John Atrache Senior Incident Response Consultant, FireEye Mandiant
John Atrache is a Cybersecurity Incident Responder and Strategic Advisor at FireEye Mandiant. John works closely with organizations to help them respond to major data breaches, as well as proactively prepare them in effectively responding to day-to-day security incidents. He has managed and delivered cybersecurity assessments, executive and technical tabletop exercises, cyber defense center transformational work, and enterprise incident response training for government agencies and organizations across several industries and regions.
Lovell Smith Senior Incident Response Consultant, FireEye Mandiant
Lovell Smith is a Senior Incident Response Consultant in Mandiant’s Canadian region. As part of the Incident Response team, Lovell provides emergency services to clients when a security breach occurs. He also performs threat hunting and compromise assessments for clients to determine if they may be exposed to possible intrusions or detect breaches in their early stages before they require a more urgent response.
Jess Hays Technical Instructor, FireEye Mandiant
Jess Hays is a Technical Instructor at Mandiant, a FireEye company. With 12 years of experience in the Cyber Security field, she has worked in a variety of capacities including Incident Response and Handling, but is currently specializing in Cyber Security Awareness through proactive measures and Threat Intelligence. During her career, she has worked with multiple Fortune 500 and 1000 companies, along with various U.S. Government Intelligence agencies.
Martin Tremblay Incident Response Manager, FireEye Mandiant
Mr. Tremblay, who has over 20 years of information technology experience, is one of the leaders of Mandiant’s Incident Response practice in Canada. He helps organizations prepare, detect and respond to security incidents and has successfully led multiple high-profile security investigations across different industries. Mr. Tremblay is also very active in offensive cyber security. He leads Red Team exercises designed to simulate realistic cyberattacks in a controlled manner in order to evaluate the defense capabilities of organizations.