Hi [[ session.user.profile.firstName ]]

Securing Your Multi-Cloud

One of the most important ways to reduce risk and stay compliant within an organization revolves around secure access to regulated or critical data. Whether protecting state, federal, internationally regulated data or whether protecting intellectual property specific to an organization, secure access is a way to reduce risk with respect to sensitive information. Intelisecure’s CTO Jeremy Wittkop is going talk through the technologies and process around secure access along with the process and technologies to ensure information accessed security and with the proper controls and governance in place to ensure risk is kept to a minimum.
Live online Oct 29 5:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeremy Wittkop & Cosmo Romero

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing Your Multi-Cloud Oct 29 2019 5:00 pm UTC 60 mins
    Jeremy Wittkop & Cosmo Romero
    One of the most important ways to reduce risk and stay compliant within an organization revolves around secure access to regulated or critical data. Whether protecting state, federal, internationally regulated data or whether protecting intellectual property specific to an organization, secure access is a way to reduce risk with respect to sensitive information. Intelisecure’s CTO Jeremy Wittkop is going talk through the technologies and process around secure access along with the process and technologies to ensure information accessed security and with the proper controls and governance in place to ensure risk is kept to a minimum.
  • Combining Insider Threat and Protecting Critical IP Sep 10 2019 5:00 pm UTC 60 mins
    Jeremy Wittkop & Cosmo Romero
    At the heart of every Insider Threat program is protecting Critical Intellectual Property from Insider risk. Intelisecure’s CTO will discuss how Insider Risk and critical Intellectual property intersect, “Combining Insider Threat and Protecting Critical IP” webinar will outline the risks associated with having a data protection program without an Insider Risk Program and what organizations can do in order to properly protect their intellectual property of from insider threats based on processes and technologies.
  • Protecting Against Insider Threats Recorded: Jun 11 2019 55 mins
    Cosmo Romero and Antonio Sanchez
    In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. Intelisecure’s Cosmo Romero and Forcepoint's Antonio Sanchez will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
  • Illuminating the Dark Web and the Thriving Fraud Economy Recorded: Jun 4 2019 54 mins
    Emily Wilson and Jeremy Wittkop
    The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. Inaccurately portrayed as a playground for hitmen and human traffickers, the dark web is, instead, a place where fraudsters leverage tools, tactics, and technology to build scalable (albeit sketchy) business models, collect and co-opt sensitive data, and exploit organizations around the clock. What is the dark web? What drives it? What can we do about it? This session breaks through the myths, and provides attendees with a tactical view of what the dark web is, how it works, and how fraudsters function, trade, and scheme together in the criminal underground.
  • What is NYDFS and How Can I Be Compliant? Recorded: May 14 2019 34 mins
    Jeremy Wittkop
    New York State Department of Financial Services (“DFS”) has introduced new regulations requiring minimum, non-prescriptive requirements for a security program, specifying policies, CISO role, penetration testing, risk assessment, audit trail, access privileges, application security, multifactor authentication, training, encryption, IRP, notifications, etc.

    All firms licensed to do business with the State of New York must comply. Although state regulators have allowed a grace period, firms must show progress taking steps to conform to the new regulations.

    Join InteliSecure's Chief Technology Officer, Jeremy Wittkop and Boldon James as they discuss what is contained in the regulation, who is in scope, how you can use people, processes, and technologies such as Boldon James to become more compliant, and some of the consequences associated with a failure to do so.
  • Protecting Critical IP Recorded: Mar 21 2019 40 mins
    Jeremy Wittkop & Cosmo Romero
    At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.
  • NIST Risk Management Framework 2.0 and You: Practical Application Advice Recorded: Feb 19 2019 39 mins
    Jeremy Wittkop
    The National Institute of Standards and Technology has released an update to their Risk Management Framework (RMF). It is creatively titled RMF 2.0. Notably part of its much longer official name, the framework focuses on taking a “System Life Cycle Approach for Security and Privacy”. What does that mean? Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop [Date and Time] to find out!
    Specific discussion topics include:

    •Risk Management Framework 2.0 Seven Major Objectives
    •A Review of what is included in the new “Prepare” step
    •Practical Applications of NIST Framework guidance
    •Privacy Risk Management and the polarity of privacy and security
  • 2019 Next Gen Data Protection Recorded: Jan 22 2019 29 mins
    Andrew Miller and Jeremy Wittkop
    Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

    Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

    Specific discussion topics include:

    - Open Source tools for data theft available to attackers and defenders
    - Understanding how exposed data is found and exploited from an attacker’s perspective
    - What you should do if you identify a potential data breach
Data Protection Made Easy
InteliSecure is a managed security services provider specializing in data protection. With more than 15 years’ experience, 500 plus customers and 2 plus million users, companies large and small rely on our services and specialists to protect the integrity and safety of their sensitive information. We make data security and compliance easy by providing more effective data protection services at lower cost, eliminating the strain on IT organizations, and reducing the risk of confidential information getting into the wrong hands.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Your Multi-Cloud
  • Live at: Oct 29 2019 5:00 pm
  • Presented by: Jeremy Wittkop & Cosmo Romero
  • From:
Your email has been sent.
or close