Resources

Home / Resources

Arete Resources

Datasheets

Cybersecurity Capabilities Brochure

Cybersecurity Capabilities Brochure

Managed Cybersecurity Services Datasheet

Managed Cybersecurity Services

Legal Datasheet

Legal Services

Incident Response Datasheet

Incident Response

Cyber Risk Management for Insurance Professionals Datasheet

Strategies for Cyber Risk Management
for Insurance Professionals

Penetration Testing Datasheet

Penetration Testing

Social Engineering/Phishing Datasheet

Social Engineering/Phishing

Case Studies

Global Merchant Case Study

Global Merchant

International Reseller Case Study

International Reseller

Webinars

Cybersecurity Incident Response: Four Lessons to Learn from High Profile Cases

April 11, 2018
Speakers: Jim Jaeger (Arete Advisors), Doug Hudson (Coalfire), Chris Lietz (Coalfire)

Most enterprises know that they are constantly under attack and are continuously at risk of losing control of sensitive or confidential information. That’s why it is a commonly-accepted best practice to have an incident response plan in place and to practice it regularly. However, after examining the plans and practice exercises of hundreds of clients, we have observed that many organizations still haven’t fully embraced the hard lessons we all can learn from real-world, high-profile security incidents. Join experts from Coalfire and Arete Advisors to deconstruct the response efforts from several high-profile incidents and provide practical lessons you can learn and apply to your organization’s incident response plans and the proactive steps you can take to avoid damaging losses and impacts to your organization.

You Cannot Protect What You Don’t Know or Can’t See: Next Generation Network Must Haves for Data Protection and Endpoint Forensics

April 5, 2018
Speakers: Jim Jaeger (Arete Advisors), Jared Phipps (SentinelOne), Chris Bates (SentinelOne)

A data breach happens in seconds, but identifying that a breach has even occurred takes an average of 191* days. 50% of web traffic today is encrypted, (and Gartner predict this will increase to 80% by 2019**), providing a simple trick for attackers to hide their threats and communications channels. Securing your endpoints is the most effective way to manage cyber risk. However, the endpoint is the most vulnerable and exposed attack surface in the network today.

WATCH NOW