Hi [[ session.user.profile.firstName ]]

Top 3 Cybersecurity Challenges Facing Healthcare with Real Life Lessons Learned

Healthcare organizations have become prime targets for cyber criminals. In this webcast, security experts identify three key areas that are critical to improving your organization’s cybersecurity and provide effective strategies to combat cyber attacks using real-life examples.
Recorded Oct 24 2016 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sam McLane, Head of Security of Engineering at Arctic Wolf Networks
Presentation preview: Top 3 Cybersecurity Challenges Facing Healthcare with Real Life Lessons Learned

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Expecting the Unexpected: How Businesses Can Avoid Becoming a Target for Cybercr Recorded: Apr 21 2020 63 mins
    Louis Evans, Product Marketing Manager, Arctic Wolf
    As companies around the world grapple with how to transition normal business operations with newly distributed workforces, bad actors have wasted no time in capitalizing on overtaxed IT teams. From “Zoom-bombing” to increasingly aggressive phishing attempts, bad actors have changed their tactics to try to profit from suddenly remote work environments.

    In this webinar, we’ll break down new techniques cybercriminals have implemented to take advantage of mass disruption and uncertainty that remote work and learning environments have caused.
  • Comparing EDR, MDR, and MSSPs for Security Monitoring, Detection, & Response Recorded: Jan 15 2020 46 mins
    Todd Thiemann
    With thousands of cybersecurity products and services available, most technology leaders still struggle to answer one question: "What do I really need to keep my team and our customers safe?"

    Organizations need to monitor their environment to detect and respond to threats that inevitably crop up. There are three major approaches to solving this security conundrum: endpoint detection and response (EDR), managed detection and response (MDR), or managed security service provider (MSSPs). This webinar compares and contrasts the three approaches so you have the right questions in hand when considering your options.

    What you will learn:
    Why monitoring, detection and response is an essential element of a robust security strategy
    What elements comprise the EDR, MDR, and MSSP solution approaches?
    How do these approaches take advantage of the cloud as well as monitor cloud assets?
    What is the security “sweet spot” for EDR, MDR and MSSP approaches?
  • [PANEL] New in AI & ML Recorded: Dec 10 2019 55 mins
    Michelle Ruyle, Optimized Channel | Jennifer Galvin, Okta | Roselle Safran, Rosint Labs | Ian Hassard, Arctic Wolf
    Join this panel of security experts as they discuss the newest security solutions and strategies utilizing Artificial Intelligence and Machine Learning:

    -Best practices for improving security
    -Why your organization needs to be using AI and ML
    -How to take security to the next level

    Michelle Ruyle, CEO & Founder, Optimized Channel
    Jennifer Galvin, Field Alliances Enablement, Okta
    Roselle Safran, President, Rosint Labs
    Ian Hassard, Director of Product Management, Arctic Wolf Networks
  • Ransomware Reality: Dispelling the Myths Recorded: Dec 4 2019 60 mins
    Louis Evans
    Recent ransomware attacks have halted business operations, disrupted emergency services, and forced closures of schools, hospitals, and government entities.

    In October 2019, the FBI released a dire warning: prepare for increasingly sophisticated cyberattacks, or risk losing business-critical data permanently.

    In the face of mounting threats, organizations need to comes to terms with the grim reality that ransomware is not likely to disappear in the foreseeable future. In light of advanced, persistent attacks, IT teams need to have strategies in place to combat the growing threats.

    In this webinar, attendees will learn:
    - Why ransomware continues to be a growing problem
    - How to reduce your risk of ransomware
    - How to prepare your organization to respond to a ransomware incident
  • People Risk: Understanding Your Most Important & Most Vulnerable Assets Recorded: Oct 30 2019 35 mins
    Matt Duench
    99% of all cyberattacks require some level of human interaction or intervention. Bad actors follow the path of least resistance, so it’s no surprise that human behavior can be your organization’s biggest cybersecurity risk.

    Although no single approach is effective on its own in preventing negligence and insider threats; adding layers of people risk diligence to cybersecurity policies can greatly reduce your insider threat exposure.

    During this webinar, we’ll look at some recent examples of insider threats, cover methods for reducing your insider threat exposure, and focus on how you can minimize people risk from effective cyber security training to methods for managing your cyber risk profile.
  • 2019 Data Breaches: What We’ve Learned From The Worst Year in Cybersecurity Recorded: Oct 9 2019 56 mins
    Louis Evans, Product Marketing Manager, Arctic Wolf
    From global enterprises to small cities and counties, no industry was spared from cyberattacks in 2019. Millions of records were stolen, internal operations slowed to a halt, and communications teams worked overtime to explain exactly what happened to disgruntled stakeholders, despite a lack of immediate answers.

    For security leaders, 2019 breaches underscored that cyberattacks were no longer a question of “if?” but “when?”

    In this webinar, cybersecurity industry veteran Louis Evans will recap some of the most damaging breaches of 2019, including those experienced by Capital One, LabCorp and Quest, Texas local government entities, and U.S. Customs and Border Protection to understand what went wrong and how to protect your organization from similar threats.

    Attendees will learn:

    - Techniques employed by internal and external actors to access and steal sensitive information
    - Where breached organizations had weaknesses that could be exploited by cybercriminals
    - What lessons can be gleaned from 2019 cyberattacks, and how your organization can avoid becoming a target
  • Think Native Cloud Security Is Enough? Think Again Recorded: Sep 18 2019 64 mins
    Louis Evans, Product Marketing Manager at Arctic Wolf
    Nearly all organizations have some cloud footprint, from traditional businesses using SaaS office applications such as Salesforce or Office365, to cloud-first firms running exclusively in AWS or Azure. These cloud solutions offer powerful new ways to drive business efficiencies—but they also expose companies to a new universe of risk.

    IT managers may mistakenly assume that cloud security is out of their hands, for better or worse. But this assumption isn’t true. That’s why it’s incumbent upon businesses to develop a sound security strategy as they migrate to the cloud, while also becoming a proactive security partner with their cloud providers. If not, they’ll find themselves vulnerable to attack.

    This webinar offers strategic insight on how to bolster your cloud security, as Arctic Wolf experts discuss:
    - The top cybersecurity risks–and best practices for securing cloud deployments
    - How Arctic Wolf™ Managed Detection and Managed Risk complement cloud-native security features across major cloud platforms
    - Arctic Wolf’s role in integrating observations from cloud and on-premise systems

    See how Arctic Wolf can secure your cloud. REGISTER NOW!
  • The Importance of Risk Management Solutions in the “Age of the Breach” Recorded: Aug 20 2019 33 mins
    Matt Duench, Product Marketing Manager, Arctic Wolf
    As you read this, a business somewhere is falling victim to a new cyberattack and potentially losing millions of dollars. That’s because on average it takes hackers only a week to exploit new vulnerabilities, while businesses take four months to patch them. Don’t let your company be next.

    Attend this important webinar on vulnerability assessment and risk management where security expert Matt Duench from Arctic Wolf examines the challenge of breaches, how they happen, and what you can do to stop them. Find out:
    - Why the cybersecurity skills shortage leaves companies especially vulnerable
    - How to extend your perimeter security with risk management
    - How a SOC-as-a-service provides comprehensive security for companies of every size
  • Benefits of Building vs Buying Your Security Recorded: Jun 5 2019 53 mins
    Michael Suby, VP, Research - Frost & Sullivan & Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    Frost & Sullivan TCO Analysis: Building Your Own SOC vs. Buying SOC-as-a-Service

    For modern businesses, a Security Operations Center (SOC) is no longer an option. It is a necessity. But building and maintaining a fully functional SOC is a daunting proposition. Cost is a top consideration, driven overwhelmingly by a SOC’s need for a high number of in-demand security experts. Hiring, training, and retaining the necessary talent to staff a SOC is flatly impractical for many businesses.

    Fortunately there is a viable alternative to a DIY SOC: SOC-as-a-Service.

    In this webinar, Michael Suby, VP of Research at Frost & Sullivan, will highlight the compelling value proposition of SOC-as-a-Service compared to building and maintaining an in-house SOC. Included in this webinar are:

    - Real-world use cases of businesses subscribing to SOC-as-a-Service
    - Head-to-Head quantitative cost comparisons between SOC-as-a-Service and DIY SOC
    - Attributes to demand in a SOC-as-a-Service offering

    About our key speaker:

    A 17-year veteran at Frost & Sullivan, Michael Suby, VP of Research, has concentrated on the evolving threat landscape, practices, and technologies in cybersecurity. Quick to engage on risk and response, Mr. Suby habitually examines emerging cybersecurity technologies before they reach mainstream. Recent examples include server-less security, deception, dynamic defenses, content disarm & reconstruct, remote browser isolation, and cloud access & security brokers (CASB). In partnership with a team of highly experienced cybersecurity analysts at Frost & Sullivan, Mr. Suby is also intimately involved in researching how traditional cybersecurity solutions and platforms are addressing the diverse challenges and pressures encountered by IT and security practitioners.
  • To Outsource, or Not To Outsource: Best Practices for IT Security Recorded: May 22 2019 62 mins
    Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Recorded: May 8 2019 39 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked Recorded: Apr 25 2019 48 mins
    Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf Networks
    At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.

    These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.

    The webinar covers:

    •6 common myths about cybersecurity and cyber risk
    •The threats these myths pose to your business
    •Cybersecurity facts you can use to protect yourself

    Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!

    And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.
  • The SOC-as-a-Service Prescription: Healthcare Cybersecurity & Compliance Recorded: Apr 17 2019 37 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    Monitoring and detecting threats in healthcare faces a number of challenges: sophisticated cyberthreats, HIPAA compliance requirements, budget constraints, and a cybersecurity talent shortage for staff needed to monitor and respond to events. Previous approaches to monitoring have been ineffective and expensive. Managed detection and response (MDR) services provide a way out of this cybersecurity conundrum. This webinar explains how healthcare organizations can improve cybersecurity and compliance with MDR/Security Operations Center (SOC)-as-a-service.

    Join us and discover:
    • The ways a managed detection and response (MDR) service differs from managed security services (MSS).
    • How MDR/SOC-as-a-service provides big savings compared to in-house security info and event management (SIEM) tools.
    • How MDR/SOC-as-a-service helps to fulfill HIPAA compliance requirements.
    • The ways an MDR/SOC-as-a-service improves healthcare security posture and alleviates the cybersecurity talent shortage.

    Save your seat now!
  • Take Control of Vulnerabilities and Threats with Intuitive Risk Analytics Recorded: Apr 16 2019 44 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Vulnerabilities, threats, and risks are commonly mixed up security terms. Several cybersecurity solutions available in the market today give you independent analytics in each of these areas. that does not give you complete understanding of your overall risk posture.

    In this webinar, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will cover the following topics to enable you to address cyber risk.
    • Why vulnerabilities and threats are two sides of the same coin
    • How threat intelligence can be effectively used to add context to risks
    • What types of analytics can address risks that have the largest business impact
  • Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical Recorded: Apr 11 2019 51 mins
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Expert Tips on Detecting and Responding to Data Breaches Recorded: Mar 28 2019 22 mins
    Brad Bierman, Manager of Security Operations - Arctic Wolf Networks
    It is not a matter of if but when a data breach will occur, and whether your IT organization is prepared to detect and respond to it. Experienced hackers are constantly inventing ways to get through your defenses and steal company confidential data or personal identifiable information (PII) to make money. Focusing on prevention alone is not sufficient.

    Brad Bierman, Director of Security Operations at Arctic Wolf Networks, and his team of Concierge Security™ Engineers have helped hundreds of customers detect and respond to data breaches. He will walk through a few cyberattack scenarios and provide expert tips on the following.

    1.What tools do you need to have in place to detect a data breach?
    2.Who do you need to engage to respond to a data breach?
    3.How do you respond appropriately to data breach?

    To learn more, join this webinar!

    About our key speaker:

    Brad Bierman has over 17 years of varied experience in the information security field. Some highlights are communications interceptions, SIEM engineering, mobile and computer forensics, security monitoring, and incident response. Prior to becoming a security professional, Brad was a hardware/firmware engineer for embedded networking solutions.
  • To SIEM, Not to SIEM? Find Out Your Options Recorded: Mar 19 2019 42 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • Beyond Managed Security: Why SOC-as-a-Service is Key for Financial Institutions Recorded: Mar 12 2019 40 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    Managing sensitive financial information and combatting cyberthreats often means finding efficiencies to do more with less. Modestly staffed IT teams often find themselves overwhelmed and challenged to complete projects that benefit the top line while also improving their cybersecurity maturity and meeting compliance obligations.

    With such a wide breadth of responsibility, how can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing or building an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Concerns we will address:

    1. Doing more with less: how to free up resources to accelerate projects affecting the top/bottom lines.
    2. How is SOC-as-a-service different than conventional managed security service provider offerings.
    3. Obtaining visibility across on-premises and cloud (SaaS and IaaS) environments

    Save your seat now!
  • Hybrid Defense: How to Defeat 2019's Biggest Threats Recorded: Mar 6 2019 54 mins
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    With the start of 2019, there’s one certainty: this year’s attacks are destined to be more destructive and prevalent than ever before. So, how are cybersecurity experts and vendors gearing up to protect themselves in the face of these new challenges?

    In this webinar, we address major industry trends like machine learning and security orchestration, automation, and response (SOAR), and also dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams— enable any organization to deploy world-class defenses.

    This webinar will explore:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - Managed Detection and Response (MDR) solutions are rising to the challenge of new hybrid-cloud architectures for business
    - SOC-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    See how you can beat the big threats of 2019, save your seat now!
  • Security Expert Panel Discussion: The Next Generation on SOC Recorded: Feb 28 2019 47 mins
    Kelly Higgins, Executive Editor -Dark Reading, Narayan Makaram, Sr. Dir, Product Mktg -Arctic Wolf Networks, Plus Others
    Gone are the days when IT security departments worried about building and managing a secure “perimeter,” and spent an abundance of time managing passwords and access control lists. Security operations centers (SOCs) now do more than simply monitor networks and systems for signs of common cyberthreats; security teams analyze and respond to new, zero-day attacks that evade traditional defenses.

    In this panel discussion led by Dark Reading’s Executive Editor Kelly Jackson Higgins, top SOC experts and leaders from Arctic Wolf and elsewhere offer war stories and recommendations on how to implement the latest tools and practices in SOC operations. You’ll learn how to prepare your organization for the next major security incident, even if your enterprise doesn’t have a SOC in place.

    View the webinar to discover:

    - The many pressures on SOCs and incident responders (skills gap, alert fatigue, etc.)
    - SOCs models—from in-house to outsourced (i.e. Arctic Wolf’s SOC-as-a-service)
    - Must-have SOC tools, and the role of intel feeds, SOAR, and threat hunting
    - The different SOC maturity levels
    - Key emerging technologies (data analytics, machine learning, etc.), and how they’re deployed in SOCs
    - How to prepare a SOC’s security team for the next big security incident
Managed Detection and Response Service - 24X7 SOC at your service
Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC™ service is anchored by Concierge Security™ teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response. For more information about Arctic Wolf, visit https://arcticwolf.com.

Don't forget to follow us on Twitter @AWNetworks!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top 3 Cybersecurity Challenges Facing Healthcare with Real Life Lessons Learned
  • Live at: Oct 24 2016 6:00 pm
  • Presented by: Sam McLane, Head of Security of Engineering at Arctic Wolf Networks
  • From:
Your email has been sent.
or close