – avoid reputational harm
  • On-boarding and monitoring suppliers – save time and money