Hi [[ session.user.profile.firstName ]]

Managed Detection and Response Answers the Question, “Am I Safe?”

Cyber attacks are becoming more complex, and it is becoming harder to determine what the best strategy is for vigilant cybersecurity. Companies feel like they are playing catchup, and there always seems to be another security hole to fill. Join this 30-min webcast to hear about the emerging security service segment, managed detection and response (MDR).
Recorded Aug 24 2016 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Young-Sae Song, VP of Marketing at Arctic Wolf Networks
Presentation preview: Managed Detection and Response Answers the Question, “Am I Safe?”

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Day in the life of a CSE: Proactive Hunting for Security Threats Oct 10 2017 6:00 pm UTC 45 mins
    Ross Phillips, Security Engineer at Arctic Wolf Networks and Sridhar Karnam, Director of Product Marketing
    Threat hunting, one of the hottest topics in cybersecurity, can be an important weapon for any IT security team. It focuses on identifying perpetrators who are already within an organization's systems and networks.

    In this webinar, Ross Phillips, a lead Security Engineer, will discuss:

    ▪ What is the difference between proactive hunting vs reactive hunting
    ▪ Even with the right forensic investigation tools, why hunting is still critical
    ▪ Key hunting methods, tools, and techniques

    Security threats can remain hidden for months or even years before triggering an alert. If you wait, the consequences can be severe. Register now to learn more about the impact of proactive hunting when it comes to cyberthreats.
  • Breaking Down Cloud Security: Discover What it Means to You Oct 3 2017 6:00 pm UTC 45 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • CEO Insights on Overcoming Ransomware Sep 28 2017 4:00 pm UTC 45 mins
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks
    With the changing nature of the cyber-threat landscape, companies are now looking at ransomware differently than your typical malware attack. Ransomware can attack your company's infrastructure which in turn can debilitate your day-to-day operations and cause billions of dollars in losses annually. Ransomware is hardly new, but continues to be a very dangerous trend.

    With over 30 years of experience, tune into this intriguing fireside chat to hear insights from Arctic Wolf's CEO, Brian NeSmith. In this webinar, Brian will discuss the following:

    - Why traditional backup strategies fail
    - 5 Things IT should do if exposed
    - Preventative measures to ensure your company's data security

    Security solutions and users now have to be more smarter than ever before, so don't let a ransomware attack outsmart you. Register today to learn how!

    About the Speaker
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • Human vs Machine: Is Hybrid AI SOC in Your Security's Future? Recorded: Sep 14 2017 31 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • CTO's Perspective on Creating a Template for an Incident Response Recorded: Sep 7 2017 49 mins
    Sam McLane, CTO/Head of Security Ops; Dave Martin, Head of Product Mgmt; Sridhar Karnam, Director of Product Mktg
    When you have a security incident, do you have a documented incident response plan? If not, who makes the decisions? These incidents could result in a complicated and costly legal, regulatory, and/or security proceedings. The people, process, and technology responsible for responding to these incidents are collectively known as Incident Response (IR).

    For those who don’t yet have a set plan but are looking to establish one, having a template to reference can be helpful. There are number of key pieces that should be incorporated into every incident response plan.

    Join us for a panel discussion featuring our CTO, head of product management, and head of product strategy as they talk about executing an incident response plan. The discussion will cover:

    •How to create a template for IR
    •What are the critical elements of an IR plan
    •Testing frequency and methods to ensure you have a good IR plan in place

    About Our Key Speaker: Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University.
  • Security Breaches: Why Endpoint Visibility Is Not Enough Recorded: Aug 31 2017 35 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.

    Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.

    In this webinar, you will learn:
    - What EDR vendors offer beyond EPP solutions
    - Why Endpoint Detection and Response alone is not enough
    - How Managed Detection and Response (MDR) makes up for EDR shortcomings
  • IoT is Wildly Insecure – Who is watching over your wall? Recorded: Aug 24 2017 44 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    In today’s interconnected world of IoT devices, security is the #1 challenge. Between self-driving cars, Nest thermostats, and talking refrigerators, the Internet of Things has grown at a staggering rate. It’s estimated that there will be an 50B IoT devices in use by 2020, most of which will have exploitable vulnerabilities.

    Manufacturing, healthcare, and information sectors have all embraced IoT devices because of their increased functionality, but at what cost to network hygiene? As your organization begins to incorporate more connected devices, how do you protect your network?

    Attend this webinar to learn about:
    1)  Top 5 IoT Security Challenges
    2)  Disconnect between Operations and Information Technology
    3)  Cyber security best practices that includes IoT security

    You are the shield that guards your realm. Don’t let IoT penetrate your wall.
  • Incident Response from the Inside Out Recorded: Aug 15 2017 2 mins
    Sam McLane, Head of Security Engineering, Arctic Wolf Networks
    In this video, we take a deeper dive into the incident response. Discover what a containment strategy is, how evidence is gathered, and is that evidence always the truth.
  • Secure Your Business: How to Improve Threat Detection & Response Recorded: Aug 15 2017 39 mins
    Sridhar Karnam, Director, Product Marketing at Arctic Wolf Networks
    Are cyberthreats keeping you up at night? You’re not the only one. According to recent research, 67% of companies are worried about security issues such as malware, phishing, and data theft. 

    So how do you improve your company’s security? How should you prioritize? How can you integrate all the tools? How many security staff will you need? How do you integrate a SOC and a NOC? 

    Managed Detection and Response (MDR) provides the answer to all these questions. With a focus on quick detection and response to threats, the service combines the right tools, people and processes to help you quickly implement the best security within your budget. 

    Ready for a good night’s rest? Join this webinar to discover how MDR can help!
  • Challenges with Fintech Compliance, and Cybersecurity to the Rescue Recorded: Jul 20 2017 26 mins
    Angelo Purugganan, Chief Information Security Officer at Arctic Wolf Networks
    In this webinar we are going to:
    - explore top cyber threats that fintech companies face
    - identify the monitoring and detection compliance requirements common to Federal and State Regulations

    We will be talking to Angelo Purugganan, Chief Information Security Officer, at Arctic Wolf Networks, to get his perspective on the how security analytics and continuous monitoring can simplify compliance using a SOC-as-a-Service provider.

    Most fintech transactions today happen at a fast pace, served through web applications using a combination of mobile devices and legacy systems, with some level of protection. While beneficial to small and medium fintech companies, consumers and regulatory agencies are apprehensive about protecting customers personal data and detecting cyber attacks over the internet which impact the integrity of financial transactions.
  • SOC Fundamentals for a Small IT Team Recorded: Jul 13 2017 56 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    What are some challenges facing small IT operations teams today? How can they overcome these challenges?

    Join this webinar for an A to Z overview of a SOC (Security Operations Center). Learn about what is commonly provided with a SOC including details relating to the following areas:

    - services and SLAs
    - security team
    - cost of ownership
    - advanced threat detection

    Also learn about outsourcing options for small and medium-sized businesses and get answers to questions like, What type of SLAs do MSSPs or SOC-as-a-Service providers offer? How is log information securely transmitted to a provider? How can a provider support one IT person at a company?
  • Is Hybrid AI SOC in Your Future? Recorded: Jun 21 2017 31 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Cyberattacks: Why Mid-Market Companies Believe They're Safe - But Aren't Recorded: Jun 20 2017 54 mins
    Sridhar Karnam, Director of Product Strategy
    A recent Arctic Wolf study found a prevalent cybersecurity dissonance between perception and reality, in which most companies believe that they are more cybersecure than they actually are. This is especially dangerous for mid-market companies, which face the same cyberthreats and issues but with fewer resources and a limited budget. This webinar will explain this dissonance and give tips on how to overcome it to improve your overall security posture.
  • About Arctic Wolf Networks Recorded: Jun 20 2017 4 mins
    Arctic Wolf Networks
    Arctic Wolf Networks provides a dynamic security service that combines world-class security engineering, advanced machine intelligence, and comprehensive up-to-the-minute service intel for effective, affordable cybersecurity. Watch this brief video to more about Arctic Wolf and AWN CyberSOC.
  • SOC in the Cloud: SANS Institute Review of AWN CyberSOC Recorded: Jun 19 2017 62 mins
    Sonny Sarai, SANS Review and Senior Analyst; Sridhar Karnam, AWN Director of Products
    No organization is safe from cyberattacks in today’s threat landscape, so many implement a security operations center (SOC) to improve their cybersecurity. In this webcast, SANS Institute reviews Arctic Wolf’s AWN CyberSOC, going through the setup, implementation, pricing, and various other aspects of the service. Learn more about security operations center and AWN CyberSOC in this webinar.
  • War stories from the trenches – case studies from a security ops perspective Recorded: Jun 13 2017 35 mins
    Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing
    A fire-side chat with Sam McLane, head of security operations at Arctic Wolf Networks (AWN), which will discuss some of the most interesting attacks that AWN security engineers have successfully hunted down in 2017. Learn more about:

    - The detection and response process
    - The communication and teamwork that takes place between Arctic Wolf and a customer
    - The impact of human augmented machine learning
  • Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service? Recorded: Jun 7 2017 57 mins
    Sridhar Karnam, Director of Product Strategy at Arctic Wolf; Terry R., Exec Editor at SC Media
    Gain insight into three cybersecurity solutions: SIEM, MSSP, and SOC-as-a-Service. Discover which solution is the best fit for your organization based on some of the following criteria:

    - company size offerings
    - detection and response capabilities
    - deployment times
    - support and expertise

    Think you're too small for a SIEM or SOC-as-a-Service? This webinar will explain why you're not. Think you're too big for an MSSP? Find out if that's truly the case.
  • Should you build or buy your security? Midmarket survey findings Recorded: May 25 2017 55 mins
    Sridhar Karnam, Director of Product Strategy
    A deep dive into the findings and implications of a survey taken by IT professionals in the midmarket space. 100% of respondents indicated they're cybersecurity could improve in one or more areas such as information security, user security training, threat intelligence, overall risk management, and more. And of the threats, viruses, malware, professional cybercriminal, data theft, and phishing are among the top 5 threats facing their organizations.

    Get the results and takeaways from the survey and gain insight into whether it is best for your organization to build or buy a security operations center (SOC) in this interactive webcast.
  • To SIEM or not to SIEM Recorded: May 16 2017 36 mins
    Sridhar Karnam, Director of Product Strategy; Stephen, host from SC Media
    Security information and event management (SIEM) has been a cornerstone of cybersecurity for years, but its future as a stand-alone product might well be in question. As advanced threat intelligence platforms, search engines, and other advanced tools come to market, we could be seeing a consolidation in how tools are packaged and marketed. This webcast will examine the following:

    - The motivations behind a security overhaul
    - SIEM as a core part of a SOC (security operations center)
    - Security without SIEM
    - Alerts versus actionable intel
    - The role of a SOC analyst
    - What makes up “a better SIEM?”
  • Stop attacks such as ransomware and get HIPAA compliant for Healthcare Recorded: Apr 27 2017 35 mins
    Sridhar Karnam, Director of Product Marketing at Arctic Wolf Networks
    Stop attacks such as ransomware and get HIPAA compliant for Healthcare. Understand the top 3 attacks in Healthcare, how to stop them using simple cloud-based tools and ensure HIPAA compliance for business continuity.
Managed Detection and Response Service - 24X7 SOC at your service
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. AWN CyberSOC is anchored by Concierge Security Engineers and includes 24×7 monitoring, custom alerting and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf CyberSOC visit www.arcticwolf.com and follow @AWNetworks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Managed Detection and Response Answers the Question, “Am I Safe?”
  • Live at: Aug 24 2016 7:10 pm
  • Presented by: Young-Sae Song, VP of Marketing at Arctic Wolf Networks
  • From:
Your email has been sent.
or close