Hi [[ session.user.profile.firstName ]]

Another Day, Another Yahoo Breach

What should small and mid-sized businesses take away from the news of (another) Yahoo breach? Tune in for a brief overview of a massive data breach that has come to light.
Recorded Dec 14 2016 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sridhar Karnam, Director of Product Marketing at Arctic Wolf Networks
Presentation preview: Another Day, Another Yahoo Breach

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Why Native Security Features in AWS and Office365 aren't Enough May 8 2018 6:00 pm UTC 60 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • Let's Talk About SOC IT: Discover Why 24x7 Monitoring is Critical May 2 2018 5:30 pm UTC 75 mins
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Discover the SIEMple Life with a Managed SOC May 1 2018 6:00 pm UTC 60 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks
    Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.

    Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:
    - What does it take to build and manage your own SIEM in-house?
    - What security SIEM blind spots can you avoid with a managed security service?
    - How do you determine ROI of a managed service as compared to a SIEM?
  • SOC This Way: Trends Driving the Costs of SME Cybersecurity Apr 26 2018 7:00 pm UTC 75 mins
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    Cybercrime’s threat to small and medium enterprises (SMEs) continues to grow, and legacy security solutions no longer deliver adequate protection. This environment is pushing an increasing number of companies to explore advanced threat detection and response strategies, including in-house Security Operations Centers (SOCs). However, the budgeting stage of SOC planning often delivers a nasty case of sticker shock—and companies that push through find that SOC costs can exceed even pessimistic projections.

    In this webinar we’ll explore the factors that drive surprising SOC costs:

    - Cybersecurity skills shortage
    - Staffing for risk
    - Hidden product requirements and pricing

    To see how a new category of SOCaaS solutions can help businesses control these costs while achieving advanced cybersecurity, register now!
  • Hybrid Defense: How One City Boosted Its Cyber Protection 10X Recorded: Apr 18 2018 37 mins
    Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    In today's landscape, it seems businesses of every size and stripe are at risk of becoming targets of cyberattacks. From government agencies to hospitals, these businesses are increasingly victimized by ransomware attacks and data breaches. So, how do you defend yourself? What do you do when your IT staff lacks the expertise to investigate growing security threats and respond to them in a timely manner? How do you get help from security experts to prevent suffering a future breach?

    Join the City of Sparks (NV) IT decision maker, Steve Davidek, to discover the security challenges faced by most governments and business organizations. Learn how an industry-leading security operations center (SOC)-as-a-service–the AWN CyberSOC–helped the City of Sparks vastly improve its threat detection and response.

    In this webinar, we will explore:

    - Key security challenges that plagued the City of Sparks
    - Reasons why Sparks’ IT team chose our SOC-as-a-service solution instead of building one in-house
    - How AWN CyberSOC™ with Hybrid AI improved Sparks’ threat detection and response by 10X

    Don’t let your organization become a prime target. Register today!

    About our key speaker:

    Steve Davidek has worked in the IT division at the City of Sparks starting as a Computer Operator in 1984 and working in IT Operations for the next 30 years. He was appointed IT Manager in March of 2014.

    Steve’s division is responsible for all Technology projects and budgeting. His team of 8 manages everything from Desktop support, Server Management, Networking, Security, and Systems. Development and Management for all departments at the city including Police, Fire, Public Works, Finance, Planning, City Management, Municipal Court and Recreation.
  • Top 5 Best Practices for Connected Devices Recorded: Apr 10 2018 2 mins
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks
    In this clip, discover one of the top 5 best practices you can adopt to improve your overall security posture and recognize how you can equip your business with the security capabilities of a large enterprise, at a fraction of their costs!
  • Discover How a Security Expert Makes a Difference Recorded: Apr 9 2018 2 mins
    Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing
    In this clip, discover some key insights from Sam McLane, Head of Security Operations, at Arctic Wolf Networks (AWN), on the importance of having a Concierge Security Engineer(CSE) on your side, who can act as your trusted advisor for your IT team.
  • Protect Your Business: Top 5 Best Practices for Connected Devices Recorded: Apr 3 2018 30 mins
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks
    IoT devices are increasingly connected to conventional IT infrastructures, to improve operational efficiencies and ease of remote management. IT leaders are now responsible for connecting doctors, nurses, patients, and medical devices, or enabling financial advisors on the road, to deliver services to their clients. From enabling services via remote mobile devices, to managing IP-connected cameras on-premises at the same time, running this new converged IT ecosystem, that includes Operational Technology (OT), can be a daunting task. Especially when your attack surface has now dramatically expanded.

    According to Verizon's 2017 Data Breach Investigations Report, a total of 51% of data breaches affected either financial services businesses (24%), healthcare organizations (15%), or public sector entities (12%). With the rise in data breaches in these industries, and the responsibility to manage this connected ecosystem, how do you protect your business from attacks targeting connected devices? Furthermore, how do you do this without the budget to build and staff a full-fledged Security Operations Center (SOC)?

    Join us to discover the top 5 best practices you can adopt to improve your overall security posture and recognize how you can equip your business with the security capabilities of a large enterprise, at a fraction of their costs!
  • Operational Insights: How a Security Expert Defends Your Network's Blind Spots Recorded: Mar 29 2018 31 mins
    Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing
    With an ever-changing threat landscape, the need for skilled security experts who can address your real business risks is at an all-time high. IT organizations who do not have the budget to hire security experts, are looking for help to hunt and triage advanced attacks, weed out false-positives, and address cyber threats that truly matter to their business.

    In this upcoming webinar, get key insights from Sam McLane, Head of Security Operations, at Arctic Wolf Networks (AWN), on the importance of having a Concierge Security Engineer(CSE) on your side, who can act as your trusted advisor for your IT team.

    By attending, you will:

    - Discover the role of a CSE in AWN's SOC-as-a-service offering
    - Understand how a CSE-based service is different from other managed-SIEM/SOC services
    - Explore real life examples of how a CSE tackles security issues proactively for our customers

    About our speaker:

    Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Recorded: Mar 20 2018 40 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Boost Cyber Security with Human Augmented Machine Learning Recorded: Mar 15 2018 48 mins
    Matthew Thurston, Chief Architect - Arctic Wolf Networks
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • SOC-as-a-Service, MDR, MSSP or SIEM. Oh my! What’s right for SMEs? Recorded: Mar 6 2018 52 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    With small to mid-size enterprises (SMEs) being increasingly targeted by cyber security attacks, the demand for a solution that provides comprehensive visibility into cyber security threats is now more important than ever before. Amid these concerns, SMEs are also dealing with a shortage of cyber security skills in IT-staffs and the lack of budgets to detect and respond to advanced threats. So, what solutions are currently on the market? What are their pros and cons when it comes to managed detection and response?

    In this webinar, gain key insights into the differences between cybersecurity solutions SOC-as-a-Service, MDR, MSSP, and SIEM, and discover which solution is the best fit for your organization.

    After watching, you will discover why:
    • Cloud-based security-as-a-service is gaining momentum with SMEs
    • SIEM is a great technology for those who can manage it on their own
    • MSSP is great for outsourced security management, but not an answer for better cybersecurity
    • SOC-as-a-Service are the turnkey service that SMEs are looking for

    To determine what’s the best fit for your organization’s security, register now.
  • Key CEO Insights: 2018's Top Cyber Security Predictions Recorded: Mar 6 2018 3 mins
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks
    To learn more about Arctic Wolf's CEO, Brian NeSmith's 2018 predictions, watch this short video clip now.
  • Discover What's Right for SMEs: SOC-as-a-Service, MDR, MSSP or SIEM Recorded: Mar 6 2018 4 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    To determine what’s the best fit for your organization’s security, watch th8is short video now.
  • CEO Insights: 2018's Top Cyber Security Predictions Recorded: Feb 27 2018 41 mins
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks
    As you explore new opportunities to drive business growth in 2018, so are cyber criminals retooling their war chest to exploit your business. As we have seen in 2017, no one is safe.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf Networks, will share his insights on the top 7 predictions to look out for in 2018.

    Here is a preview of the top 3 predictions that is bound to surprise you.
    - AI will not improve security. You will need Hybrid-AI.
    - The US voting system will undergo major changes
    - A major corporation will get caught with its sticky hands in the cookie jar

    With these challenges, investing in prevention tools alone is not enough to counteract new cyber-attacks. Focusing on threat detection and response becomes necessary to address these sophisticated attacks that will continue to bypass their perimeter defenses.

    To learn more about these 2018 predictions and to see how you can protect your on-premise IT infrastructure and cloud-based resources, with an industry leading SOC-as-a-service, register now.

    About our speaker:
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • Hybrid Defense: How to Defeat 2018's Biggest Threats Recorded: Feb 8 2018 32 mins
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    There’s one certainty in cybersecurity: next year’s attacks are going to be even worse than the ones we faced this year. So, how are cybersecurity experts and vendors gearing up to meet these new threats? In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
  • How to Defeat 2018's Biggest Threats with the Hybrid Defense? Recorded: Jan 31 2018 2 mins
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    To see how you can beat the big threats of 2018 with Hybrid AI, check out our brief video clip on the importance of a security operations center with Hybrid AI.
  • Breaking Down Cloud Security: Discover What it Means to You Recorded: Jan 23 2018 37 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • Human vs Machine: Is Hybrid AI SOC in Your Security's Future? Recorded: Jan 11 2018 31 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Explore SIEMplicity with a Managed SOC Recorded: Jan 10 2018 2 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks
    For Small to Medium Enterprises (SMEs) discover why a SOC is not a SIEM and the benefits of a managed SOC when it comes to your security in this brief video clip.
Managed Detection and Response Service - 24X7 SOC at your service
Arctic Wolf answers the question, “Am I Safe?”, with our turnkey SOC-as-a-service. AWN’s Concierge Security Engineers improve threat detection by up to 10X, leveraging our hybrid AI, custom rules engine and security optimized data architecture. These innovations provide a superior threat detection and response platform for proactively hunting threats, performing remote forensics analysis of incidents, and delivering actionable remediation recommendations. For more information about Arctic Wolf CyberSOC visit www.arcticwolf.com and follow @AWNetworks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Another Day, Another Yahoo Breach
  • Live at: Dec 14 2016 8:00 pm
  • Presented by: Sridhar Karnam, Director of Product Marketing at Arctic Wolf Networks
  • From:
Your email has been sent.
or close