Hi [[ session.user.profile.firstName ]]

Illuminating the Dark Web and the Thriving Fraud Economy

The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. Inaccurately portrayed as a playground for hitmen and human traffickers, the dark web is, instead, a place where fraudsters leverage tools, tactics, and technology to build scalable (albeit sketchy) business models, collect and co-opt sensitive data, and exploit organizations around the clock. What is the dark web? What drives it? What can we do about it? This session breaks through the myths, and provides attendees with a tactical view of what the dark web is, how it works, and how fraudsters function, trade, and scheme together in the criminal underground.
Recorded Jun 4 2019 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Emily Wilson and Jeremy Wittkop
Presentation preview: Illuminating the Dark Web and the Thriving Fraud Economy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The New World: Protecting Critical Data when Everyone is Remote Jun 3 2020 3:00 pm UTC 60 mins
    Cosmo Romero
    With, more employees suddenly working remotely, organizations are challenged to provide access for workers who need to use sensitive information. Protecting those critical assets remains paramount. Fortunately, organizations can leverage proven security technology solutions, such as those from our partners at Forcepoint.
  • Vertical Challenges - Protecting Sensitive Data for Manufacturing Recorded: May 26 2020 10 mins
    Jeremy Wittkop
    The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

    Each organization can be unique with respect to data protection, but some principles generally hold true across verticals. Join InteliSecure CTO as he discusses the challenges and solutions that are common to customers in the manufacturing space.
  • Cloud Security Strategy Recorded: May 19 2020 12 mins
    Jeremy Wittkop
    The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

    As the cloud continues to proliferate in environments, many security leaders are asking questions about how to design a cloud security strategy. In the shared security model, what translates from an on premises world and what doesn't? What elements should be present in a comprehensive cloud security strategy? Join InteliSecure CTO, Jeremy Wittkop as he answers these questions and more.
  • Risk Adaptive Technology Recorded: May 12 2020 11 mins
    Jeremy Wittkop
    The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

    Risk Adaptive technology refers to Information Security capabilities that can evaluate risk and adapt protection profiles to the identified risk. Since the basis of Information Security should be risk mitigation, these technologies resonate with security leaders on a conceptual level. Join InteliSecure CTO Jeremy Wittkop as he discusses how these technologies can be deployed to help organizations protect data and manage risk effectively.
  • Intellectual Property Protection Strategies Recorded: May 5 2020 15 mins
    Jeremy Wittkop
    The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

    Data protection technologies have existed for a number of years and have largely been deployed to protect compliance-related data such as financial information, Personally Identifiable Information (PII), and healthcare data. However, many organizations most critical information is related to trade secrets and competitive advantage. Join InteliSecure CTO, Jeremy Wittkop, as he discusses the strategies that can be deployed to protect sensitive Intellectual Property and defend your competitive advantage.
  • Critical Data Protection Life Cycle Recorded: Apr 28 2020 11 mins
    Jeremy Wittkop
    Due to technical difficulties, we will re-run this talk. The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

    Data Protection as a discipline has undergone much change since the advent of Data Loss PRevention (DLP) technology in 2002. In the modern security landscape, comprehensively protecting data throughout it's lifecycle can be a confusing endeavor. Join InteliSecure's CTO, Jeremy Wittkop, as he attempts to simplify the landscape and identify the key capabilities necessary to protect data throughout its life cycle.
  • Managed Technology Transition Services Recorded: Apr 21 2020 12 mins
    Jeremy Wittkop
    The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

    The Information Security technology landscape is undergoing a period of unprecendented change. As a result, many organizations are planning a transition between technologies. InteliSecure CTO Jeremy Wittkop has personally overseen scores of security technology transitions over the last decade and shares his lessons learned as well as services InteliSecure has designed to help organizations make a smooth transition.
  • The Three C's of Data Protection Recorded: Apr 14 2020 14 mins
    Jeremy Wittkop
    The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

    In an increasingly mobile world with distributed assets, data protection is more important than ever. The days of security organizations having success by simply protecting networks and systems are gone. Modern security programs rely upon the ability to keep data secure as a foundational capability.

    Securing data comes down to the three C's of data protection: Content, Community, and Channel. Joiun InteliSecure CTO Jeremy Wittkop as he breaks down what the three C's are and how you can use them to build a data security program that can stand the test of time.
  • Zero Trust, SASE, and an Increasingly Mobile Workforce Recorded: Apr 7 2020 14 mins
    Jeremy Wittkop
    The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

    The first topic will cover Zero Trust, SASE, and how to secure an increasingly mobile global workforce. First, we will cover the evolution of how workers interact with systems, which has ultimately strained traditional security models. Then we will discuss concepts such as Zero Trust and Secure Access Services Edge (SASE) in order to understand how security might have been designed differently if it were invented today.
  • Navigating the Changes at Symantec/Broadcom Recorded: Feb 18 2020 49 mins
    Jeremy Wittkop (CTO), Bill Farrell (COO), and Tim Shanahan (SVP Sales)
    Broadcom’s recent acquisition of Symantec has raised many questions and concerns for many companies with substantial investments in Symantec’s technology. As one of the few truly vendor-agnostic managed data protection services providers in the industry, InteliSecure has deep experience with a wide range of data security technology solutions from Symantec/Broadcom and others, so we have a unique, unbiased perspective on what this change really means.

    Join us for a conversational, interactive session with InteliSecure’s senior leaders who will answer the questions we hear most:
    •What is the outlook for Broadcom’s future investments and support of my software?
    •I’ve invested a lot in this tech installation—do I have to rip and replace?
    •The contact I knew at Symantec has left the company; who do I call now?

    Get perspectives that help you make informed decisions from one of the most trusted brands in the data protection industry. We make data protection easy—even in times of dramatic change.
  • Choosing a Data Protection Partner for a Changing World Recorded: Dec 19 2019 37 mins
    Skyler Butler, Director of Product Management, InteliSecure
    In the last of our four-part series, Skyler Butler from InteliSecure describes what to do after you’ve implemented your technology of choice. When it comes to day-to-day operations, most IT security organizations struggle to meet compliance and protection requirements. Should you staff and run your internal SOC or rely on external partners? What factors and costs should you consider in your decision? Join us to discuss how to ensure success, and choosing the appropriate outsourcing options for your cloud strategy.

    Topics:
    •How to make the conceptual real
    •Outsourcing decision factors
    •A look at total costs
    •How to choose a partner
  • Securing the New Edge for Data Protection Recorded: Nov 19 2019 49 mins
    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
    You’ve witnessed the changing data security landscape. You’ve watched the traditional perimeter disappear. Now you need to secure the new edge for data protection. In part 3 of this 4-part series, we’ll describe:

    •How to analyze your cloud usage to understand risk
    •Review the Symantec Technology Stack
    •Focus on where to start

    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, continue to lay out the way to champion your evolving data protection needs.
  • Next-Generation Data Protection: Risk-Adaptive, Not Reactive Recorded: Nov 19 2019 42 mins
    Carl Leonard, Principal Security Analyst at Forcepoint and Jacob Woodfield, Solutions Architect at InteliSecure
    Digital transformation initiatives and the migration from on-premises to cloud computing are changing everything. In addition to facing dramatically greater security risks, IT organizations are overwhelmed with “false positives”, consuming their precious and costly resources chasing erroneous alerts. Rather than reacting to the changes, this webinar will discuss how a new wave of data security practices, tools, automation, and targeted triage proactively and dynamically protects your digital assets against today’s threats.

    Carl Leonard, Principal Security Analyst at Forcepoint and Jacob Woodfield, Solutions Architect at InteliSecure, help you take control of your data security program. They will answer these important questions:

    • What is wrong with today's Data Security programs?
    • What can we learn from Zero Trust and CARTA approaches?
    • What does a Next-Generation Data Protection solution look like?
    • How can you adopt a Risk-Adaptive Protection solution?
  • Ask the Experts: Data Protection Q&A with Mark Rosenthal Recorded: Nov 1 2019 42 mins
    Mark Rosenthal, Director of Consulting Services and Patrick Connery, Account Manager
    Data protection programs should be the center focus of any organization’s security program as companies begin to implement, reevaluate, or continue to mature their programs. Building a data protection program that conforms to the new workflow has many challenges, due to the way data is created, stored, and transmitted.
    Join us for an interview with Mark Rosenthal, Director of Consulting Services at InteliSecure, to learn the answers to the most common questions surrounding data protection programs, including the following:
    •Where are most organizations currently with regards to securing critical information?
    •What are the best methods for organizations to evaluate their current program?
    •What can organizations expect while deploying DLP and related technologies?
    •Why do data protection programs typically fail, and how can you avoid common pitfalls?
    Patrick Connery and Mark Rosenthal will discuss these topics and answer your questions, in order to help you define your data protection goals and program for 2020.
  • Surviving the Death of the Traditional Perimeter Recorded: Oct 22 2019 32 mins
    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
    The traditional perimeter is dead. In today’s cloud world, you must ensure compliance (GDPR, CCPA) while your organization transforms itself to the new digital realities. How can you keep pace? In part 2 of this 4-part series, we’ll describe:

    •How to protect critical information in the modern world, including modern architecture with your mobile workforce
    •Why the perimeter is dead—and isn’t coming back
    •Current tech stacks and “must haves” in your security strategy
    •How to attack the problem
    •Challenges implementing and changing to data protection as a service

    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, help you stay afloat and sail into a future of easy compliance and reduced business risk.
  • Applying Next-Generation Data Protection Recorded: Oct 10 2019 47 mins
    Karlene Berger, Director of Marketing at Forcepoint and Cosmo Romero, Sr. Solutions Architect at InteliSecure
    Is your security challenged at scaling, feeling like you spend all your time triaging alarms and alerts, and chasing a high volume of false positives? This webinar, Applying Next-Generation Data Protection, will discuss how a new wave of security technology will allow you unify your data protection strategy and take advantage of analytics of behavior

    Join InteliSecure’s data security expert and Solution Architect Cosmo Romero, along with special guest Karlene Berger, Director of Marketing from Forcepoint, they talk about how to take advantage of risk-adaptive security practices.

    Topics include:
    • Data Protection that protects everywhere
    • Unified Policy Enforcement
    • Protection going to cloud
    • Behavioral Analytics benefits
    • Real World Use Cases and Results
  • Surviving a Changing Data Security Compliance Landscape Recorded: Sep 24 2019 60 mins
    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
    More data security regulations are popping up every day. Once a concern for only the largest of companies, regulatory compliance is now everyone’s challenge. Smaller firms typically lack the budget, resources, and expertise to keep up. They seldom have a fully staffed internal Information Security team that can manage an on-premises Security Operations Center (SOC) or focus on security audits without dropping other daily tasks.

    Join us for the first in a series of webinars that share how you can survive and thrive in a world of changing data security requirements. The series begins with a look at the issues facing companies like yours. This webinar covers regulatory and business pressures you face:

    •GDPR, CCPA, and other regulations on the horizon
    •Data security and business risks
    •Managing internal resources and capabilities to meet the challenges
    •Outsourcing—should you make or buy?
    •Where to start

    Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, help you stay afloat and sail into a future of easy compliance and reduced business risk.
  • A Look at Next-Generation Data Protection Technology Recorded: Sep 10 2019 45 mins
    Cosmo Romero, Sr. Solutions Architect
    Lack of budget and security personnel, as well as increased threats from a mobile workforce, are causing companies to scramble. This webinar, A Look at Next-Generation Data Protection Technology, will discuss a new wave of data security practices, tools, automation, and targeted triage which will protect organizations’ digital assets against modern threats. We will also discuss how organizations are currently leveraging these tools and processes to thwart damage caused by trusted insiders.

    Join InteliSecure’s data security expert and Solution Architect Cosmo Romero as he discusses what the next generation of data security is going to look like.

    Topics include:
    •Current data security programs
    •Why existing data security controls are failing
    •Data security in a Zero-Trust model
    •User analytics’ contribution to a Zero-Trust model
  • Securing Sensitive Information in the Age of Digital Transformation Recorded: Aug 1 2019 45 mins
    Jeremy Wittkop
    Digital Transformation has accelerated the pace of change inside organizations to an unprecedented speed. Business leaders are embracing technologies to help build and maintain an advantage in the marketplace, and consumers are demanding more from their business partners than ever before. While these changes present amazing opportunities, they also challenge and strain traditional security models. It is more important than ever for security initiatives to focus on information, specifically sensitive information, which remains relatively constant as perimeters evaporate and networks change.

    Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop as he discusses digital transformation and how to build programs focused on the intersection between human behavior and the data flows in order to comply with regulations and secure sensitive information now and in the future.

    Specific discussion topics include:
    •What is Digital Transformation and how is it impacting security?
    •What are the capabilities necessary to secure sensitive information throughout its life cycle?
    •How can emerging technologies be leveraged to implement concepts such as probable cause and adaptive security into a data protection program?
  • Protecting Against Insider Threats Recorded: Jun 11 2019 55 mins
    Cosmo Romero and Antonio Sanchez
    In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. Intelisecure’s Cosmo Romero and Forcepoint's Antonio Sanchez will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
Data Protection Made Easy
InteliSecure is a managed security services provider specializing in data protection. With more than 15 years’ experience, 500 plus customers and 2 plus million users, companies large and small rely on our services and specialists to protect the integrity and safety of their sensitive information. We make data security and compliance easy by providing more effective data protection services at lower cost, eliminating the strain on IT organizations, and reducing the risk of confidential information getting into the wrong hands.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Illuminating the Dark Web and the Thriving Fraud Economy
  • Live at: Jun 4 2019 5:00 pm
  • Presented by: Emily Wilson and Jeremy Wittkop
  • From:
Your email has been sent.
or close