Resources

Home / Resources

Arete Resources

Datasheets

Managed Cybersecurity Services Datasheet

Managed Cybersecurity Services

Legal Datasheet

Legal Services

Incident Response Datasheet

Incident Response

Cyber Risk Management for Insurance Professionals Datasheet

Strategies for Cyber Risk Management
for Insurance Professionals

Penetration Testing Datasheet

Penetration Testing

Social Engineering/Phishing Datasheet

Social Engineering/Phishing

Virtual CISO Datasheet

Virtual CISO

Brochures

Cybersecurity Capabilities Brochure

Cybersecurity Capabilities Brochure

Insurance Capabilities Brochure

Insurance Capabilities Brochure

Case Studies

Global Merchant Case Study

Global Merchant

International Reseller Case Study

International Reseller

Webinars

CISOs: Why Driving Your Cyber Liability Insurance Purchasing is Essential

September 12, 2018
Speakers: Jim Jaeger (Arete Advisors), Jared Phipps (SentinelOne)

The critical role of CISOs is emerging in the purchasing decisions in their organization’s Cyber Liability insurance in a way not seen before and the benefits include access to cybersecurity experts, reduced rates, increased communication across the organization, and preparedness for business interruption. In this webinar, Arete and SentinelOne’s cybersecurity experts will discuss the key information CISOs need to be able to build an effective and comprehensive Cyber Insurance Program, Incident Response and Incident Response Retainers, Assessments and how they are an important part of a comprehensive Cyber Insurance Program, and the most effective ways CISOs can help to reduce costs associated with cyber-attacks with next generation deep visibility and automated response.

Cybersecurity Incident Response: Four Lessons to Learn from High Profile Cases

April 11, 2018
Speakers: Jim Jaeger (Arete Advisors), Doug Hudson (Coalfire), Chris Lietz (Coalfire)

Most enterprises know that they are constantly under attack and are continuously at risk of losing control of sensitive or confidential information. That’s why it is a commonly-accepted best practice to have an incident response plan in place and to practice it regularly. However, after examining the plans and practice exercises of hundreds of clients, we have observed that many organizations still haven’t fully embraced the hard lessons we all can learn from real-world, high-profile security incidents. Join experts from Coalfire and Arete Advisors to deconstruct the response efforts from several high-profile incidents and provide practical lessons you can learn and apply to your organization’s incident response plans and the proactive steps you can take to avoid damaging losses and impacts to your organization.

You Cannot Protect What You Don’t Know or Can’t See: Next Generation Network Must Haves for Data Protection and Endpoint Forensics

April 5, 2018
Speakers: Jim Jaeger (Arete Advisors), Jared Phipps (SentinelOne), Chris Bates (SentinelOne)

A data breach happens in seconds, but identifying that a breach has even occurred takes an average of 191* days. 50% of web traffic today is encrypted, (and Gartner predict this will increase to 80% by 2019**), providing a simple trick for attackers to hide their threats and communications channels. Securing your endpoints is the most effective way to manage cyber risk. However, the endpoint is the most vulnerable and exposed attack surface in the network today.

WATCH NOW

ISSA International Series: Privacy vs. Security Webinar

February 27, 2018
Speakers: Jim Jaeger (Arete Advisors)

We are all concerned about Privacy. Every day there we hear about multiple PII breach announcements. Our current solution – let’s create laws to require announcements and levy fines to encourage proper activities and protections. With GDPR looming on the horizon, as the most recent and perhaps the most comprehensive regulation yet, we find ourselves wondering if others will adopt similar regulations. If so, do we as security professionals need to be concerned about our ability to perform forensic analysis, and gather information outside of our realm of direct influence to identifier a hacker? Do elements of GDPR create a situation in which hunting for a hacker might violate their privacy rights? In the end will companies still be able to monitor and protect their assets as they do today, or will it require a change? This webinar will provide insight into the Privacy vs Security Debate.

Reports

SANS IR 2018 Final Report

SANS IR 2018 Final Report