SlideShare una empresa de Scribd logo
1 de 28
Asia Pacific Training Conference 2009


Crafting, Developing and Executing
 a Corporate Intelligence Program
       from Online Sources
                                                      Jeff Bedser, President/COO
                                                       Internet Crimes Group, Inc.
                                                                 iThreat® Solutions


  Copyright ICG, Inc. 2000-2008 All rights reserved
Agenda
 Threats…
  What kinds of threats are out there?
  Are they in my neighborhood?
 Awareness
  RSS, Blogs, Auction Sites…
 Analysis
  False Positives
  Data quality
 Action



        Copyright ICG, Inc. 2000-2008 All rights reserved
Awareness




Copyright ICG, Inc. 2000-2008 All rights reserved
Being Aware… of what?
 Data loss
   Internal/External
 Infrastructure manipulation or diversion
   Planning of attempts to compromise web based services
 Counterfeit product
   Consumer product, Pharmaceutical or hardware
 Attack on products or infrastructure
   Hardware compromise (mobile phone or appliance)
 Employee theft
 High risk individuals/behaviors
 Piracy
         Copyright ICG, Inc. 2000-2008 All rights reserved
Becoming Aware… Sources of Data
 Websites
  Blogs
  Message boards
  Forums
  Social networking
 Auction sites
 Media RSS/XML Feeds
 Listservs/email
 IRC (Internet Relay Chat)



        Copyright ICG, Inc. 2000-2008 All rights reserved
Media Data Sources
 Mainstream Media
   CNN, BBC, NYT, WSG, Globe & Mail, FT, etc.
 Trade Specific Periodicals
   Pharmaceutical
   Industrial
   Piracy
 Independent Media
   Indymedia.org
   Alternet.org




        Copyright ICG, Inc. 2000-2008 All rights reserved
Blogs




Estimate for January 2008 = 145M


        Copyright ICG, Inc. 2000-2008 All rights reserved
Auction Sites



                                      Remember: The sites you have
                                      heard the least about are the ones
                                      more likely to be used as “fences”
                                      for stolen goods.




     Copyright ICG, Inc. 2000-2008 All rights reserved
Counterfeiting and Diversion


                                                         »   The Internet makes it easier
                                                             than ever for importers to
                                                             obtain counterfeit and
                                                             diverted goods.
                                                         »   Dozens of business-to-
                                                             business called “Trade
                                                             Boards” websites help
                                                             suppliers and importers
                                                             connect.


     Copyright ICG, Inc. 2000-2008 All rights reserved
Auction/Trade Boards/Classified Sites
 Where did the medications come from? Are they
 counterfeit? Expired? Diverted?
 The medical devices and bandaging… same issue… also,
 are they sterile?
 Is the device safe? Proper codes followed in the
 manufacturing process?
 Is stolen property from the facility or production line
 ending up on these boards being fenced?
 Is your purchasing or supply entity reselling company
 property online?


        Copyright ICG, Inc. 2000-2008 All rights reserved
Wholesale Trade Feeds the Internet Pharmacy Threat
  Intelligence Identifies Cyber/Physical Relationships




                                                                         Portal
                                                                        Websites

                                                              Portal
                                                                                         SPAM
                                                             Websites
Secondary                Mail Order                                      Portal
 Market                  Pharmacy                                       Websites
Wholesalers                                                                         Popup Ads
                                                              Portal
                                                             Websites
                                                                         Portal
                                                                                                    Buyers
                                                                        Websites
                       eCommerce
                        Pharmacy

                                                                                    Search Engine
                                                                                     Placement

                        Anchor                                Affiliate Programs:
                        Business                              Rings of Web Sites


              Copyright ICG, Inc. 2000-2008 All rights reserved
Special Interest
 Groups that target researchers, ties to donors, high
 profile staff
   Animal rights
   Aids Activists
   Organized labor
 Groups that target financial companies,
 private info, credit card data
   Phishing
   Data markets
   Identity theft



         Copyright ICG, Inc. 2000-2008 All rights reserved
Extremist Group Fixed Geo-location




     Copyright ICG, Inc. 2000-2008 All rights reserved
Where to find data/intelligence on
these groups?....Networking Sites
 Social                                                       Business




                                                              Anti-Social



          Copyright ICG, Inc. 2000-2008 All rights reserved
Analysis




Copyright ICG, Inc. 2000-2008 All rights reserved
How do you utilize this new stream of
data?
 Near-real-time threat data
   Events
   Warnings
 Aggregation of news by topic
   Crime
   Traffic
   Weather
 Nation, region, product, person




        Copyright ICG, Inc. 2000-2008 All rights reserved
Key Issue:

More Sources = More time and effort

 More sources of information dictate further and more
 comprehensive analysis This of course facilitates
 understanding, interpretation and scope of the effort.




       Copyright ICG, Inc. 2000-2008 All rights reserved
Mapping Threats



Your facility                                                       Threats to
                                                                    the facility




                Copyright ICG, Inc. 2000-2008 All rights reserved
Proximity Alerting




     Copyright ICG, Inc. 2000-2008 All rights reserved
Data Aggregation

     Open Source Intelligence


     iThreat® Red Flag Intel




      Other Information Sources


       In-House Human Intelligence



     Copyright ICG, Inc. 2000-2008 All rights reserved
Proximity Alerting




     Copyright ICG, Inc. 2000-2008 All rights reserved
Create Metrics




     Copyright ICG, Inc. 2000-2008 All rights reserved
Pitfalls of Open Source Programs
 Not specific enough or too specific
  CEO has a very common name
  Common acronyms have multiple meanings
  Language not taken into account – contextual translation
  failures
  Products have different names in different regions




        Copyright ICG, Inc. 2000-2008 All rights reserved
Pitfalls of Analysis:                                     False Positives




            SHAC: Stop Huntingdon Animal Cruelty … or
                            Student Honors Advisory Council



      Copyright ICG, Inc. 2000-2008 All rights reserved
Action




Copyright ICG, Inc. 2000-2008 All rights reserved
Taking Action

 Organizational Challenges
  How do you integrate open source intelligence into your
  workflow?
  How will it change you business practices?
 The connection between external and internal threats
  Understanding and finding the interrelation between these
  threat vectors.




        Copyright ICG, Inc. 2000-2008 All rights reserved
Summary
Awareness
  Do you best to know where and when to look for intelligence.
  Much of it is there to find in the public domain.
Analysis
  Spend the time to interpret the threat and risk to your
  operation.
Action
  Force the issue in your organization. Be proactive in your
  response.




         Copyright ICG, Inc. 2000-2008 All rights reserved
Q&A
                                                    Jeff Bedser, President/COO
                                                     Internet Crimes Group, Inc.
                                                               iThreat® Solutions


Copyright ICG, Inc. 2000-2008 All rights reserved

Más contenido relacionado

La actualidad más candente

Overcoming AI Challenges with IBM’s AI Ladder
Overcoming AI Challenges with IBM’s AI LadderOvercoming AI Challenges with IBM’s AI Ladder
Overcoming AI Challenges with IBM’s AI LadderBernard Marr
 
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...Bernard Marr
 
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016Alex G. Lee, Ph.D. Esq. CLP
 
Intellectual Property Fraud Protection
Intellectual Property Fraud ProtectionIntellectual Property Fraud Protection
Intellectual Property Fraud ProtectionNEW Momentum
 
The Amazing Ways John Deere Uses Artificial Intelligence And Machine Vision T...
The Amazing Ways John Deere Uses Artificial Intelligence And Machine Vision T...The Amazing Ways John Deere Uses Artificial Intelligence And Machine Vision T...
The Amazing Ways John Deere Uses Artificial Intelligence And Machine Vision T...Bernard Marr
 
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1Djadja Sardjana
 
What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?Nozha Boujemaa
 
What Is The Next Level Of AI Technology?
What Is The Next Level Of AI Technology?What Is The Next Level Of AI Technology?
What Is The Next Level Of AI Technology?Bernard Marr
 
Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Bernard Marr
 
Future Trends of AI and Analytics in the Cloud
Future Trends of AI and Analytics in the CloudFuture Trends of AI and Analytics in the Cloud
Future Trends of AI and Analytics in the CloudBernard Marr
 
Blockchain Based 4th Industrial Revolution Key Technologies Integration Use C...
Blockchain Based 4th Industrial Revolution Key Technologies Integration Use C...Blockchain Based 4th Industrial Revolution Key Technologies Integration Use C...
Blockchain Based 4th Industrial Revolution Key Technologies Integration Use C...Alex G. Lee, Ph.D. Esq. CLP
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtRoopa Nadkarni
 
Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?Bernard Marr
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik HamburgFraunhofer AISEC
 
Smart Underpants: A New "Brief" in Health Monitoring
Smart Underpants: A New "Brief" in Health MonitoringSmart Underpants: A New "Brief" in Health Monitoring
Smart Underpants: A New "Brief" in Health MonitoringBernard Marr
 
The New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
The New Global AI Arms Race: How Nations Must Compete On Artificial IntelligenceThe New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
The New Global AI Arms Race: How Nations Must Compete On Artificial IntelligenceBernard Marr
 
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020Bernard Marr
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netRaman K. Attri
 
10 Business Functions That Are Ready To Use Artificial Intelligence
10 Business Functions That Are Ready To Use Artificial Intelligence10 Business Functions That Are Ready To Use Artificial Intelligence
10 Business Functions That Are Ready To Use Artificial IntelligenceBernard Marr
 
The Human Side of Artificial Intelligence
The Human Side of Artificial IntelligenceThe Human Side of Artificial Intelligence
The Human Side of Artificial IntelligenceBernard Marr
 

La actualidad más candente (20)

Overcoming AI Challenges with IBM’s AI Ladder
Overcoming AI Challenges with IBM’s AI LadderOvercoming AI Challenges with IBM’s AI Ladder
Overcoming AI Challenges with IBM’s AI Ladder
 
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
The Amazing Ways Telecom Companies Use Artificial Intelligence And Machine Le...
 
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
 
Intellectual Property Fraud Protection
Intellectual Property Fraud ProtectionIntellectual Property Fraud Protection
Intellectual Property Fraud Protection
 
The Amazing Ways John Deere Uses Artificial Intelligence And Machine Vision T...
The Amazing Ways John Deere Uses Artificial Intelligence And Machine Vision T...The Amazing Ways John Deere Uses Artificial Intelligence And Machine Vision T...
The Amazing Ways John Deere Uses Artificial Intelligence And Machine Vision T...
 
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
Widyatama Lecture Applied Networking-IV Week05 Mobile Security 1
 
What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?
 
What Is The Next Level Of AI Technology?
What Is The Next Level Of AI Technology?What Is The Next Level Of AI Technology?
What Is The Next Level Of AI Technology?
 
Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help
 
Future Trends of AI and Analytics in the Cloud
Future Trends of AI and Analytics in the CloudFuture Trends of AI and Analytics in the Cloud
Future Trends of AI and Analytics in the Cloud
 
Blockchain Based 4th Industrial Revolution Key Technologies Integration Use C...
Blockchain Based 4th Industrial Revolution Key Technologies Integration Use C...Blockchain Based 4th Industrial Revolution Key Technologies Integration Use C...
Blockchain Based 4th Industrial Revolution Key Technologies Integration Use C...
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?Is Artificial Intelligence (AI) A Threat To Humans?
Is Artificial Intelligence (AI) A Threat To Humans?
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg
 
Smart Underpants: A New "Brief" in Health Monitoring
Smart Underpants: A New "Brief" in Health MonitoringSmart Underpants: A New "Brief" in Health Monitoring
Smart Underpants: A New "Brief" in Health Monitoring
 
The New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
The New Global AI Arms Race: How Nations Must Compete On Artificial IntelligenceThe New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
The New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
 
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
 
E-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the netE-commerce Technology for Safe money transaction over the net
E-commerce Technology for Safe money transaction over the net
 
10 Business Functions That Are Ready To Use Artificial Intelligence
10 Business Functions That Are Ready To Use Artificial Intelligence10 Business Functions That Are Ready To Use Artificial Intelligence
10 Business Functions That Are Ready To Use Artificial Intelligence
 
The Human Side of Artificial Intelligence
The Human Side of Artificial IntelligenceThe Human Side of Artificial Intelligence
The Human Side of Artificial Intelligence
 

Similar a Developing a corporate intelligence strategy from online sources

Business: Security & Privacy
Business: Security & PrivacyBusiness: Security & Privacy
Business: Security & PrivacyJeremy Hilton
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process HackingRichard Stiennon
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Business Development Institute
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tBeau Christensen
 
Protecting your business ideas including crowdfunding
Protecting your business ideas including crowdfundingProtecting your business ideas including crowdfunding
Protecting your business ideas including crowdfundingTraklight.com
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperSue Hallen
 
Kondo-ing API Authorization
Kondo-ing API AuthorizationKondo-ing API Authorization
Kondo-ing API AuthorizationNordic APIs
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data AnalyticsEMC
 
Smart Data Slides: Leverage the IOT to Build a Smart Data Ecosystem
Smart Data Slides: Leverage the IOT to Build a Smart Data EcosystemSmart Data Slides: Leverage the IOT to Build a Smart Data Ecosystem
Smart Data Slides: Leverage the IOT to Build a Smart Data EcosystemDATAVERSITY
 
ULTRA Cooley Presentation
ULTRA Cooley PresentationULTRA Cooley Presentation
ULTRA Cooley PresentationAl Ewers
 
Drug Discovery Innovation in a Precompetitive Cloud Platform (LFS302-S) - AWS...
Drug Discovery Innovation in a Precompetitive Cloud Platform (LFS302-S) - AWS...Drug Discovery Innovation in a Precompetitive Cloud Platform (LFS302-S) - AWS...
Drug Discovery Innovation in a Precompetitive Cloud Platform (LFS302-S) - AWS...Amazon Web Services
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Alex G. Lee, Ph.D. Esq. CLP
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Artificial Intelligence Tutorial
Artificial Intelligence TutorialArtificial Intelligence Tutorial
Artificial Intelligence TutorialVeritone, Inc.
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptxMhndHTaani
 

Similar a Developing a corporate intelligence strategy from online sources (20)

Business: Security & Privacy
Business: Security & PrivacyBusiness: Security & Privacy
Business: Security & Privacy
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process Hacking
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Conf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_tConf2013 bchristensen thebig_t
Conf2013 bchristensen thebig_t
 
Protecting your business ideas including crowdfunding
Protecting your business ideas including crowdfundingProtecting your business ideas including crowdfunding
Protecting your business ideas including crowdfunding
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 
Kondo-ing API Authorization
Kondo-ing API AuthorizationKondo-ing API Authorization
Kondo-ing API Authorization
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Smart Data Slides: Leverage the IOT to Build a Smart Data Ecosystem
Smart Data Slides: Leverage the IOT to Build a Smart Data EcosystemSmart Data Slides: Leverage the IOT to Build a Smart Data Ecosystem
Smart Data Slides: Leverage the IOT to Build a Smart Data Ecosystem
 
ULTRA Cooley Presentation
ULTRA Cooley PresentationULTRA Cooley Presentation
ULTRA Cooley Presentation
 
Drug Discovery Innovation in a Precompetitive Cloud Platform (LFS302-S) - AWS...
Drug Discovery Innovation in a Precompetitive Cloud Platform (LFS302-S) - AWS...Drug Discovery Innovation in a Precompetitive Cloud Platform (LFS302-S) - AWS...
Drug Discovery Innovation in a Precompetitive Cloud Platform (LFS302-S) - AWS...
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Artificial Intelligence Tutorial
Artificial Intelligence TutorialArtificial Intelligence Tutorial
Artificial Intelligence Tutorial
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
info-sys-security3.pptx
info-sys-security3.pptxinfo-sys-security3.pptx
info-sys-security3.pptx
 

Más de Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

Más de Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Último

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 

Último (20)

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 

Developing a corporate intelligence strategy from online sources

  • 1. Asia Pacific Training Conference 2009 Crafting, Developing and Executing a Corporate Intelligence Program from Online Sources Jeff Bedser, President/COO Internet Crimes Group, Inc. iThreat® Solutions Copyright ICG, Inc. 2000-2008 All rights reserved
  • 2. Agenda Threats… What kinds of threats are out there? Are they in my neighborhood? Awareness RSS, Blogs, Auction Sites… Analysis False Positives Data quality Action Copyright ICG, Inc. 2000-2008 All rights reserved
  • 3. Awareness Copyright ICG, Inc. 2000-2008 All rights reserved
  • 4. Being Aware… of what? Data loss Internal/External Infrastructure manipulation or diversion Planning of attempts to compromise web based services Counterfeit product Consumer product, Pharmaceutical or hardware Attack on products or infrastructure Hardware compromise (mobile phone or appliance) Employee theft High risk individuals/behaviors Piracy Copyright ICG, Inc. 2000-2008 All rights reserved
  • 5. Becoming Aware… Sources of Data Websites Blogs Message boards Forums Social networking Auction sites Media RSS/XML Feeds Listservs/email IRC (Internet Relay Chat) Copyright ICG, Inc. 2000-2008 All rights reserved
  • 6. Media Data Sources Mainstream Media CNN, BBC, NYT, WSG, Globe & Mail, FT, etc. Trade Specific Periodicals Pharmaceutical Industrial Piracy Independent Media Indymedia.org Alternet.org Copyright ICG, Inc. 2000-2008 All rights reserved
  • 7. Blogs Estimate for January 2008 = 145M Copyright ICG, Inc. 2000-2008 All rights reserved
  • 8. Auction Sites Remember: The sites you have heard the least about are the ones more likely to be used as “fences” for stolen goods. Copyright ICG, Inc. 2000-2008 All rights reserved
  • 9. Counterfeiting and Diversion » The Internet makes it easier than ever for importers to obtain counterfeit and diverted goods. » Dozens of business-to- business called “Trade Boards” websites help suppliers and importers connect. Copyright ICG, Inc. 2000-2008 All rights reserved
  • 10. Auction/Trade Boards/Classified Sites Where did the medications come from? Are they counterfeit? Expired? Diverted? The medical devices and bandaging… same issue… also, are they sterile? Is the device safe? Proper codes followed in the manufacturing process? Is stolen property from the facility or production line ending up on these boards being fenced? Is your purchasing or supply entity reselling company property online? Copyright ICG, Inc. 2000-2008 All rights reserved
  • 11. Wholesale Trade Feeds the Internet Pharmacy Threat Intelligence Identifies Cyber/Physical Relationships Portal Websites Portal SPAM Websites Secondary Mail Order Portal Market Pharmacy Websites Wholesalers Popup Ads Portal Websites Portal Buyers Websites eCommerce Pharmacy Search Engine Placement Anchor Affiliate Programs: Business Rings of Web Sites Copyright ICG, Inc. 2000-2008 All rights reserved
  • 12. Special Interest Groups that target researchers, ties to donors, high profile staff Animal rights Aids Activists Organized labor Groups that target financial companies, private info, credit card data Phishing Data markets Identity theft Copyright ICG, Inc. 2000-2008 All rights reserved
  • 13. Extremist Group Fixed Geo-location Copyright ICG, Inc. 2000-2008 All rights reserved
  • 14. Where to find data/intelligence on these groups?....Networking Sites Social Business Anti-Social Copyright ICG, Inc. 2000-2008 All rights reserved
  • 15. Analysis Copyright ICG, Inc. 2000-2008 All rights reserved
  • 16. How do you utilize this new stream of data? Near-real-time threat data Events Warnings Aggregation of news by topic Crime Traffic Weather Nation, region, product, person Copyright ICG, Inc. 2000-2008 All rights reserved
  • 17. Key Issue: More Sources = More time and effort More sources of information dictate further and more comprehensive analysis This of course facilitates understanding, interpretation and scope of the effort. Copyright ICG, Inc. 2000-2008 All rights reserved
  • 18. Mapping Threats Your facility Threats to the facility Copyright ICG, Inc. 2000-2008 All rights reserved
  • 19. Proximity Alerting Copyright ICG, Inc. 2000-2008 All rights reserved
  • 20. Data Aggregation Open Source Intelligence iThreat® Red Flag Intel Other Information Sources In-House Human Intelligence Copyright ICG, Inc. 2000-2008 All rights reserved
  • 21. Proximity Alerting Copyright ICG, Inc. 2000-2008 All rights reserved
  • 22. Create Metrics Copyright ICG, Inc. 2000-2008 All rights reserved
  • 23. Pitfalls of Open Source Programs Not specific enough or too specific CEO has a very common name Common acronyms have multiple meanings Language not taken into account – contextual translation failures Products have different names in different regions Copyright ICG, Inc. 2000-2008 All rights reserved
  • 24. Pitfalls of Analysis: False Positives SHAC: Stop Huntingdon Animal Cruelty … or Student Honors Advisory Council Copyright ICG, Inc. 2000-2008 All rights reserved
  • 25. Action Copyright ICG, Inc. 2000-2008 All rights reserved
  • 26. Taking Action Organizational Challenges How do you integrate open source intelligence into your workflow? How will it change you business practices? The connection between external and internal threats Understanding and finding the interrelation between these threat vectors. Copyright ICG, Inc. 2000-2008 All rights reserved
  • 27. Summary Awareness Do you best to know where and when to look for intelligence. Much of it is there to find in the public domain. Analysis Spend the time to interpret the threat and risk to your operation. Action Force the issue in your organization. Be proactive in your response. Copyright ICG, Inc. 2000-2008 All rights reserved
  • 28. Q&A Jeff Bedser, President/COO Internet Crimes Group, Inc. iThreat® Solutions Copyright ICG, Inc. 2000-2008 All rights reserved