Hi [[ session.user.profile.firstName ]]

Webinar clip - The SMB conundrum with information security

SMBs have the same security needs and requirements as enterprises, but rarely have the resources or personnel that their larger competitors have. What are some strategies SMBs can take when it comes to next-generation firewalls, intrusion-protection systems, intrusion-detection systems, and other hybrid approaches? Listen to this webcast to learn more.
Recorded Sep 28 2016 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Young-Sae Song, VP of Marketing at Arctic Wolf Networks
Presentation preview: Webinar clip - The SMB conundrum with information security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Why Native Security Features in AWS and Office365 aren't Enough Jan 30 2018 5:00 pm UTC 60 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • Breaking Down Cloud Security: Discover What it Means to You Jan 23 2018 5:00 pm UTC 45 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning Jan 17 2018 7:00 pm UTC 60 mins
    Matthew Thurston, Chief Architect - Arctic Wolf Networks
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Human vs Machine: Is Hybrid AI SOC in Your Security's Future? Jan 11 2018 5:00 pm UTC 30 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service? Recorded: Dec 12 2017 58 mins
    Sridhar Karnam, Director of Product Strategy at Arctic Wolf; Terry R., Exec Editor at SC Media
    Gain insight into three cybersecurity solutions: SIEM, MSSP, and SOC-as-a-Service. Discover which solution is the best fit for your organization based on some of the following criteria:

    - company size offerings
    - detection and response capabilities
    - deployment times
    - support and expertise

    Think you're too small for a SIEM or SOC-as-a-Service? This webinar will explain why you're not. Think you're too big for an MSSP? Find out if that's truly the case.
  • To SIEM or not to SIEM Recorded: Dec 7 2017 36 mins
    Sridhar Karnam, Director of Product Strategy; Stephen, host from SC Media
    Security information and event management (SIEM) has been a cornerstone of cybersecurity for years, but its future as a stand-alone product might well be in question. As advanced threat intelligence platforms, search engines, and other advanced tools come to market, we could be seeing a consolidation in how tools are packaged and marketed. This webcast will examine the following:

    - The motivations behind a security overhaul
    - SIEM as a core part of a SOC (security operations center)
    - Security without SIEM
    - Alerts versus actionable intel
    - The role of a SOC analyst
    - What makes up “a better SIEM?”
  • Technology is Not Enough: Discover Why a SOC is Not a SIEM Recorded: Nov 22 2017 2 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks
    To see why you shouldn't rely on just a SIEM, watch this short video clip now.
  • CISO Insights: How to Eliminate Challenges in Fintech Compliance Recorded: Nov 16 2017 27 mins
    Angelo Purugganan, Chief Information Security Officer at Arctic Wolf Networks
    In today's business environment, most fintech transactions happen at a fast pace, served through web applications using a combination of mobile devices and legacy systems, with some level of protection. While beneficial to small and medium fintech companies, consumers and regulatory agencies are apprehensive about protecting customers personal data and detecting cyber attacks over the internet which impact the integrity of financial transactions.

    In this webinar, we are going to:

    - Explore top cyber threats that fintech companies face
    - Identify what are the Compliance regulations and standards that apply to fintech companies
    - Determine how continuous monitoring and security analytics help meet compliance regulations/standards requirements

    Chief Information Security Officer, Angelo Purugganan, will also be joining us in this discussion. He will be sharing his insights on how security analytics and continuous monitoring can simplify compliance using a SOC-as-a-Service provider.

    To see how you can eliminate challenges in fintech compliance, register now.

    About our CISO speaker:

    Angelo has 15+ years of information security and compliance and 10+ years of software development experience. He has led information security programs for cloud providers and various enterprise clients using frameworks, such as Trust Services Principles, PCI-DSS, HIPAA, FISMA, Euro Directives, ISO-27000, and SOX. He has conducted information security audits in sectors such as SaaS CRM providers, logistics and distribution, manufacturing supply chain, finance ERP, foreign exchange and hedging operations, airline and travel.
  • Top Data Breaches of 2017: Why Prevention Alone Was Not Enough Recorded: Nov 14 2017 46 mins
    Narayan Makaram - Senior Director of Product Marketing at Arctic Wolf Networks
    While 2017 was turning out to be a year of ransomware attacks, the mother of all data breaches was carried out on Equifax where the personal information of 146 million people was stolen. Even though these companies had invested in preventive security technologies, it did not stop cyber criminals from stealing sensitive information or bringing their businesses to a grinding halt.

    In this webinar, we will examine the top 3 cyber-attacks and data breaches of 2017, and discuss the following:

    - How were these cyber-attacks carried out?
    - Why preventive technologies were not enough to stop these attacks?
    - What type of detection and response capabilities and security expertise could have made a big difference?

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
  • How to Build a Cost-Effective Security Operations Center (SOC) Recorded: Nov 7 2017 40 mins
    Sridhar Karnam, Director of Product Marketing, Arctic Wolf Networks
    A security operations center (SOC) is one of the most sophisticated operation centers focused on combating cyber crime and cyber attacks. Fortune 500 companies to government agencies use this daily to monitor users, apps, data, and network for threats and vulnerabilities. But, what if you’re not a Fortune 500 company? Can you justify the expense?

    Join us for a webinar on how to build a cost-effective SOC. We will discuss:

    - Is a cyber SOC the right fit for you
    - How to design a cyber SOC that aligns with your business security strategy
    - What are SOC alternatives for those who aren’t a Fortune 500
    - Should you consider SOC-as-a-Service
  • Is Your Compliance Mindset Leaving You at Risk? Recorded: Nov 2 2017 51 mins
    Dave Martin, Head of Product Management
    Digital businesses of all sizes are facing a myriad of new and complex threats. Passing regulatory compliance checks and adhering to security standards is a good first step, but that's not enough to protect your IT infrastructure from being compromised or suffering a data breach.

    CIOs/CISOs should stop focusing on check-box compliance just to meet regulatory requirements that apply to their industry (e.g. SOX, PCI, HIPAA/HITECH), and shift to a risk-based mindset. What does this mean to those in the small and medium business market segment?

    In this webinar, we will address the following 3 key principles for implementing a risk-based security mindset.

    - Determine how information flows, rather than controlling flow of information
    - Stop trying to perfectly protect your organization, and invest in detection and response
    - Accept the limitations of technology and become people-centric

    About our speaker:

    Dave Martin brings to Arctic Wolf more than 20 years of experience with IT security and networking technologies in a variety of engineering, product marketing, product management and business development roles. He currently serves as the Head of Product Management responsible for market positioning, product strategy and feature definition for our market leading CyberSOC services. Prior to joining Arctic Wolf, Mr. Martin has held executive and technical positions at companies including NSFOCUS, Edgewater Networks, Nokia, Ipsilon Networks and Newbridge Networks. Mr. Martin is a US Patent holder, a recognized security and networking expert and regular speaker at trade shows, partner conferences, insight panels, webinars and other industry events.
  • Tales from the Trenches: Cybersecurity War Stories Recorded: Oct 31 2017 35 mins
    Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing
    In today’s business environment, it’s imperative for organizations of all sizes to have a dynamic online presence. However, with always being connected, there comes real risk to your business. Ransomware attacks, like Petya and WannaCry, have demonstrated how businesses can be brought to a halt by locking access to business-critical data. So, how do you protect yourself? What should you be looking for?

    In this fire-side chat with Sam McLane, Head of Security Operations at Arctic Wolf Networks (AWN), hear some of the most interesting attacks that AWN security engineers have successfully hunted down in 2017. You will also get an inside look at:

    - The detection and response process 
    - The communication and teamwork that takes place between a robust Security Operations Center (SOC)-as-a-service and a customer
    - The impact of human augmented machine learning

    When it comes to security, you must take a proactive approach in assessing the risks and vulnerabilities. Register now to learn how!

    About our speaker:

    Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • Day in the life of a CSE: Proactive Hunting for Security Threats Recorded: Oct 10 2017 46 mins
    Ross Phillips, Security Engineer at Arctic Wolf Networks and Sridhar Karnam, Director of Product Marketing
    Threat hunting, one of the hottest topics in cybersecurity, can be an important weapon for any IT security team. It focuses on identifying perpetrators who are already within an organization's systems and networks.

    In this webinar, Ross Phillips, a lead Security Engineer, will discuss:

    ▪ What is the difference between proactive hunting vs reactive hunting
    ▪ Even with the right forensic investigation tools, why hunting is still critical
    ▪ Key hunting methods, tools, and techniques

    Security threats can remain hidden for months or even years before triggering an alert. If you wait, the consequences can be severe. Register now to learn more about the impact of proactive hunting when it comes to cyberthreats.

    About the speaker:

    Ross Phillips graduated from RIT in March 2012 with a degree in Information Security & Network Forensics. Since then Ross has worked doing security analysis, application testing and incident handling / response for companies such as Liberty Mutual, Paychex, and Google.
  • CEO Insights on Overcoming Ransomware Recorded: Sep 28 2017 48 mins
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks
    With the changing nature of the cyber-threat landscape, companies are now looking at ransomware differently than your typical malware attack. Ransomware can attack your company's infrastructure which in turn can debilitate your day-to-day operations and cause billions of dollars in losses annually. Ransomware is hardly new, but continues to be a very dangerous trend.

    With over 30 years of experience, tune into this intriguing fireside chat to hear insights from Arctic Wolf's CEO, Brian NeSmith. In this webinar, Brian will discuss the following:

    - Why traditional backup strategies fail
    - 5 Things IT should do if exposed
    - Preventative measures to ensure your company's data security

    Security solutions and users now have to be more smarter than ever before, so don't let a ransomware attack outsmart you. Register today to learn how!

    About the Speaker
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • Breaking Down Cloud Security Recorded: Sep 26 2017 1 min
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    To better understand what cloud security means to you, watch this short clip now.
  • Should you build or buy your security? Recorded: Sep 21 2017 1 min
    Arctic Wolf Networks
    In this short video clip, gain insights into whether it is best for your organization to build or buy a security operations center (SOC).
  • How does Hybrid AI Fit in Your Security's Future? Recorded: Sep 20 2017 3 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    When it comes your security's future, what's the difference between Artificial Intelligence vs Hybrid AI? Watch this short video clip find out!
  • IoT is Wildly Insecure – How to protect your wall Recorded: Sep 12 2017 2 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    You are the shield that guards your realm so don’t let IoT penetrate your wall. As your organization begins to incorporate more connected devices, how do you protect your network? Watch this video clip to learn more!
  • CTO's Perspective on Creating a Template for an Incident Response Recorded: Sep 7 2017 49 mins
    Sam McLane, CTO/Head of Security Ops; Dave Martin, Head of Product Mgmt; Sridhar Karnam, Director of Product Mktg
    When you have a security incident, do you have a documented incident response plan? If not, who makes the decisions? These incidents could result in a complicated and costly legal, regulatory, and/or security proceedings. The people, process, and technology responsible for responding to these incidents are collectively known as Incident Response (IR).

    For those who don’t yet have a set plan but are looking to establish one, having a template to reference can be helpful. There are number of key pieces that should be incorporated into every incident response plan.

    Join us for a panel discussion featuring our CTO, head of product management, and head of product strategy as they talk about executing an incident response plan. The discussion will cover:

    •How to create a template for IR
    •What are the critical elements of an IR plan
    •Testing frequency and methods to ensure you have a good IR plan in place

    About Our Key Speaker: Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University.
  • Security Breaches: Why Endpoint Visibility Is Not Enough Recorded: Aug 31 2017 35 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.

    Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.

    In this webinar, you will learn:
    - What EDR vendors offer beyond EPP solutions
    - Why Endpoint Detection and Response alone is not enough
    - How Managed Detection and Response (MDR) makes up for EDR shortcomings
Managed Detection and Response Service - 24X7 SOC at your service
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. AWN CyberSOC is anchored by Concierge Security Engineers and includes 24×7 monitoring, custom alerting and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf CyberSOC visit www.arcticwolf.com and follow @AWNetworks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Webinar clip - The SMB conundrum with information security
  • Live at: Sep 28 2016 9:30 pm
  • Presented by: Young-Sae Song, VP of Marketing at Arctic Wolf Networks
  • From:
Your email has been sent.
or close