Hi [[ session.user.profile.firstName ]]

Arctic Wolf Networks

  • Date
  • Rating
  • Views
  • CEO Insights: 2019 Cybersecurity Predictions
    CEO Insights: 2019 Cybersecurity Predictions
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Recorded: Dec 10 2018 35 mins
    Cybercriminals continued on their rampage in 2018 stealing millions of records from Department of Homeland Security and successfully hacked into name brand companies like Adidas, Twitter, Cathay Pacific, and Ticketmaster. The pace is not expected to slow in 2019. With porous on-premises infrastructure, new cloud assets, and not enough people with cybersecurity skills to detect and respond to threats, 2019 should be a lively year.

    The cybersecurity experts at Arctic Wolf Networks (AWN), a leading Security Operation Center (SOC)-as-a-Service provider have seen all types of attacks that have attempted to sneak through many a company’s perimeter and endpoint defenses.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf will walk through the top predictions for 2019, based on what our security services team has seen across more than 500 customers.

    Here is a preview of the top 3 predictions that is bound to surprise you.

    - The new approach cybercriminals will employ to get into target organizations
    - Which industries will be most attractive to 2019’s hackers
    - Whether new security technologies can live up to their expectations
    - And much more!

    To hear from this security expert and to learn what to look for in 2019, register now.
  • Is AI/ML and SOAR Over-hyped? Find Out Now
    Is AI/ML and SOAR Over-hyped? Find Out Now
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Recorded: Dec 7 2018 3 mins
    In our "CEO Insights: 2019 Cybersecurity Predictions" webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf discusses his top predictions for 2019, based on what our security services team has seen across more than 500 customers. One of the things he predicts is that AI/ML and SOAR is over-hyped. How so? Watch this brief video clip to find out why.
  • Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Dec 6 2018 52 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Targeted Attacks: How to Recognize From a Defender's POV
    Targeted Attacks: How to Recognize From a Defender's POV
    Sam McLane, CTSO, Arctic Wolf Networks Recorded: Nov 29 2018 37 mins
    Cybersecurity is the biggest risk law firms face, and they can expect to face greater scrutiny from clients on how they use, store and protect client data. An effective cyber risk program often requires advanced threat detection and response capabilities that can challenge even a well-resourced internal IT team. While many recreations and online exploits are presented from the attacker's point of view, what do these attacks look like on the defender's side?

    In this webinar, top security operations center (SOC) expert, Sam McLane, will share war stories on how attacks appeared in targeted organizations, the steps taken to correlate information about the attacks, and the development of an effective mitigation strategy. You'll also gain insight on how a SOC can identify a sophisticated attack sooner in its evolution, helping minimize the damage it might cause.

    After attending, we will help you answer the following key questions:

    - How can law firms demonstrate to their clients the effectiveness of their cybersecurity programs?
    - What are the key risk factors that law firms face and how can they be mitigated?
    - Why are law firms particularly vulnerable to the new cyberattacks that are becoming more prevalent?
    - What is the right way to manage a cybersecurity breach?

    Register now to hear from this security expert!

    About our key speaker:

    Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • What Are the Two Main Business Drivers for Acquiring a SIEM?
    What Are the Two Main Business Drivers for Acquiring a SIEM?
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Nov 14 2018 2 mins
    Is a security information and event management (SIEM) platform the cornerstone of cybersecurity? In this webinar clip, we explore the answer to this key question. Sr. Director of Product Marketing at Arctic Wolf, Narayan Makaram speaks about the two main business drivers for acquiring a SIEM:

    1) Businesses want a easy way to detect threats.
    2) They want to be able to meet compliance reporting mandates.

    To view the full webinar and receive an in depth analysis on whether or not you should SIEM or Not SIEM here: http://bit.ly/2DlGx8l
  • To SIEM, Not to SIEM? Find Out Your Options
    To SIEM, Not to SIEM? Find Out Your Options
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Nov 14 2018 43 mins
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • Hybrid Defense: How to Defeat 2018's Biggest Threats
    Hybrid Defense: How to Defeat 2018's Biggest Threats
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: Nov 8 2018 32 mins
    There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?

    In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
  • Expert Tips on Detecting and Responding to Data Breaches
    Expert Tips on Detecting and Responding to Data Breaches
    Brad Bierman, Manager of Security Operations - Arctic Wolf Networks Recorded: Nov 6 2018 23 mins
    It is not a matter of if but when a data breach will occur, and whether your IT organization is prepared to detect and respond to it. Experienced hackers are constantly inventing ways to get through your defenses and steal company confidential data or personal identifiable information (PII) to make money. Focusing on prevention alone is not sufficient.

    Brad Bierman, Director of Security Operations at Arctic Wolf Networks, and his team of Concierge Security™ Engineers have helped hundreds of customers detect and respond to data breaches. He will walk through a few cyberattack scenarios and provide expert tips on the following.

    1.What tools do you need to have in place to detect a data breach?
    2.Who do you need to engage to respond to a data breach?
    3.How do you respond appropriately to data breach?

    To learn more, join this webinar!

    About our key speaker:

    Brad Bierman has over 17 years of varied experience in the information security field. Some highlights are communications interceptions, SIEM engineering, mobile and computer forensics, security monitoring, and incident response. Prior to becoming a security professional, Brad was a hardware/firmware engineer for embedded networking solutions.
  • Benefits of Building vs Buying Your Security
    Benefits of Building vs Buying Your Security
    Michael Suby, VP, Research - Frost & Sullivan & Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: Oct 30 2018 54 mins
    Frost & Sullivan TCO Analysis: Building Your Own SOC vs. Buying SOC-as-a-Service

    For modern businesses, a Security Operations Center (SOC) is no longer an option. It is a necessity. But building and maintaining a fully functional SOC is a daunting proposition. Cost is a top consideration, driven overwhelmingly by a SOC’s need for a high number of in-demand security experts. Hiring, training, and retaining the necessary talent to staff a SOC is flatly impractical for many businesses.

    Fortunately there is a viable alternative to a DIY SOC: SOC-as-a-Service.

    In this webinar, Michael Suby, VP of Research at Frost & Sullivan, will highlight the compelling value proposition of SOC-as-a-Service compared to building and maintaining an in-house SOC. Included in this webinar are:

    - Real-world use cases of businesses subscribing to SOC-as-a-Service
    - Head-to-Head quantitative cost comparisons between SOC-as-a-Service and DIY SOC
    - Attributes to demand in a SOC-as-a-Service offering

    About our key speaker:

    A 17-year veteran at Frost & Sullivan, Michael Suby, VP of Research, has concentrated on the evolving threat landscape, practices, and technologies in cybersecurity. Quick to engage on risk and response, Mr. Suby habitually examines emerging cybersecurity technologies before they reach mainstream. Recent examples include server-less security, deception, dynamic defenses, content disarm & reconstruct, remote browser isolation, and cloud access & security brokers (CASB). In partnership with a team of highly experienced cybersecurity analysts at Frost & Sullivan, Mr. Suby is also intimately involved in researching how traditional cybersecurity solutions and platforms are addressing the diverse challenges and pressures encountered by IT and security practitioners.
  • Secure the Cloud: Combat the Top Threats to Your SaaS Applications
    Secure the Cloud: Combat the Top Threats to Your SaaS Applications
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Oct 26 2018 59 mins
    Organizations of all sizes are increasingly adopting cloud services to transform business processes. Unfortunately, the cloud also brings serious security concerns. SaaS applications add new attack surfaces beyond the traditional network perimeter, with employees accessing business data on various devices and from multiple locations.

    In this borderless ecosystem, adopting a fragmented approach to securing on-premises infrastructure, endpoints, and cloud resources, like SaaS apps, has proven to be dangerously ineffective. As early as 2016, the average business experienced around 23 cloud-based security incidents each month. That number is rapidly rising, indicative of the need for a new, centralized approach to security.

    While larger enterprises can achieve comprehensive coverage across cloud and on-premises resources with a 24x7 security operations center (SOC), smaller businesses may be leaving their critical infrastructure exposed. Without the resources to build an in-house SOC, or the ability to hire a large internal team of security experts to operate the SOC, what can you do to secure your data and network infrastructure?

    In this Arctic Wolf webinar, we dive into:

    - The top cyber threats relevant to your SaaS applications today

    - A detailed, step-by-step walk thru of what it takes to secure the use of SaaS apps, and

    - How all businesses can cost-effectively implement centralized threat detection

    Register now to save your seat!

Embed in website or blog