Hi [[ session.user.profile.firstName ]]

Arctic Wolf Networks

  • Date
  • Rating
  • Views
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • To Outsource, or Not To Outsource: Best Practices for IT Security
    To Outsource, or Not To Outsource: Best Practices for IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Sep 13 2018 63 mins
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • What Are The Impacts of a Financial Services Data Breach
    What Are The Impacts of a Financial Services Data Breach Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Sep 13 2018 3 mins
    In this webinar clip, we dive into the impact a data breach can have for financial institutions. With smaller IT teams, regional banks and credit unions face similar security and compliance burdens to what larger, well-resourced financial institutions carry. So, what can you do if breached?

    To hear more from our security experts and how to solve the financial services security talent shortage with managed detection, click here: http://bit.ly/2x9qHda
  • What Should Be Your Financial Services Plan for Managing Cyberthreats
    What Should Be Your Financial Services Plan for Managing Cyberthreats Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Sep 10 2018 3 mins
    In this insightful webinar clip, we provide brief insights into how you can manage cyberthreats. Regional banks and credit unions often face the same security and compliance burdens to larger, well-resourced financial institutions with much smaller staffs. So, what should your security plan for managing cyberthreats look like?

    To hear more from our security experts and how to solve the financial services security talent shortage with managed detection, click here: http://bit.ly/2x9qHda
  • Where Are the Gaps in Cloud Security?
    Where Are the Gaps in Cloud Security? Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks Recorded: Sep 10 2018 3 mins
    In this webinar clip, learn about the gaps in cloud security. Most businesses are rapidly moving to the cloud. These new architectures have powerful new capabilities, but also expose businesses to a new universe of risks.

    To hear more from our security experts and how AWN security monitoring compliments the need of security features in AWS and Office365, watch the full webinar here: http://bit.ly/2x5rQRT
  • Hybrid Defense: How the City of Sparks Defends Against Cyberthreats
    Hybrid Defense: How the City of Sparks Defends Against Cyberthreats Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Sep 6 2018 38 mins
    Businesses of every size and stripe risk becoming targets of cyberattacks. From governments to hospitals, these businesses are increasingly victimized by ransomware attacks and data breaches. So, how do you defend yourself? What do you do when your IT staff lacks the expertise to investigate growing security threats and respond to them in a timely manner? How do you get help from security experts to prevent suffering a future breach?

    Join Arctic Wolf Network’s customer, the City of Sparks (NV), in our upcoming webinar to discover the security challenges faced by most governments and business organizations. Learn how our industry-leading security operations center (SOC)-as-a-service – the AWN CyberSOC – helped the City of Sparks vastly improve its threat detection and response.

    This webinar will explore:

    - Key security challenges that plagued the City of Sparks
    - Reasons why Sparks’ IT team chose our SOC-as-a-service solution instead of building one in-house
    - How AWN CyberSOC™ with Hybrid AI improved Sparks’ threat detection and response by 10X

    Don’t let your organization become a prime target. Register today!
  • Progression of Ransomware
    Progression of Ransomware Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 5 2018 3 mins
    In this video clip. Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, highlights the progression of ransomware.

    To watch the full webinar, click here: https://arcticwolf.com/resources/webinars/?utm_source=Arctic+Wolf+Networks&utm_medium=brighttalk&commid=331015
  • Best Practices for Reducing Your Attack Surface with Vulnerability Management
    Best Practices for Reducing Your Attack Surface with Vulnerability Management Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Aug 23 2018 38 mins
    Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

    Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

    •Trends affecting your attack surface
    •Need for vulnerability management program
    •What should you look for in an external vulnerability scan report

    Register today to hear from this expert!
  • Overcoming The Cybersecurity Skills Shortage in Law Firms
    Overcoming The Cybersecurity Skills Shortage in Law Firms Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Aug 16 2018 40 mins
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

    *https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security.html
  • Solving the Financial Services Security Talent Shortage with Managed Detection
    Solving the Financial Services Security Talent Shortage with Managed Detection Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Aug 14 2018 39 mins
    Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Attend this webinar and learn about:

    • Top cyberthreats facing financial institutions
    • Financial services compliance evolution, security monitoring and incident response
    • Differences between SIEM, SOC, and SOC-as-a-service
    • Monitoring on premises and cloud resources without adding headcount

    To gain insights on these challenges and how to solve them, save your seat now!

Embed in website or blog