Hi [[ session.user.profile.firstName ]]

Best Practices for Reducing Your Attack Surface with Vulnerability Management

Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

- Trends affecting your attack surface
- Need for vulnerability management program
- What should you look for in an external vulnerability scan report

Register today to hear from this expert!
Recorded Feb 13 2019 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
Presentation preview: Best Practices for Reducing Your Attack Surface with Vulnerability Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • People Risk: Understanding Your Most Important & Most Vulnerable Assets Oct 30 2019 5:00 pm UTC 60 mins
    Matt Duench
    99% of all cyberattacks require some level of human interaction or intervention. Bad actors follow the path of least resistance, so it’s no surprise that human behavior can be your organization’s biggest cybersecurity risk.

    Although no single approach is effective on its own in preventing negligence and insider threats; adding layers of people risk diligence to cybersecurity policies can greatly reduce your insider threat exposure.

    During this webinar, we’ll look at some recent examples of insider threats, cover methods for reducing your insider threat exposure, and focus on how you can minimize people risk from effective cyber security training to methods for managing your cyber risk profile.
  • 2019 Data Breaches: What We’ve Learned From The Worst Year in Cybersecurity Recorded: Oct 9 2019 56 mins
    Louis Evans, Product Marketing Manager, Arctic Wolf
    From global enterprises to small cities and counties, no industry was spared from cyberattacks in 2019. Millions of records were stolen, internal operations slowed to a halt, and communications teams worked overtime to explain exactly what happened to disgruntled stakeholders, despite a lack of immediate answers.

    For security leaders, 2019 breaches underscored that cyberattacks were no longer a question of “if?” but “when?”

    In this webinar, cybersecurity industry veteran Louis Evans will recap some of the most damaging breaches of 2019, including those experienced by Capital One, LabCorp and Quest, Texas local government entities, and U.S. Customs and Border Protection to understand what went wrong and how to protect your organization from similar threats.

    Attendees will learn:

    - Techniques employed by internal and external actors to access and steal sensitive information
    - Where breached organizations had weaknesses that could be exploited by cybercriminals
    - What lessons can be gleaned from 2019 cyberattacks, and how your organization can avoid becoming a target
  • Think Native Cloud Security Is Enough? Think Again Recorded: Sep 18 2019 64 mins
    Louis Evans, Product Marketing Manager at Arctic Wolf
    Nearly all organizations have some cloud footprint, from traditional businesses using SaaS office applications such as Salesforce or Office365, to cloud-first firms running exclusively in AWS or Azure. These cloud solutions offer powerful new ways to drive business efficiencies—but they also expose companies to a new universe of risk.

    IT managers may mistakenly assume that cloud security is out of their hands, for better or worse. But this assumption isn’t true. That’s why it’s incumbent upon businesses to develop a sound security strategy as they migrate to the cloud, while also becoming a proactive security partner with their cloud providers. If not, they’ll find themselves vulnerable to attack.

    This webinar offers strategic insight on how to bolster your cloud security, as Arctic Wolf experts discuss:
    - The top cybersecurity risks–and best practices for securing cloud deployments
    - How Arctic Wolf™ Managed Detection and Managed Risk complement cloud-native security features across major cloud platforms
    - Arctic Wolf’s role in integrating observations from cloud and on-premise systems

    See how Arctic Wolf can secure your cloud. REGISTER NOW!
  • The Importance of Risk Management Solutions in the “Age of the Breach” Recorded: Aug 20 2019 33 mins
    Matt Duench, Product Marketing Manager, Arctic Wolf
    As you read this, a business somewhere is falling victim to a new cyberattack and potentially losing millions of dollars. That’s because on average it takes hackers only a week to exploit new vulnerabilities, while businesses take four months to patch them. Don’t let your company be next.

    Attend this important webinar on vulnerability assessment and risk management where security expert Matt Duench from Arctic Wolf examines the challenge of breaches, how they happen, and what you can do to stop them. Find out:
    - Why the cybersecurity skills shortage leaves companies especially vulnerable
    - How to extend your perimeter security with risk management
    - How a SOC-as-a-service provides comprehensive security for companies of every size
  • Benefits of Building vs Buying Your Security Recorded: Jun 5 2019 53 mins
    Michael Suby, VP, Research - Frost & Sullivan & Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    Frost & Sullivan TCO Analysis: Building Your Own SOC vs. Buying SOC-as-a-Service

    For modern businesses, a Security Operations Center (SOC) is no longer an option. It is a necessity. But building and maintaining a fully functional SOC is a daunting proposition. Cost is a top consideration, driven overwhelmingly by a SOC’s need for a high number of in-demand security experts. Hiring, training, and retaining the necessary talent to staff a SOC is flatly impractical for many businesses.

    Fortunately there is a viable alternative to a DIY SOC: SOC-as-a-Service.

    In this webinar, Michael Suby, VP of Research at Frost & Sullivan, will highlight the compelling value proposition of SOC-as-a-Service compared to building and maintaining an in-house SOC. Included in this webinar are:

    - Real-world use cases of businesses subscribing to SOC-as-a-Service
    - Head-to-Head quantitative cost comparisons between SOC-as-a-Service and DIY SOC
    - Attributes to demand in a SOC-as-a-Service offering

    About our key speaker:

    A 17-year veteran at Frost & Sullivan, Michael Suby, VP of Research, has concentrated on the evolving threat landscape, practices, and technologies in cybersecurity. Quick to engage on risk and response, Mr. Suby habitually examines emerging cybersecurity technologies before they reach mainstream. Recent examples include server-less security, deception, dynamic defenses, content disarm & reconstruct, remote browser isolation, and cloud access & security brokers (CASB). In partnership with a team of highly experienced cybersecurity analysts at Frost & Sullivan, Mr. Suby is also intimately involved in researching how traditional cybersecurity solutions and platforms are addressing the diverse challenges and pressures encountered by IT and security practitioners.
  • To Outsource, or Not To Outsource: Best Practices for IT Security Recorded: May 22 2019 62 mins
    Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Recorded: May 8 2019 39 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked Recorded: Apr 25 2019 48 mins
    Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf Networks
    At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.

    These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.

    The webinar covers:

    •6 common myths about cybersecurity and cyber risk
    •The threats these myths pose to your business
    •Cybersecurity facts you can use to protect yourself

    Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!

    And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.
  • The SOC-as-a-Service Prescription: Healthcare Cybersecurity & Compliance Recorded: Apr 17 2019 37 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    Monitoring and detecting threats in healthcare faces a number of challenges: sophisticated cyberthreats, HIPAA compliance requirements, budget constraints, and a cybersecurity talent shortage for staff needed to monitor and respond to events. Previous approaches to monitoring have been ineffective and expensive. Managed detection and response (MDR) services provide a way out of this cybersecurity conundrum. This webinar explains how healthcare organizations can improve cybersecurity and compliance with MDR/Security Operations Center (SOC)-as-a-service.

    Join us and discover:
    • The ways a managed detection and response (MDR) service differs from managed security services (MSS).
    • How MDR/SOC-as-a-service provides big savings compared to in-house security info and event management (SIEM) tools.
    • How MDR/SOC-as-a-service helps to fulfill HIPAA compliance requirements.
    • The ways an MDR/SOC-as-a-service improves healthcare security posture and alleviates the cybersecurity talent shortage.

    Save your seat now!
  • Take Control of Vulnerabilities and Threats with Intuitive Risk Analytics Recorded: Apr 16 2019 44 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Vulnerabilities, threats, and risks are commonly mixed up security terms. Several cybersecurity solutions available in the market today give you independent analytics in each of these areas. that does not give you complete understanding of your overall risk posture.

    In this webinar, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will cover the following topics to enable you to address cyber risk.
    • Why vulnerabilities and threats are two sides of the same coin
    • How threat intelligence can be effectively used to add context to risks
    • What types of analytics can address risks that have the largest business impact
  • Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical Recorded: Apr 11 2019 51 mins
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Expert Tips on Detecting and Responding to Data Breaches Recorded: Mar 28 2019 22 mins
    Brad Bierman, Manager of Security Operations - Arctic Wolf Networks
    It is not a matter of if but when a data breach will occur, and whether your IT organization is prepared to detect and respond to it. Experienced hackers are constantly inventing ways to get through your defenses and steal company confidential data or personal identifiable information (PII) to make money. Focusing on prevention alone is not sufficient.

    Brad Bierman, Director of Security Operations at Arctic Wolf Networks, and his team of Concierge Security™ Engineers have helped hundreds of customers detect and respond to data breaches. He will walk through a few cyberattack scenarios and provide expert tips on the following.

    1.What tools do you need to have in place to detect a data breach?
    2.Who do you need to engage to respond to a data breach?
    3.How do you respond appropriately to data breach?

    To learn more, join this webinar!

    About our key speaker:

    Brad Bierman has over 17 years of varied experience in the information security field. Some highlights are communications interceptions, SIEM engineering, mobile and computer forensics, security monitoring, and incident response. Prior to becoming a security professional, Brad was a hardware/firmware engineer for embedded networking solutions.
  • To SIEM, Not to SIEM? Find Out Your Options Recorded: Mar 19 2019 42 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • Beyond Managed Security: Why SOC-as-a-Service is Key for Financial Institutions Recorded: Mar 12 2019 40 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    Managing sensitive financial information and combatting cyberthreats often means finding efficiencies to do more with less. Modestly staffed IT teams often find themselves overwhelmed and challenged to complete projects that benefit the top line while also improving their cybersecurity maturity and meeting compliance obligations.

    With such a wide breadth of responsibility, how can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing or building an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

    Concerns we will address:

    1. Doing more with less: how to free up resources to accelerate projects affecting the top/bottom lines.
    2. How is SOC-as-a-service different than conventional managed security service provider offerings.
    3. Obtaining visibility across on-premises and cloud (SaaS and IaaS) environments

    Save your seat now!
  • Hybrid Defense: How to Defeat 2019's Biggest Threats Recorded: Mar 6 2019 54 mins
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    With the start of 2019, there’s one certainty: this year’s attacks are destined to be more destructive and prevalent than ever before. So, how are cybersecurity experts and vendors gearing up to protect themselves in the face of these new challenges?

    In this webinar, we address major industry trends like machine learning and security orchestration, automation, and response (SOAR), and also dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams— enable any organization to deploy world-class defenses.

    This webinar will explore:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - Managed Detection and Response (MDR) solutions are rising to the challenge of new hybrid-cloud architectures for business
    - SOC-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    See how you can beat the big threats of 2019, save your seat now!
  • Security Expert Panel Discussion: The Next Generation on SOC Recorded: Feb 28 2019 47 mins
    Kelly Higgins, Executive Editor -Dark Reading, Narayan Makaram, Sr. Dir, Product Mktg -Arctic Wolf Networks, Plus Others
    Gone are the days when IT security departments worried about building and managing a secure “perimeter,” and spent an abundance of time managing passwords and access control lists. Security operations centers (SOCs) now do more than simply monitor networks and systems for signs of common cyberthreats; security teams analyze and respond to new, zero-day attacks that evade traditional defenses.

    In this panel discussion led by Dark Reading’s Executive Editor Kelly Jackson Higgins, top SOC experts and leaders from Arctic Wolf and elsewhere offer war stories and recommendations on how to implement the latest tools and practices in SOC operations. You’ll learn how to prepare your organization for the next major security incident, even if your enterprise doesn’t have a SOC in place.

    View the webinar to discover:

    - The many pressures on SOCs and incident responders (skills gap, alert fatigue, etc.)
    - SOCs models—from in-house to outsourced (i.e. Arctic Wolf’s SOC-as-a-service)
    - Must-have SOC tools, and the role of intel feeds, SOAR, and threat hunting
    - The different SOC maturity levels
    - Key emerging technologies (data analytics, machine learning, etc.), and how they’re deployed in SOCs
    - How to prepare a SOC’s security team for the next big security incident
  • Overcoming The Cybersecurity Skills Shortage in Law Firms Recorded: Feb 21 2019 39 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*

    Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?

    In this Arctic Wolf webinar, you will:

    - Discover why cybersecurity is top of mind in the legal community
    - Recognize the IT and Cybersecurity skills shortage and its impact on security
    - Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits

    Save your seat today to learn more!

    *https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security.html
  • Best Practices for Reducing Your Attack Surface with Vulnerability Management Recorded: Feb 13 2019 37 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.

    Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.

    - Trends affecting your attack surface
    - Need for vulnerability management program
    - What should you look for in an external vulnerability scan report

    Register today to hear from this expert!
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Recorded: Feb 7 2019 37 mins
    Dinah Davis, VP Research & Development - Arctic Wolf Networks
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.

    About our key speaker:

    Dinah Davis is the VP of R&D at Arctic Wolf Networks, responsible for the development of the AWN CyberSOCTM product. Dinah holds an M. Math in cryptography from the University of Waterloo. She has over 16 years of experience in the tech industry with time spent as a Security Software Developer at the Communications Security Establishment Canada and BlackBerry, and as a manager at TrustWave and D2l. Dinah is also the founder of Code Like a Girl, a publication whose goal it is to change society’s perceptions of how women are viewed in technology, which has over 36,000 subscribers and a vibrant online community.
  • Hybrid Defense: Boost Your Security with Hybrid AI Recorded: Jan 24 2019 48 mins
    Matthew Thurston, Chief Architect - Arctic Wolf Networks
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cybersecurity, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
Managed Detection and Response Service - 24X7 SOC at your service
Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC™ service is anchored by Concierge Security™ teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response. For more information about Arctic Wolf, visit https://arcticwolf.com.

Don't forget to follow us on Twitter @AWNetworks!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Reducing Your Attack Surface with Vulnerability Management
  • Live at: Feb 13 2019 6:30 pm
  • Presented by: Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
  • From:
Your email has been sent.
or close