The evolving complexity and increasing number of persistent threats continues to challenge security programs worldwide. These threats, a BYOD culture and other fast-paced changes, are forcing organizations to adapt to protect their critical assets. A well-designed critical asset protection program focuses on information assets most important to the organization and the infrastructure assets that protect them. Key technologies in a critical asset program include: data loss prevention, web gateway, email gateway, SIEM and traditional security products such as encryption, firewalls and IDS/IPS. While these technologies were traditionally siloed, a critical asset program seamlessly integrates them to provide comprehensive protection.
Join InteliSecure to learn about the changing threat landscape and the tools and approach that successfully prevent data exfiltration
- How to define your organizations most important data assets.
- Understand which technologies best protect your organization and why.
- The elements needed to create an effective security program.
About Jeremy Wittkop
As CTO, Jeremy Wittkop leads a team that investigates and ensures the integrity and functionality of every custom solution designed for InteliSecure clients. Wittkop also focuses on evaluating potential new offerings for InteliSecure customers, working with current vendor partners to ensure their solutions address the client needs of tomorrow and developing solutions that address the new and ever-changing security risks to the enterprise.
He previously served as director of sales engineering and director of managed services at InteliSecure where he was responsible for building and leading the solution engineering and managed services teams
Prior to joining InteliSecure, Wittkop served in the United States Army and held positions in a variety of organizations including defense, logistics and entertainment. With his varied background and experience, he brings a unique perspective to today’s evolving security threats.