Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Protecting Against Insider Threats
    Protecting Against Insider Threats
    Cosmo Romero and Antonio Sanchez Recorded: Jun 11 2019 55 mins
    In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. Intelisecure’s Cosmo Romero and Forcepoint's Antonio Sanchez will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
  • Illuminating the Dark Web and the Thriving Fraud Economy
    Illuminating the Dark Web and the Thriving Fraud Economy
    Emily Wilson and Jeremy Wittkop Recorded: Jun 4 2019 54 mins
    The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. Inaccurately portrayed as a playground for hitmen and human traffickers, the dark web is, instead, a place where fraudsters leverage tools, tactics, and technology to build scalable (albeit sketchy) business models, collect and co-opt sensitive data, and exploit organizations around the clock. What is the dark web? What drives it? What can we do about it? This session breaks through the myths, and provides attendees with a tactical view of what the dark web is, how it works, and how fraudsters function, trade, and scheme together in the criminal underground.
  • What is NYDFS and How Can I Be Compliant?
    What is NYDFS and How Can I Be Compliant?
    Jeremy Wittkop Recorded: May 14 2019 34 mins
    New York State Department of Financial Services (“DFS”) has introduced new regulations requiring minimum, non-prescriptive requirements for a security program, specifying policies, CISO role, penetration testing, risk assessment, audit trail, access privileges, application security, multifactor authentication, training, encryption, IRP, notifications, etc.

    All firms licensed to do business with the State of New York must comply. Although state regulators have allowed a grace period, firms must show progress taking steps to conform to the new regulations.

    Join InteliSecure's Chief Technology Officer, Jeremy Wittkop and Boldon James as they discuss what is contained in the regulation, who is in scope, how you can use people, processes, and technologies such as Boldon James to become more compliant, and some of the consequences associated with a failure to do so.
  • Protecting Critical IP
    Protecting Critical IP
    Jeremy Wittkop & Cosmo Romero Recorded: Mar 21 2019 40 mins
    At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.
  • NIST Risk Management Framework 2.0 and You: Practical Application Advice
    NIST Risk Management Framework 2.0 and You: Practical Application Advice
    Jeremy Wittkop Recorded: Feb 19 2019 39 mins
    The National Institute of Standards and Technology has released an update to their Risk Management Framework (RMF). It is creatively titled RMF 2.0. Notably part of its much longer official name, the framework focuses on taking a “System Life Cycle Approach for Security and Privacy”. What does that mean? Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop [Date and Time] to find out!
    Specific discussion topics include:

    •Risk Management Framework 2.0 Seven Major Objectives
    •A Review of what is included in the new “Prepare” step
    •Practical Applications of NIST Framework guidance
    •Privacy Risk Management and the polarity of privacy and security
  • 2019 Next Gen Data Protection
    2019 Next Gen Data Protection
    Andrew Miller and Jeremy Wittkop Recorded: Jan 22 2019 29 mins
    Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

    Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

    Specific discussion topics include:

    - Open Source tools for data theft available to attackers and defenders
    - Understanding how exposed data is found and exploited from an attacker’s perspective
    - What you should do if you identify a potential data breach

Embed in website or blog