Hi [[ session.user.profile.firstName ]]

Arctic Wolf Networks

  • Date
  • Rating
  • Views
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: May 8 2019 39 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf Networks Recorded: Apr 25 2019 48 mins
    At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.

    These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.

    The webinar covers:

    •6 common myths about cybersecurity and cyber risk
    •The threats these myths pose to your business
    •Cybersecurity facts you can use to protect yourself

    Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!

    And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.
  • The SOC-as-a-Service Prescription: Healthcare Cybersecurity & Compliance
    The SOC-as-a-Service Prescription: Healthcare Cybersecurity & Compliance
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Apr 17 2019 37 mins
    Monitoring and detecting threats in healthcare faces a number of challenges: sophisticated cyberthreats, HIPAA compliance requirements, budget constraints, and a cybersecurity talent shortage for staff needed to monitor and respond to events. Previous approaches to monitoring have been ineffective and expensive. Managed detection and response (MDR) services provide a way out of this cybersecurity conundrum. This webinar explains how healthcare organizations can improve cybersecurity and compliance with MDR/Security Operations Center (SOC)-as-a-service.

    Join us and discover:
    • The ways a managed detection and response (MDR) service differs from managed security services (MSS).
    • How MDR/SOC-as-a-service provides big savings compared to in-house security info and event management (SIEM) tools.
    • How MDR/SOC-as-a-service helps to fulfill HIPAA compliance requirements.
    • The ways an MDR/SOC-as-a-service improves healthcare security posture and alleviates the cybersecurity talent shortage.

    Save your seat now!
  • Take Control of Vulnerabilities and Threats with Intuitive Risk Analytics
    Take Control of Vulnerabilities and Threats with Intuitive Risk Analytics
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Apr 16 2019 44 mins
    Vulnerabilities, threats, and risks are commonly mixed up security terms. Several cybersecurity solutions available in the market today give you independent analytics in each of these areas. that does not give you complete understanding of your overall risk posture.

    In this webinar, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will cover the following topics to enable you to address cyber risk.
    • Why vulnerabilities and threats are two sides of the same coin
    • How threat intelligence can be effectively used to add context to risks
    • What types of analytics can address risks that have the largest business impact
  • Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical
    Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Apr 11 2019 51 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Expert Tips on Detecting and Responding to Data Breaches
    Expert Tips on Detecting and Responding to Data Breaches
    Brad Bierman, Manager of Security Operations - Arctic Wolf Networks Recorded: Mar 28 2019 22 mins
    It is not a matter of if but when a data breach will occur, and whether your IT organization is prepared to detect and respond to it. Experienced hackers are constantly inventing ways to get through your defenses and steal company confidential data or personal identifiable information (PII) to make money. Focusing on prevention alone is not sufficient.

    Brad Bierman, Director of Security Operations at Arctic Wolf Networks, and his team of Concierge Security™ Engineers have helped hundreds of customers detect and respond to data breaches. He will walk through a few cyberattack scenarios and provide expert tips on the following.

    1.What tools do you need to have in place to detect a data breach?
    2.Who do you need to engage to respond to a data breach?
    3.How do you respond appropriately to data breach?

    To learn more, join this webinar!

    About our key speaker:

    Brad Bierman has over 17 years of varied experience in the information security field. Some highlights are communications interceptions, SIEM engineering, mobile and computer forensics, security monitoring, and incident response. Prior to becoming a security professional, Brad was a hardware/firmware engineer for embedded networking solutions.
  • To SIEM, Not to SIEM? Find Out Your Options
    To SIEM, Not to SIEM? Find Out Your Options
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Mar 19 2019 42 mins
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • Beyond Managed Security: Why SOC-as-a-Service is Key for Financial Institutions
    Beyond Managed Security: Why SOC-as-a-Service is Key for Financial Institutions
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Mar 12 2019 40 mins
    Managing sensitive financial information and combatting cyberthreats often means finding efficiencies to do more with less. Modestly staffed IT teams often find themselves overwhelmed and challenged to complete projects that benefit the top line while also improving their cybersecurity maturity and meeting compliance obligations.

    With such a wide breadth of responsibility, how can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing or building an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Concerns we will address:

    1. Doing more with less: how to free up resources to accelerate projects affecting the top/bottom lines.
    2. How is SOC-as-a-service different than conventional managed security service provider offerings.
    3. Obtaining visibility across on-premises and cloud (SaaS and IaaS) environments

    Save your seat now!
  • Hybrid Defense: How to Defeat 2019's Biggest Threats
    Hybrid Defense: How to Defeat 2019's Biggest Threats
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: Mar 6 2019 54 mins
    With the start of 2019, there’s one certainty: this year’s attacks are destined to be more destructive and prevalent than ever before. So, how are cybersecurity experts and vendors gearing up to protect themselves in the face of these new challenges?

    In this webinar, we address major industry trends like machine learning and security orchestration, automation, and response (SOAR), and also dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams— enable any organization to deploy world-class defenses.

    This webinar will explore:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - Managed Detection and Response (MDR) solutions are rising to the challenge of new hybrid-cloud architectures for business
    - SOC-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    See how you can beat the big threats of 2019, save your seat now!
  • Security Expert Panel Discussion: The Next Generation on SOC
    Security Expert Panel Discussion: The Next Generation on SOC
    Kelly Higgins, Executive Editor -Dark Reading, Narayan Makaram, Sr. Dir, Product Mktg -Arctic Wolf Networks, Plus Others Recorded: Feb 28 2019 47 mins
    Gone are the days when IT security departments worried about building and managing a secure “perimeter,” and spent an abundance of time managing passwords and access control lists. Security operations centers (SOCs) now do more than simply monitor networks and systems for signs of common cyberthreats; security teams analyze and respond to new, zero-day attacks that evade traditional defenses.

    In this panel discussion led by Dark Reading’s Executive Editor Kelly Jackson Higgins, top SOC experts and leaders from Arctic Wolf and elsewhere offer war stories and recommendations on how to implement the latest tools and practices in SOC operations. You’ll learn how to prepare your organization for the next major security incident, even if your enterprise doesn’t have a SOC in place.

    View the webinar to discover:

    - The many pressures on SOCs and incident responders (skills gap, alert fatigue, etc.)
    - SOCs models—from in-house to outsourced (i.e. Arctic Wolf’s SOC-as-a-service)
    - Must-have SOC tools, and the role of intel feeds, SOAR, and threat hunting
    - The different SOC maturity levels
    - Key emerging technologies (data analytics, machine learning, etc.), and how they’re deployed in SOCs
    - How to prepare a SOC’s security team for the next big security incident

Embed in website or blog