Business Continuity Management / Disaster Recovery , Cybercrime , Events

The Switzerland of Security: Why Being Independent Matters

CTO Marshall Heilman on How Mandiant Gets by With a Little Help From Its Friends
Marshall Heilman, executive vice president and CTO, Mandiant

Mandiant had the opportunity to become truly vendor-agnostic once the company sold its FireEye products business, since renamed Trellix, to Symphony Technology Group in October, according to executive vice president and chief technology officer Marshall Heilman. Heilman says Mandiant has therefore pursued deep integrations with all the leading vendors in the endpoint security space.

See Also: 2024 Threat Hunting Report: Insights to Outsmart Modern Adversaries

In a video interview with Information Security Media Group at RSA Conference 2022, Heilman discusses:

  • Why partnerships are central to Mandiant's strategy;
  • The latest integration with CrowdStrike and SentinelOne;
  • What getting bought by Google means for the company.

Heilman has more than 20 years of experience in cybersecurity, holding executive leadership and technical roles. He has worked at Mandiant for the last 15 years. Heilman previously had responsibility for all managed detection and response services and for ensuring front-line threat knowledge was integrated throughout FireEye/Mandiant Products and Services. Before that, he served as vice president and consulting CTO with global responsibility for incident response and red/blue team engagements. Prior to joining Mandiant in 2006, Heilman was a U.S. Marine, specializing in information security.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.