Surviving a Changing Data Security Compliance Landscape
More data security regulations are popping up every day. Once a concern for only the largest of companies, regulatory compliance is now everyone’s challenge. Smaller firms typically lack the budget, resources, and expertise to keep up. They seldom have a fully staffed internal Information Security team that can manage an on-premises Security Operations Center (SOC) or focus on security audits without dropping other daily tasks.
Join us for the first in a series of webinars that share how you can survive and thrive in a world of changing data security requirements. The series begins with a look at the issues facing companies like yours. This webinar covers regulatory and business pressures you face:
•GDPR, CCPA, and other regulations on the horizon
•Data security and business risks
•Managing internal resources and capabilities to meet the challenges
•Outsourcing—should you make or buy?
•Where to start
Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, help you stay afloat and sail into a future of easy compliance and reduced business risk.
RecordedSep 24 201960 mins
Your place is confirmed, we'll send you email reminders
Skyler Butler, Director of Product Management, InteliSecure
In the last of our four-part series, Skyler Butler from InteliSecure describes what to do after you’ve implemented your technology of choice. When it comes to day-to-day operations, most IT security organizations struggle to meet compliance and protection requirements. Should you staff and run your internal SOC or rely on external partners? What factors and costs should you consider in your decision? Join us to discuss how to ensure success, and choosing the appropriate outsourcing options for your cloud strategy.
Topics:
•How to make the conceptual real
•Outsourcing decision factors
•A look at total costs
•How to choose a partner
Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
You’ve witnessed the changing data security landscape. You’ve watched the traditional perimeter disappear. Now you need to secure the new edge for data protection. In part 3 of this 4-part series, we’ll describe:
•How to analyze your cloud usage to understand risk
•Review the Symantec Technology Stack
•Focus on where to start
Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, continue to lay out the way to champion your evolving data protection needs.
Carl Leonard, Principal Security Analyst at Forcepoint and Jacob Woodfield, Solutions Architect at InteliSecure
Digital transformation initiatives and the migration from on-premises to cloud computing are changing everything. In addition to facing dramatically greater security risks, IT organizations are overwhelmed with “false positives”, consuming their precious and costly resources chasing erroneous alerts. Rather than reacting to the changes, this webinar will discuss how a new wave of data security practices, tools, automation, and targeted triage proactively and dynamically protects your digital assets against today’s threats.
Carl Leonard, Principal Security Analyst at Forcepoint and Jacob Woodfield, Solutions Architect at InteliSecure, help you take control of your data security program. They will answer these important questions:
• What is wrong with today's Data Security programs?
• What can we learn from Zero Trust and CARTA approaches?
• What does a Next-Generation Data Protection solution look like?
• How can you adopt a Risk-Adaptive Protection solution?
Mark Rosenthal, Director of Consulting Services and Patrick Connery, Account Manager
Data protection programs should be the center focus of any organization’s security program as companies begin to implement, reevaluate, or continue to mature their programs. Building a data protection program that conforms to the new workflow has many challenges, due to the way data is created, stored, and transmitted.
Join us for an interview with Mark Rosenthal, Director of Consulting Services at InteliSecure, to learn the answers to the most common questions surrounding data protection programs, including the following:
•Where are most organizations currently with regards to securing critical information?
•What are the best methods for organizations to evaluate their current program?
•What can organizations expect while deploying DLP and related technologies?
•Why do data protection programs typically fail, and how can you avoid common pitfalls?
Patrick Connery and Mark Rosenthal will discuss these topics and answer your questions, in order to help you define your data protection goals and program for 2020.
Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
The traditional perimeter is dead. In today’s cloud world, you must ensure compliance (GDPR, CCPA) while your organization transforms itself to the new digital realities. How can you keep pace? In part 2 of this 4-part series, we’ll describe:
•How to protect critical information in the modern world, including modern architecture with your mobile workforce
•Why the perimeter is dead—and isn’t coming back
•Current tech stacks and “must haves” in your security strategy
•How to attack the problem
•Challenges implementing and changing to data protection as a service
Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, help you stay afloat and sail into a future of easy compliance and reduced business risk.
Karlene Berger, Director of Marketing at Forcepoint and Cosmo Romero, Sr. Solutions Architect at InteliSecure
Is your security challenged at scaling, feeling like you spend all your time triaging alarms and alerts, and chasing a high volume of false positives? This webinar, Applying Next-Generation Data Protection, will discuss how a new wave of security technology will allow you unify your data protection strategy and take advantage of analytics of behavior
Join InteliSecure’s data security expert and Solution Architect Cosmo Romero, along with special guest Karlene Berger, Director of Marketing from Forcepoint, they talk about how to take advantage of risk-adaptive security practices.
Topics include:
• Data Protection that protects everywhere
• Unified Policy Enforcement
• Protection going to cloud
• Behavioral Analytics benefits
• Real World Use Cases and Results
Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec
More data security regulations are popping up every day. Once a concern for only the largest of companies, regulatory compliance is now everyone’s challenge. Smaller firms typically lack the budget, resources, and expertise to keep up. They seldom have a fully staffed internal Information Security team that can manage an on-premises Security Operations Center (SOC) or focus on security audits without dropping other daily tasks.
Join us for the first in a series of webinars that share how you can survive and thrive in a world of changing data security requirements. The series begins with a look at the issues facing companies like yours. This webinar covers regulatory and business pressures you face:
•GDPR, CCPA, and other regulations on the horizon
•Data security and business risks
•Managing internal resources and capabilities to meet the challenges
•Outsourcing—should you make or buy?
•Where to start
Skyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec, help you stay afloat and sail into a future of easy compliance and reduced business risk.
Lack of budget and security personnel, as well as increased threats from a mobile workforce, are causing companies to scramble. This webinar, A Look at Next-Generation Data Protection Technology, will discuss a new wave of data security practices, tools, automation, and targeted triage which will protect organizations’ digital assets against modern threats. We will also discuss how organizations are currently leveraging these tools and processes to thwart damage caused by trusted insiders.
Join InteliSecure’s data security expert and Solution Architect Cosmo Romero as he discusses what the next generation of data security is going to look like.
Topics include:
•Current data security programs
•Why existing data security controls are failing
•Data security in a Zero-Trust model
•User analytics’ contribution to a Zero-Trust model
Digital Transformation has accelerated the pace of change inside organizations to an unprecedented speed. Business leaders are embracing technologies to help build and maintain an advantage in the marketplace, and consumers are demanding more from their business partners than ever before. While these changes present amazing opportunities, they also challenge and strain traditional security models. It is more important than ever for security initiatives to focus on information, specifically sensitive information, which remains relatively constant as perimeters evaporate and networks change.
Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop as he discusses digital transformation and how to build programs focused on the intersection between human behavior and the data flows in order to comply with regulations and secure sensitive information now and in the future.
Specific discussion topics include:
•What is Digital Transformation and how is it impacting security?
•What are the capabilities necessary to secure sensitive information throughout its life cycle?
•How can emerging technologies be leveraged to implement concepts such as probable cause and adaptive security into a data protection program?
In light of recent mega breeches originating from trusted users and trusted partners, many organizations are finding the need to understand how internal accounts are interacting with systems and data critical to the organization. Intelisecure’s Cosmo Romero and Forcepoint's Antonio Sanchez will address lessons learned from previous Insider Threat incidents, why organizations are creating Insider Threat programs, what an Insider Threat program looks like, as well as the processes and technologies which enable organizations to reduce or eliminate risk with respect to Insider Threat.
The dark web is often seen as a mysterious and malevolent creature, built out of the myths and legends created by popular media and clickbait headlines. In reality, the dark web is home to a vibrant and thriving criminal ecosystem, with a resilient fraud trade at the center of the action. Inaccurately portrayed as a playground for hitmen and human traffickers, the dark web is, instead, a place where fraudsters leverage tools, tactics, and technology to build scalable (albeit sketchy) business models, collect and co-opt sensitive data, and exploit organizations around the clock. What is the dark web? What drives it? What can we do about it? This session breaks through the myths, and provides attendees with a tactical view of what the dark web is, how it works, and how fraudsters function, trade, and scheme together in the criminal underground.
New York State Department of Financial Services (“DFS”) has introduced new regulations requiring minimum, non-prescriptive requirements for a security program, specifying policies, CISO role, penetration testing, risk assessment, audit trail, access privileges, application security, multifactor authentication, training, encryption, IRP, notifications, etc.
All firms licensed to do business with the State of New York must comply. Although state regulators have allowed a grace period, firms must show progress taking steps to conform to the new regulations.
Join InteliSecure's Chief Technology Officer, Jeremy Wittkop and Boldon James as they discuss what is contained in the regulation, who is in scope, how you can use people, processes, and technologies such as Boldon James to become more compliant, and some of the consequences associated with a failure to do so.
At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.
The National Institute of Standards and Technology has released an update to their Risk Management Framework (RMF). It is creatively titled RMF 2.0. Notably part of its much longer official name, the framework focuses on taking a “System Life Cycle Approach for Security and Privacy”. What does that mean? Join InteliSecure’s Chief Technology Officer, Jeremy Wittkop [Date and Time] to find out!
Specific discussion topics include:
•Risk Management Framework 2.0 Seven Major Objectives
•A Review of what is included in the new “Prepare” step
•Practical Applications of NIST Framework guidance
•Privacy Risk Management and the polarity of privacy and security
Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.
Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.
Specific discussion topics include:
- Open Source tools for data theft available to attackers and defenders
- Understanding how exposed data is found and exploited from an attacker’s perspective
- What you should do if you identify a potential data breach
InteliSecure is a managed security services provider specializing in data protection. With more than 15 years’ experience, 500 plus customers and 2 plus million users, companies large and small rely on our services and specialists to protect the integrity and safety of their sensitive information. We make data security and compliance easy by providing more effective data protection services at lower cost, eliminating the strain on IT organizations, and reducing the risk of confidential information getting into the wrong hands.
Surviving a Changing Data Security Compliance LandscapeSkyler Butler, Director of Product Management at InteliSecure, and Jon Stinnett, Senior Systems Engineer at Symantec[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]59 mins