• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Silos to Seamless: Creating Holistic Security

View presentation slides.

The evolving complexity and increasing number of persistent threats continues to challenge security programs worldwide. These threats, a BYOD culture and other fast-paced changes, are forcing organizations to adapt to protect their critical assets. A well-designed critical asset protection program focuses on information assets most important to the organization and the infrastructure assets that protect them. Key technologies in a critical asset program include: data loss prevention, web gateway, email gateway, SIEM and traditional security products such as encryption, firewalls and IDS/IPS. While these technologies were traditionally siloed, a critical asset program seamlessly integrates them to provide comprehensive protection.

Join InteliSecure to learn about the changing threat landscape and the tools and approach that successfully prevent data exfiltration

Key learning points:
  • How to define your organizations most important data assets.
  • Understand which technologies best protect your organization and why.
  • The elements needed to create an effective security program.

About Jeremy Wittkop

As CTO, Jeremy Wittkop leads a team that investigates and ensures the integrity and functionality of every custom solution designed for InteliSecure clients. Wittkop also focuses on evaluating potential new offerings for InteliSecure customers, working with current vendor partners to ensure their solutions address the client needs of tomorrow and developing solutions that address the new and ever-changing security risks to the enterprise.

He previously served as director of sales engineering and director of managed services at InteliSecure where he was responsible for building and leading the solution engineering and managed services teams

Prior to joining InteliSecure, Wittkop served in the United States Army and held positions in a variety of organizations including defense, logistics and entertainment. With his varied background and experience, he brings a unique perspective to today’s evolving security threats.

Primary Sidebar

Details

Wednesday May 13, 2015
9:45 AM - 10:45 AM
Room 12
Level: Intermediate
Focus: , Cybersecurity, GRC (Governance, Risk & Compliance)

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.