Hi [[ session.user.profile.firstName ]]

Risk Adaptive Technology

The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.

Risk Adaptive technology refers to Information Security capabilities that can evaluate risk and adapt protection profiles to the identified risk. Since the basis of Information Security should be risk mitigation, these technologies resonate with security leaders on a conceptual level. Join InteliSecure CTO Jeremy Wittkop as he discusses how these technologies can be deployed to help organizations protect data and manage risk effectively.
Recorded May 12 2020 11 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeremy Wittkop
Presentation preview: Risk Adaptive Technology

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Machine Learning: Using NexusAI to Enable Regulatory Compliance Recorded: Jun 3 2021 31 mins
    Rick Dales, VP of Product Management, Dan Rapp, VP of Engineering & Data Science at Proofpoint
    False positives are the bane of any team reviewing digital communications to help enable regulatory compliance. They’re flagged as potential risks, so teams must spend countless hours manually reviewing and removing them from their queues. There is a better way.

    Proofpoint NexusAI for Compliance provides out-of-box machine learning models that utilize past reviewer decisions to significantly reduce low-value supervision content. This allows you to focus on meaningful content, while reducing reviewer fatigue and human errors caused by fatigue.

    Join us for a 30-minute webinar for a deep dive into this new technology. Our experts will:

    - Discuss how AI/ML technology can help enable regulatory compliance
    - Illustrate how you can remove up to 65% of false positives compared with legacy systems without machine learning
    - Demonstrate integration with Proofpoint Intelligent Supervision, offering next generation surveillance
  • Live Demo: Defending Against Email Fraud with Proofpoint Threat Protection Recorded: May 27 2021 33 mins
    Brett Shaw, Senior Product Marketing Manager, Proofpoint, Inc., Victor Soares, Group Product Manager, Proodpoint, Inc.
    Email fraud is rife. In fact, the FBI reported that email fraud attacks accounted for nearly $1.9 billion losses in 2020. These attacks are very difficult to detect, not only because they don’t contain payloads, but because they can appear to come from trusted sources, like a C-level executive or even a hijacked supplier account. So how can you better protect your organization?

    Watch our live demo on how you can defend against and identify email fraud with Proofpoint’s Threat Protection Platform.

    We cover:

    - The different tactics threat actors use to target your users with BEC attacks
    - Best practices to prevent attacks and identify who is being targeted
    - How Proofpoint helps mitigate risk, provide visibility and drive operational efficiency
  • May Insiders Meeting Panel: Getting Buy-In for Your Security Awareness Program Recorded: May 26 2021 50 mins
    Mike Bailey, Sr. Product Marketing Manager at Proofpoint and Customer Panelists
    We are trying something new with Insiders Meetings. We know you love hearing from your peers at Wisdom every year but want more engagement with them outside of our once-a-year user conference.

    Based on your feedback, we're kicking off a new 1-hour panel format where you'll be able to hear from your peers, ask questions, and make new connections. Our theme in May will be “Springing into Action: Get Buy-In for your Security Awareness Program”.
  • Protecting Healthcare’s Supply Chain Recorded: May 21 2021 57 mins
    Peter Rucys, Tampa General Hospital, Rob Holmes, Email Fraud Defense, Ryan Witt, Proofpoint Healthcare Customer Advisory
    In a recent survey, Proofpoint found that the average healthcare organization received about 200,000 emails from over 10,000 different domains, including those belonging to research organizations, construction companies, grantors and foundations and insurers, as well as classic supply chain participants. Of these clients, 98% received some email-based threat and 97% received threats from at least one of their suppliers’ domains via impersonation or business email compromise. One trend stands out: today’s attacks target people, not just infrastructure. The sheer volume and value of business conducted by email is a noteworthy reason to focus on protecting your supply chain. In this session, we’ll discuss the most critical issues impacting healthcare IT and Security leaders today.
    We’ll share:
    • A view into the current threat landscape
    • The unique risks of the supply chain to patient safety
    • Security considerations and transformations for 2021
  • Targeted Behavior Change for Security Awareness Training Recorded: May 20 2021 31 mins
    Robert Shields, Sr. Product Marketing Manager & Susan Mackowiak, Sr. Director of Content at Proofpoint
    Behavior change is the ultimate goal for security awareness training. To be successful at mitigating threats, organizations need to implement a targeted, agile security awareness training program that considers today’s threat landscape as well as the diversity of their workers’ roles and knowledge. By accommodating roles, competencies and threats, companies can accelerate behavior change to build a strong security culture. So how can you achieve this?

    Join us for a 30-minute webinar as our experts discuss how to build an effective security awareness training program and culture.

    In this session we will explore:

    - A new framework to guide content creation
    - The curation of content that addresses your threats, risks and compliance needs
    - Personalized learning paths you can leverage to change behavior and enable culture change
  • Critical Considerations for Slack and Teams Initiatives Recorded: May 19 2021 38 mins
    Shannon Smith, Archiving Sales Specialist, Proofpoint, Frank Beck, Senior Sales Engineer
    Employees depend on digital communication tools to collaborate more than ever before. Chat and collaboration apps have made it possible for employees to communicate with ease, but they can also put organizations at risk. As they adopt new communication tools, companies need to ensure that security, compliance, and legal requirements are considered and adequately addressed.

    Watch this webinar where we discuss critical considerations for a successful collaboration initiative. You’ll learn about:

    - Importance of a fit analysis
    - Engaging the right players
    - Security considerations
    - Legal and compliance concerns
  • 4 Strategies to Combat Insider Threats in Your Supply Chain Recorded: May 12 2021 31 mins
    Sai Chavali, Sr. Product Marketing Manager, Proofpoint
    Collaboration is key in today’s workplace. However, broadening the supply chain to include remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. To safeguard your critical IP and sensitive data, organizations need to take a people-centric approach to protect their data and mitigate insider risk.

    Watch our 30-minute webinar to learn about how the technology sector and others in agile, collaborative industries can manage insider threats. In this webinar, we’ll cover the four strategies on how to:

    ● Allow for open collaboration by using data to identify user risk
    ● Protect your competitive advantage with real-time IP data tracking
    ● Safeguard user data when working with third parties across your supply chain to remain compliant
    ● Prepare your incident response plan to avoid unnecessary data loss
  • Email Fraud - 2020 FBI Report & What You Should Know Recorded: May 11 2021 32 mins
    Sara Pan, Sr. Product Marketing Manager, Proofpoint
    According to the 2020 FBI Internet Crime Report, attackers have shifted their email fraud tactics away from hacking the email accounts of C-levels to compromising vendor emails. The report also reveals that email fraud accounts for 44% of all reported losses in 2020. While these attacks are low volume, they represent huge dollar losses and are constantly evolving. So how can you better protect your company?

    Watch our 30-minute webinar for a deep dive into the FBI insights of email fraud and the best practices of combating it. In this session, we'll cover:

    · What email fraud variants the FBI report has called out
    · How attackers leverage impersonation and compromised accounts jointly in an attack
    · What security controls and framework you can adopt to better defend against email fraud
  • How to Navigate Insider Risk: Top Tips from Gartner's Market Guide Recorded: May 11 2021 32 mins
    Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, Proofpoint
    Insider threats may initially appear to be just like any other threat, but the big difference is that insiders are in a position of trust. So how do you deal with these malicious or accidental threats that come from people within the organisation?

    Watch Proofpoint’s experts Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, as they discuss the top tips from Gartner’s new report on Market Guide for Insider Risk Management Solutions. You will learn:

    - The “Rule of Three” for insider threats (including threat types, threat activities, and mitigation goals)
    - How to employ an insider threat mitigation program comprising people, processes, and technology
    - Considerations when purchasing insider risk management technology

    Discover what you need to know about insider threats, how to protect your organisation and navigate these risks.
  • Compliance & Risk Mitigation for Healthcare Recorded: May 4 2021 36 mins
    Ryan Witt, Healthcare Industry Practice Leader, Robert Kreuscher, Sr. Sales Engineer, Shannon Smith, Archive Sales Specialist
    Cloud-based applications like Microsoft 365 keep your healthcare organization operating, especially in today’s digital world. Yet securing data, adhering to data privacy and record keeping, while protecting against fraudulent activity, can be a significant challenge. Healthcare organizations need a people-centric approach to detecting risky behavior and litigation readiness.

    Watch our 30-minute panel discussion about how your peers are addressing these challenges and the steps you can take to ensure compliance across your electronic communications ecosystem. This session covers:

    - Common compliance challenges and pitfalls when it comes to e-discovery and risk detection, especially around Microsoft 365
    - How your capture and archive strategy can augment your information protection program
    - How Proofpoint’s people-centric approach to security and compliance helps better protect healthcare organizations
  • Security Leaders' Panel: Has Phishing Reached a Crisis Level? Recorded: Apr 29 2021 80 mins
    Lucia Milica, CISO, Proofpoint, Robbie Meitler, AVP, Liberty Mutual, Rebecca Harness, CISO, Saint Louis University
    Phishing and social engineering attacks continue to grow in frequency and sophistication. They challenge security leaders and practitioners who struggle to track and stop their elusive and persistent tactics. Given the magnitude of the challenge, many security leaders consider this their No. 1 priority for 2021.

    Join our customer and CISO panel to learn more about these threats and how security leaders are using intelligence, controls and their people to reduce the risk of breach and data loss.

    In this session, our experts will cover:

    -How phishing and social engineering attacks have increased
    -How organizations are being targeted
    -How your company culture affect risk
    -Options for you to better protect you company
  • Managing Insider Risk with a Hybrid Workforce - Featuring Forrester Research Recorded: Apr 27 2021 61 mins
    Brian Reed, Product Evangelist, Proofpoint, Inc., Joseph Blankenship, VP and Research Director for Security & Risk, Forrester
    After a year of remote work, we are beginning the return to “normalcy” in many places. So what happens as the workforce shifts to a hybrid model of partial in-person and partial remote work? How do you guard from external attacks and manage insider risks – whether accidental or malicious?

    Watch our special 1-hour webinar with guest speaker, Forrester Research’s Joseph Blankenship, VP and Research Director for Security & Risk, to discuss key insider threat factors with a remote and hybrid workforce.

    This webinar covers:

    · What the trend towards hybrid work means for organizations that are dependent on third-party users and supply chain vendors
    · How to share information in a way that protects against data loss
    · How to build a business case for an insider threat management program (ITMP)
  • How to Create a Risk-Based Data Privacy Program Recorded: Apr 23 2021 36 mins
    Itir Clarke, Senior Product Marketing Manager, Proofpoint, Inc., Lucia Milica, Global Resident CISO, Proofpoint, Inc.
    Data privacy regulations are growing more complex, and the penalties for noncompliance can be severe. Companies need a risk-based approach to PII protection across email, cloud apps and endpoint to prioritize and address compliance challenges in the cloud era. This requires visibility to data risk, but also people risk. So how can you achieve this?

    Watch our 30-minute webinar with Lucia Milică, Proofpoint Global Resident CISO, to learn how a people-centric approach to Information Protection can help you achieve a risk-adjusted privacy program:

    We cover how you can:

    - Discover which data and people pose greater PII compliance risks
    - Reduce risk by training and improving data traceability
    - Keep privacy data safe using people-centric controls and reporting
  • How to Defend Against Email Fraud from Compromised Suppliers Recorded: Apr 23 2021 32 mins
    Sara Pan, Sr. Product Marketing Manager, Proofpoint
    Email fraud schemes have evolved to include supplier account compromise. Based on Proofpoint’s internal research, 98% of monitored organizations have received threats from their suppliers— whether they’ve been spoofed or compromised. Unfortunately, most organizations lack visibility into which suppliers pose risk. So how can you better defend against threats from these risky suppliers?

    Watch our webinar for a deep dive into the best practices of combating supplier impersonation and account compromise. In this session, we'll cover:

    - Real-world supply chain fraud examples
    - Grading risk in your suppliers
    - How to detect threats, including payroll diversion and supplier invoicing fraud
    - A framework that helps you stop these multi-million-dollar email fraud attacks
  • Live Demo: How to Use Supervision Technology to Mitigate Risk Recorded: Apr 15 2021 29 mins
    Robert Kreuscher, Senior Sales Engineer, John Pepe, Market Development Principal, Shawn Aquino, Sr. PMM, Proofpoint
    Monitoring digital communications has long been a standard practice for highly regulated organizations to ensure that they meet compliance standards.

    But what are other use cases for supervision?

    Watch our 30-minute live demo to learn how you can utilize supervision technology to mitigate conduct risk in broad areas of exposure, such as toxic workplace, mergers and acquisitions, and brand reputation. We’ll cover how to:

    · Monitor for infractions and post-event investigations
    · Identify major potential risks, including high-risk individuals and view violation trends over time
    · Use analytics tools to understand the deeper context and inter-relationships of communications
  • Live Demo: Prevent Phishing Attacks with Proofpoint Threat Protection Platform Recorded: Apr 8 2021 32 mins
    Brett Shaw, Senior Product Marketing Manager, Proofpoint, Ken Greene, Senior Sales Engineer, Proofpoint
    Over 90% of breaches start with attacks targeting people via email. Whether it’s malware, credential phishing or email fraud, organizations need a comprehensive layered solution to protect against these attacks.

    Watch Proofpoint’s expert for a demo on how you can protect your people against the ever-changing threat landscape by providing visibility, risk reduction and operational efficiency with Proofpoint’s Threat Protection Platform.

    We cover:

    - How threat actors are leveraging email and cloud together to target your users
    - How the platform provides visibility into your biggest risk: your people
    - How Proofpoint helps mitigate risk and drives operation efficiency
  • Phishing's Massive Impact: A Discussion Recorded: Apr 7 2021 102 mins
    Sam Masiello, Ciso, Gates Corp, Mark Guntrip, Product Director, Proofpoint, Daniel Greene, Esq., Attorney, Beckage PLLC
    Phishing attacks have a negative and costly impact on organizations. IT professionals find themselves spending time on resolving potentially malicious messages and abuse mailboxes, resulting in user downtime. With attacks like credential theft, ransomware, and business email compromise (BEC) increasing, and the added complication of people working from home, it's time for a new preventative approach. There is no silver bullet, so it is essential for organizations to take a multi-pronged approach to address this problem. Watch our panel of experts discuss:

    • Strategies for an integrated approach to phishing
    • Finding and balancing the right controls
    • Best practices for reducing risk and cutting costs
  • Live Demo: How to Protect Your Cloud Users and Data Recorded: Apr 7 2021 31 mins
    Amish Kohli, Cloud Security Solutions Architect, Proofpoint
    52% of organizations have compromised cloud accounts, resulting in data loss, wire fraud, spam and more. Companies need to monitor cloud usage, mitigate account takeover and govern cloud apps to protect sensitive data. So how can you achieve this?

    Watch our demo of Proofpoint’s Cloud Access Security Broker (CASB) to see how you can protect your users from cloud threats and safeguard sensitive data while staying compliant.

    We cover how you can:

    - Understand the cloud threats facing your organization and users by leveraging Proofpoint’s threat intelligence
    - Discover sensitive data in cloud apps and mitigate data security risks
    - Control access to cloud apps and data for unmanaged devices
  • Live Demo: Identify High-Risk Users & Protect Your Organization Recorded: Mar 25 2021 35 mins
    Sai Chavali, Sr. Product Marketing Manager, Proofpoint, Tony Kubinksi, Sr. Sales Engineer, Proofpoint
    Not all users are alike. Some will pose a higher risk to your organization than others. Managing insider threats starts with deciding which of your users pose the biggest risk – whether they’re employees, privileged users, contractors, third parties or supply chain partners.

    Watch our live demo to learn how to build a practical, technology-enabled insider threat management program to protect your data.

    In this 30-minute live demo, you will learn:

    - How to recognize high risk users with common use cases
    - Why context into user activity and data movement is key to identifying insider threats
    - Practical security tips to protect your organization from the loss of critical data and IP
  • Cloud Governance Best Practices - Featuring Forrester Research Recorded: Mar 23 2021 58 mins
    Itir Clarke, Senior Product Marketing Manager, Proofpoint, Andras Cser, VP, Principal Analyst, Forrester
    Information security processes developed for on-premises infrastructure have been network-centric and often fall short of mitigating the unique risks of cloud usage. Companies need a holistic cloud governance program that accounts for the diverse interests of the internal stakeholders and regulators as well as the risk profiles of your cloud users.

    Watch this special webinar with guest speaker Andras Cser, Vice President & Principal Analyst serving Security & Risk Professionals for Forrester Research, to discuss best practices for cloud governance and a people-centric approach to cloud security. We discuss:

    - Who is responsible for securing workloads in the cloud
    - The appropriate protections for cloud users, workloads, and data
    - Processes and tools you require as you migrate to the cloud
    - Examples of better security controls for cloud apps and services
Data Protection Made Easy
InteliSecure is a managed security services provider specializing in data protection. With more than 15 years’ experience, 500 plus customers and 2 plus million users, companies large and small rely on our services and specialists to protect the integrity and safety of their sensitive information. We make data security and compliance easy by providing more effective data protection services at lower cost, eliminating the strain on IT organizations, and reducing the risk of confidential information getting into the wrong hands.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Risk Adaptive Technology
  • Live at: May 12 2020 4:00 pm
  • Presented by: Jeremy Wittkop
  • From:
Your email has been sent.
or close