Hi [[ session.user.profile.firstName ]]

2019 Next Gen Data Protection

Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

Specific discussion topics include:

- Open Source tools for data theft available to attackers and defenders
- Understanding how exposed data is found and exploited from an attacker’s perspective
- What you should do if you identify a potential data breach
Recorded Jan 22 2019 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Andrew Miller and Jeremy Wittkop
Presentation preview: 2019 Next Gen Data Protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing Your Multi-Cloud Oct 29 2019 5:00 pm UTC 60 mins
    Jeremy Wittkop & Cosmo Romero
    One of the most important ways to reduce risk and stay compliant within an organization revolves around secure access to regulated or critical data. Whether protecting state, federal, internationally regulated data or whether protecting intellectual property specific to an organization, secure access is a way to reduce risk with respect to sensitive information. Intelisecure’s CTO Jeremy Wittkop is going talk through the technologies and process around secure access along with the process and technologies to ensure information accessed security and with the proper controls and governance in place to ensure risk is kept to a minimum.
  • Combining Insider Threat and Protecting Critical IP Sep 10 2019 5:00 pm UTC 60 mins
    Jeremy Wittkop & Cosmo Romero
    At the heart of every Insider Threat program is protecting Critical Intellectual Property from Insider risk. Intelisecure’s CTO will discuss how Insider Risk and critical Intellectual property intersect, “Combining Insider Threat and Protecting Critical IP” webinar will outline the risks associated with having a data protection program without an Insider Risk Program and what organizations can do in order to properly protect their intellectual property of from insider threats based on processes and technologies.
  • Insider Threat Jun 4 2019 5:00 pm UTC 60 mins
    Jeremy Wittkop & Cosmo Romero
    In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. Intelisecure’s CTO Jeremy Wittkop will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
  • Protecting Critical IP Recorded: Mar 21 2019 40 mins
    Jeremy Wittkop & Cosmo Romero
    At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.
  • NIST Risk Management Framework 2.0 and You: Practical Application Advice Recorded: Feb 19 2019 39 mins
    Jeremy Wittkop
    The National Institute of Standards and Technology has released an update to their Risk Management Framework (RMF). It is creatively titled RMF 2.0. Notably part of its much longer official name, the framework focuses on taking a “System Life Cycle Approach for Security and Privacy”. What does that mean? Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop [Date and Time] to find out!
    Specific discussion topics include:

    •Risk Management Framework 2.0 Seven Major Objectives
    •A Review of what is included in the new “Prepare” step
    •Practical Applications of NIST Framework guidance
    •Privacy Risk Management and the polarity of privacy and security
  • 2019 Next Gen Data Protection Recorded: Jan 22 2019 29 mins
    Andrew Miller and Jeremy Wittkop
    Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

    Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

    Specific discussion topics include:

    - Open Source tools for data theft available to attackers and defenders
    - Understanding how exposed data is found and exploited from an attacker’s perspective
    - What you should do if you identify a potential data breach
Data Protection Made Easy
InteliSecure is a managed security services provider specializing in data protection. With more than 15 years’ experience, 500 plus customers and 2 plus million users, companies large and small rely on our services and specialists to protect the integrity and safety of their sensitive information. We make data security and compliance easy by providing more effective data protection services at lower cost, eliminating the strain on IT organizations, and reducing the risk of confidential information getting into the wrong hands.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2019 Next Gen Data Protection
  • Live at: Jan 22 2019 6:00 pm
  • Presented by: Andrew Miller and Jeremy Wittkop
  • From:
Your email has been sent.
or close