Hi [[ session.user.profile.firstName ]]

A Look at Next-Generation Data Protection Technology

Lack of budget and security personnel, as well as increased threats from a mobile workforce, are causing companies to scramble. This webinar, A Look at Next-Generation Data Protection Technology, will discuss a new wave of data security practices, tools, automation, and targeted triage which will protect organizations’ digital assets against modern threats. We will also discuss how organizations are currently leveraging these tools and processes to thwart damage caused by trusted insiders.

Join InteliSecure’s data security expert and Solution Architect Cosmo Romero as he discusses what the next generation of data security is going to look like.

Topics include:
•Current data security programs
•Why existing data security controls are failing
•Data security in a Zero-Trust model
•User analytics’ contribution to a Zero-Trust model
Recorded Sep 10 2019 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Cosmo Romero, Sr. Solutions Architect
Presentation preview: A Look at Next-Generation Data Protection Technology

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Choosing a Data Protection Partner for a Changing World Dec 19 2019 5:00 pm UTC 37 mins
    Skyler Butler, Director of Product Management, InteliSecure
    In the last of our four-part series, Skyler Butler from InteliSecure describes what to do after you’ve implemented your technology of choice. When it comes to day-to-day operations, most IT security organizations struggle to meet compliance and protection requirements. Should you staff and run your internal SOC or rely on external partners? What factors and costs should you consider in your decision? Join us to discuss how to ensure success, and choosing the appropriate outsourcing options for your cloud strategy.

    Topics:
    •How to make the conceptual real
    •Outsourcing decision factors
    •A look at total costs
    •How to choose a partner
  • Securing the New Edge for Data Protection Recorded: Nov 19 2019 49 mins
    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
    You’ve witnessed the changing data security landscape. You’ve watched the traditional perimeter disappear. Now you need to secure the new edge for data protection. In part 3 of this 4-part series, we’ll describe:

    •How to analyze your cloud usage to understand risk
    •Review the Symantec Technology Stack
    •Focus on where to start

    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, continue to lay out the way to champion your evolving data protection needs.
  • Next-Generation Data Protection: Risk-Adaptive, Not Reactive Recorded: Nov 19 2019 42 mins
    Carl Leonard, Principal Security Analyst at Forcepoint and Jacob Woodfield, Solutions Architect at InteliSecure
    Digital transformation initiatives and the migration from on-premises to cloud computing are changing everything. In addition to facing dramatically greater security risks, IT organizations are overwhelmed with “false positives”, consuming their precious and costly resources chasing erroneous alerts. Rather than reacting to the changes, this webinar will discuss how a new wave of data security practices, tools, automation, and targeted triage proactively and dynamically protects your digital assets against today’s threats.

    Carl Leonard, Principal Security Analyst at Forcepoint and Jacob Woodfield, Solutions Architect at InteliSecure, help you take control of your data security program. They will answer these important questions:

    • What is wrong with today's Data Security programs?
    • What can we learn from Zero Trust and CARTA approaches?
    • What does a Next-Generation Data Protection solution look like?
    • How can you adopt a Risk-Adaptive Protection solution?
  • Ask the Experts: Data Protection Q&A with Mark Rosenthal Recorded: Nov 1 2019 42 mins
    Mark Rosenthal, Director of Consulting Services and Patrick Connery, Account Manager
    Data protection programs should be the center focus of any organization’s security program as companies begin to implement, reevaluate, or continue to mature their programs. Building a data protection program that conforms to the new workflow has many challenges, due to the way data is created, stored, and transmitted.
    Join us for an interview with Mark Rosenthal, Director of Consulting Services at InteliSecure, to learn the answers to the most common questions surrounding data protection programs, including the following:
    •Where are most organizations currently with regards to securing critical information?
    •What are the best methods for organizations to evaluate their current program?
    •What can organizations expect while deploying DLP and related technologies?
    •Why do data protection programs typically fail, and how can you avoid common pitfalls?
    Patrick Connery and Mark Rosenthal will discuss these topics and answer your questions, in order to help you define your data protection goals and program for 2020.
  • Surviving the Death of the Traditional Perimeter Recorded: Oct 22 2019 32 mins
    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
    The traditional perimeter is dead. In today’s cloud world, you must ensure compliance (GDPR, CCPA) while your organization transforms itself to the new digital realities. How can you keep pace? In part 2 of this 4-part series, we’ll describe:

    •How to protect critical information in the modern world, including modern architecture with your mobile workforce
    •Why the perimeter is dead—and isn’t coming back
    •Current tech stacks and “must haves” in your security strategy
    •How to attack the problem
    •Challenges implementing and changing to data protection as a service

    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, help you stay afloat and sail into a future of easy compliance and reduced business risk.
  • Applying Next-Generation Data Protection Recorded: Oct 10 2019 47 mins
    Karlene Berger, Director of Marketing at Forcepoint and Cosmo Romero, Sr. Solutions Architect at InteliSecure
    Is your security challenged at scaling, feeling like you spend all your time triaging alarms and alerts, and chasing a high volume of false positives? This webinar, Applying Next-Generation Data Protection, will discuss how a new wave of security technology will allow you unify your data protection strategy and take advantage of analytics of behavior

    Join InteliSecure’s data security expert and Solution Architect Cosmo Romero, along with special guest Karlene Berger, Director of Marketing from Forcepoint, they talk about how to take advantage of risk-adaptive security practices.

    Topics include:
    • Data Protection that protects everywhere
    • Unified Policy Enforcement
    • Protection going to cloud
    • Behavioral Analytics benefits
    • Real World Use Cases and Results
  • Surviving a Changing Data Security Compliance Landscape Recorded: Sep 24 2019 60 mins
    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
    More data security regulations are popping up every day. Once a concern for only the largest of companies, regulatory compliance is now everyone’s challenge. Smaller firms typically lack the budget, resources, and expertise to keep up. They seldom have a fully staffed internal Information Security team that can manage an on-premises Security Operations Center (SOC) or focus on security audits without dropping other daily tasks.

    Join us for the first in a series of webinars that share how you can survive and thrive in a world of changing data security requirements. The series begins with a look at the issues facing companies like yours. This webinar covers regulatory and business pressures you face:

    •GDPR, CCPA, and other regulations on the horizon
    •Data security and business risks
    •Managing internal resources and capabilities to meet the challenges
    •Outsourcing—should you make or buy?
    •Where to start

    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, help you stay afloat and sail into a future of easy compliance and reduced business risk.
  • A Look at Next-Generation Data Protection Technology Recorded: Sep 10 2019 45 mins
    Cosmo Romero, Sr. Solutions Architect
    Lack of budget and security personnel, as well as increased threats from a mobile workforce, are causing companies to scramble. This webinar, A Look at Next-Generation Data Protection Technology, will discuss a new wave of data security practices, tools, automation, and targeted triage which will protect organizations’ digital assets against modern threats. We will also discuss how organizations are currently leveraging these tools and processes to thwart damage caused by trusted insiders.

    Join InteliSecure’s data security expert and Solution Architect Cosmo Romero as he discusses what the next generation of data security is going to look like.

    Topics include:
    •Current data security programs
    •Why existing data security controls are failing
    •Data security in a Zero-Trust model
    •User analytics’ contribution to a Zero-Trust model
  • Securing Sensitive Information in the Age of Digital Transformation Recorded: Aug 1 2019 45 mins
    Jeremy Wittkop
    Digital Transformation has accelerated the pace of change inside organizations to an unprecedented speed. Business leaders are embracing technologies to help build and maintain an advantage in the marketplace, and consumers are demanding more from their business partners than ever before. While these changes present amazing opportunities, they also challenge and strain traditional security models. It is more important than ever for security initiatives to focus on information, specifically sensitive information, which remains relatively constant as perimeters evaporate and networks change.

    Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop as he discusses digital transformation and how to build programs focused on the intersection between human behavior and the data flows in order to comply with regulations and secure sensitive information now and in the future.

    Specific discussion topics include:
    •What is Digital Transformation and how is it impacting security?
    •What are the capabilities necessary to secure sensitive information throughout its life cycle?
    •How can emerging technologies be leveraged to implement concepts such as probable cause and adaptive security into a data protection program?
  • Protecting Against Insider Threats Recorded: Jun 11 2019 55 mins
    Cosmo Romero and Antonio Sanchez
    In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. Intelisecure’s Cosmo Romero and Forcepoint's Antonio Sanchez will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
  • Illuminating the Dark Web and the Thriving Fraud Economy Recorded: Jun 4 2019 54 mins
    Emily Wilson and Jeremy Wittkop
    The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. Inaccurately portrayed as a playground for hitmen and human traffickers, the dark web is, instead, a place where fraudsters leverage tools, tactics, and technology to build scalable (albeit sketchy) business models, collect and co-opt sensitive data, and exploit organizations around the clock. What is the dark web? What drives it? What can we do about it? This session breaks through the myths, and provides attendees with a tactical view of what the dark web is, how it works, and how fraudsters function, trade, and scheme together in the criminal underground.
  • What is NYDFS and How Can I Be Compliant? Recorded: May 14 2019 34 mins
    Jeremy Wittkop
    New York State Department of Financial Services (“DFS”) has introduced new regulations requiring minimum, non-prescriptive requirements for a security program, specifying policies, CISO role, penetration testing, risk assessment, audit trail, access privileges, application security, multifactor authentication, training, encryption, IRP, notifications, etc.

    All firms licensed to do business with the State of New York must comply. Although state regulators have allowed a grace period, firms must show progress taking steps to conform to the new regulations.

    Join InteliSecure's Chief Technology Officer, Jeremy Wittkop and Boldon James as they discuss what is contained in the regulation, who is in scope, how you can use people, processes, and technologies such as Boldon James to become more compliant, and some of the consequences associated with a failure to do so.
  • Protecting Critical IP Recorded: Mar 21 2019 40 mins
    Jeremy Wittkop & Cosmo Romero
    At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.
  • NIST Risk Management Framework 2.0 and You: Practical Application Advice Recorded: Feb 19 2019 39 mins
    Jeremy Wittkop
    The National Institute of Standards and Technology has released an update to their Risk Management Framework (RMF). It is creatively titled RMF 2.0. Notably part of its much longer official name, the framework focuses on taking a “System Life Cycle Approach for Security and Privacy”. What does that mean? Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop [Date and Time] to find out!
    Specific discussion topics include:

    •Risk Management Framework 2.0 Seven Major Objectives
    •A Review of what is included in the new “Prepare” step
    •Practical Applications of NIST Framework guidance
    •Privacy Risk Management and the polarity of privacy and security
  • 2019 Next Gen Data Protection Recorded: Jan 22 2019 29 mins
    Andrew Miller and Jeremy Wittkop
    Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

    Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

    Specific discussion topics include:

    - Open Source tools for data theft available to attackers and defenders
    - Understanding how exposed data is found and exploited from an attacker’s perspective
    - What you should do if you identify a potential data breach
Data Protection Made Easy
InteliSecure is a managed security services provider specializing in data protection. With more than 15 years’ experience, 500 plus customers and 2 plus million users, companies large and small rely on our services and specialists to protect the integrity and safety of their sensitive information. We make data security and compliance easy by providing more effective data protection services at lower cost, eliminating the strain on IT organizations, and reducing the risk of confidential information getting into the wrong hands.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Look at Next-Generation Data Protection Technology
  • Live at: Sep 10 2019 3:00 pm
  • Presented by: Cosmo Romero, Sr. Solutions Architect
  • From:
Your email has been sent.
or close