Hi [[ session.user.profile.firstName ]]

CEO Insights: 2018's Top Cyber Security Predictions

As you explore new opportunities to drive business growth in 2018, so are cyber criminals retooling their war chest to exploit your business. As we have seen in 2017, no one is safe.

In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf Networks, will share his insights on the top 7 predictions to look out for in 2018.

Here is a preview of the top 3 predictions that is bound to surprise you.
- AI will not improve security. You will need Hybrid-AI.
- The US voting system will undergo major changes
- A major corporation will get caught with its sticky hands in the cookie jar

With these challenges, investing in prevention tools alone is not enough to counteract new cyber-attacks. Focusing on threat detection and response becomes necessary to address these sophisticated attacks that will continue to bypass their perimeter defenses.

To learn more about these 2018 predictions and to see how you can protect your on-premise IT infrastructure and cloud-based resources, with an industry leading SOC-as-a-service, register now.

About our speaker:
Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
Recorded Feb 27 2018 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks
Presentation preview: CEO Insights: 2018's Top Cyber Security Predictions

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protect & Improve Your Business: Top 5 Best Practices for Connected Devices Oct 11 2018 6:00 pm UTC 30 mins
    Sonu Shankar, Senior Product Marketing Manager, Arctic Wolf Networks
    IoT devices are increasingly connected to conventional IT infrastructures, to improve operational efficiencies and ease of remote management. IT leaders are now responsible for connecting doctors, nurses, patients, and medical devices, or enabling financial advisors on the road, to deliver services to their clients. From enabling services via remote mobile devices, to managing IP-connected cameras on-premises at the same time, running this new converged IT ecosystem, that includes Operational Technology (OT), can be a daunting task. Especially when your attack surface has now dramatically expanded.

    According to Verizon's 2017 Data Breach Investigations Report, a total of 51% of data breaches affected either financial services businesses (24%), healthcare organizations (15%), or public sector entities (12%). With the rise in data breaches in these industries, and the responsibility to manage this connected ecosystem, how do you protect your business from attacks targeting connected devices? Furthermore, how do you do this without the budget to build and staff a full-fledged Security Operations Center (SOC)?

    Join us to discover:

    - The top 5 best practices you can adopt to improve your overall security posture
    - How you can equip your business with the security capabilities of a large enterprise at a fraction of their costs
  • Discover the SIEMple Life with a Managed SOC Oct 4 2018 6:00 pm UTC 60 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks
    Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.

    Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:

    - What does it take to build and manage your own SIEM in-house?
    - What security SIEM blind spots can you avoid with a managed security service?
    - How do you determine ROI of a managed service as compared to a SIEM?
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Sep 25 2018 6:00 pm UTC 45 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Sep 20 2018 7:00 pm UTC 45 mins
    Dinah Davis, VP Research & Development - Arctic Wolf Networks
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • To Outsource, or Not To Outsource: Best Practices for IT Security Recorded: Sep 13 2018 63 mins
    Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • What Are The Impacts of a Financial Services Data Breach Recorded: Sep 13 2018 3 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    In this webinar clip, we dive into the impact a data breach can have for financial institutions. With smaller IT teams, regional banks and credit unions face similar security and compliance burdens to what larger, well-resourced financial institutions carry. So, what can you do if breached?

    To hear more from our security experts and how to solve the financial services security talent shortage with managed detection, click here: http://bit.ly/2x9qHda
  • What Should Be Your Financial Services Plan for Managing Cyberthreats Recorded: Sep 10 2018 3 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    In this insightful webinar clip, we provide brief insights into how you can manage cyberthreats. Regional banks and credit unions often face the same security and compliance burdens to larger, well-resourced financial institutions with much smaller staffs. So, what should your security plan for managing cyberthreats look like?

    To hear more from our security experts and how to solve the financial services security talent shortage with managed detection, click here: http://bit.ly/2x9qHda
  • Where Are the Gaps in Cloud Security? Recorded: Sep 10 2018 3 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks
    In this webinar clip, learn about the gaps in cloud security. Most businesses are rapidly moving to the cloud. These new architectures have powerful new capabilities, but also expose businesses to a new universe of risks.

    To hear more from our security experts and how AWN security monitoring compliments the need of security features in AWS and Office365, watch the full webinar here: http://bit.ly/2x5rQRT
  • Hybrid Defense: How the City of Sparks Defends Against Cyberthreats Recorded: Sep 6 2018 38 mins
    Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Businesses of every size and stripe risk becoming targets of cyberattacks. From governments to hospitals, these businesses are increasingly victimized by ransomware attacks and data breaches. So, how do you defend yourself? What do you do when your IT staff lacks the expertise to investigate growing security threats and respond to them in a timely manner? How do you get help from security experts to prevent suffering a future breach?

    Join Arctic Wolf Network’s customer, the City of Sparks (NV), in our upcoming webinar to discover the security challenges faced by most governments and business organizations. Learn how our industry-leading security operations center (SOC)-as-a-service – the AWN CyberSOC – helped the City of Sparks vastly improve its threat detection and response.

    This webinar will explore:

    - Key security challenges that plagued the City of Sparks
    - Reasons why Sparks’ IT team chose our SOC-as-a-service solution instead of building one in-house
    - How AWN CyberSOC™ with Hybrid AI improved Sparks’ threat detection and response by 10X

    Don’t let your organization become a prime target. Register today!
  • Progression of Ransomware Recorded: Sep 5 2018 3 mins
    Dinah Davis, VP Research & Development - Arctic Wolf Networks
    In this video clip. Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, highlights the progression of ransomware.

    To watch the full webinar, click here: https://arcticwolf.com/resources/webinars/?utm_source=Arctic+Wolf+Networks&utm_medium=brighttalk&commid=331015
  • Best Practices for Reducing Your Attack Surface with Vulnerability Management Recorded: Aug 23 2018 38 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

    Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

    •Trends affecting your attack surface
    •Need for vulnerability management program
    •What should you look for in an external vulnerability scan report

    Register today to hear from this expert!
  • Overcoming The Cybersecurity Skills Shortage in Law Firms Recorded: Aug 16 2018 40 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

  • Solving the Financial Services Security Talent Shortage with Managed Detection Recorded: Aug 14 2018 39 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Attend this webinar and learn about:

    • Top cyberthreats facing financial institutions
    • Financial services compliance evolution, security monitoring and incident response
    • Differences between SIEM, SOC, and SOC-as-a-service
    • Monitoring on premises and cloud resources without adding headcount

    To gain insights on these challenges and how to solve them, save your seat now!
  • Hybrid Defense: Boost Cybersecurity with Human Augmented Machine Learning Recorded: Aug 9 2018 49 mins
    Matthew Thurston, Chief Architect - Arctic Wolf Networks
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cybersecurity, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Operational Insights: How a Security Expert Defends Your Network's Blind Spots Recorded: Jul 26 2018 32 mins
    Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing
    With an ever-changing threat landscape, the need for skilled security experts who can address your real business risks is at an all-time high. IT organizations who do not have the budget to hire security experts, are looking for help to hunt and triage advanced attacks, weed out false-positives, and address cyber threats that truly matter to their business.

    In this upcoming webinar, get key insights from Sam McLane, CTSO, at Arctic Wolf Networks (AWN), on the importance of having a Concierge Security Engineer(CSE) on your side, who can act as your trusted advisor for your IT team.

    By attending, you will:

    - Discover the role of a CSE in AWN's SOC-as-a-service offering
    - Understand how a CSE-based service is different from other managed-SIEM/SOC services
    - Explore real life examples of how a CSE tackles security issues proactively for our customers

    About our speaker:

    Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • SOC-as-a-Service, MDR, MSSP or SIEM. Oh my! What’s right for SMEs? Recorded: Jul 17 2018 53 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    With small to mid-size enterprises (SMEs) being increasingly targeted by cyber security attacks, the demand for a solution that provides comprehensive visibility into cyber security threats is now more important than ever before. Amid these concerns, SMEs are also dealing with a shortage of cyber security skills in IT-staffs and the lack of budgets to detect and respond to advanced threats. So, what solutions are currently on the market? What are their pros and cons when it comes to managed detection and response?

    In this webinar, gain key insights into the differences between cybersecurity solutions SOC-as-a-Service, MDR, MSSP, and SIEM, and discover which solution is the best fit for your organization.

    After watching, you will discover why:
    • Cloud-based security-as-a-service is gaining momentum with SMEs
    • SIEM is a great technology for those who can manage it on their own
    • MSSP is great for outsourced security management, but not an answer for better cybersecurity
    • SOC-as-a-Service are the turnkey service that SMEs are looking for

    To determine what’s the best fit for your organization’s security, register now.
  • Impact of a Law Firm Data Breach Recorded: Jul 17 2018 3 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    Check out this webinar clip from our insightful talk on "Overcoming The Cybersecurity Skills Shortage in Law Firms" to understand which areas of a law firm can be affected by a data breach.

    To see the full webinar, click here: https://arcticwolf.com/resources/webinars/?utm_source=Arctic+Wolf+Networks&utm_medium=brighttalk&commid= 330632
  • What Are the Key IT Security Services Covered by Third Parties? Recorded: Jun 5 2018 2 mins
    Narayan Makaram, Sr Director of Product Marketing - Arctic Wolf
    In this video clip, discover what security functions can be handled by third parties and what should be kept in-house. However, is this enough for you and your business?

    To watch the full webinar on how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it, click here: https://arcticwolf.com/resources/webinars/?utm_source=Arctic+Wolf+Networks&utm_medium=brighttalk&commid=321811
  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service Recorded: May 22 2018 57 mins
    Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks
    Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?

    In this upcoming webinar, Tuesday, May 22, at 11am PT/2 pm ET, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.

    By attending this webinar you will learn about:

    • Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
    • Insights into what is driving the need for managed threat detection and response
    • The top 10 essential elements of a SOC-as-a-Service

    To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!

    About our key speaker:

    Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
  • Hybrid Defense: How to Defeat 2018's Biggest Threats Recorded: May 17 2018 32 mins
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?

    In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
Managed Detection and Response Service - 24X7 SOC at your service
Arctic Wolf answers the question, “Am I Safe?”, with our turnkey SOC-as-a-service. AWN’s Concierge Security Engineers improve threat detection by up to 10X, leveraging our hybrid AI, custom rules engine and security optimized data architecture. These innovations provide a superior threat detection and response platform for proactively hunting threats, performing remote forensics analysis of incidents, and delivering actionable remediation recommendations. For more information about Arctic Wolf CyberSOC visit www.arcticwolf.com and follow @AWNetworks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CEO Insights: 2018's Top Cyber Security Predictions
  • Live at: Feb 27 2018 6:00 pm
  • Presented by: Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks
  • From:
Your email has been sent.
or close