Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Protecting Critical IP
    Protecting Critical IP
    Jeremy Wittkop & Cosmo Romero Recorded: Mar 21 2019 40 mins
    At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.
  • NIST Risk Management Framework 2.0 and You: Practical Application Advice
    NIST Risk Management Framework 2.0 and You: Practical Application Advice
    Jeremy Wittkop Recorded: Feb 19 2019 39 mins
    The National Institute of Standards and Technology has released an update to their Risk Management Framework (RMF). It is creatively titled RMF 2.0. Notably part of its much longer official name, the framework focuses on taking a “System Life Cycle Approach for Security and Privacy”. What does that mean? Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop [Date and Time] to find out!
    Specific discussion topics include:

    •Risk Management Framework 2.0 Seven Major Objectives
    •A Review of what is included in the new “Prepare” step
    •Practical Applications of NIST Framework guidance
    •Privacy Risk Management and the polarity of privacy and security
  • 2019 Next Gen Data Protection
    2019 Next Gen Data Protection
    Andrew Miller and Jeremy Wittkop Recorded: Jan 22 2019 29 mins
    Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

    Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

    Specific discussion topics include:

    - Open Source tools for data theft available to attackers and defenders
    - Understanding how exposed data is found and exploited from an attacker’s perspective
    - What you should do if you identify a potential data breach

Embed in website or blog