SlideShare una empresa de Scribd logo
1 de 17
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
SCIP Atlanta Chapter Meeting
Securing Your Perimeter:
Preventing Loss, Theft, and Misappropriation of Your
Business Secrets & Intellectual Assets
October 1, 2013
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Contact Information
2
Derek Johnson, CFA
Chief Executive Officer
+1 608-268-3470
Derek.Johnson@AuroraWDC.com
John Thomson
Chief Research Officer
+1 770-519-2560
John.Thomson@AuroraWDC.com
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Operations Security Process
1. Identify Critical
Information
2. Analyze the
Threat
3. Analyze
Vulnerabilities
4. Assess Risk
5. Apply
Protection &
Countermeasures
3
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
What Needs to Be Protected?
 Intellectual Property/Trade Secrets
 Bidding strategies
 Cost & margin information
 Customer lists
 Formulas
 Merger/acquisition plans
 Negotiating strategies
 International marketing/entry plans
 Personnel records
 Product development roadmaps
 Recruiting strategy
 Travel itineraries
 Location of sensitive R&D facilities
 Competitive intelligence reports/analysis
 What else?
Can vary from company to company….
4
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Activists
Foreign
Governments
Competitors
Customers
Hackers,
Criminal Elements
Regulators
Vendors
Lobbyists, Trade,
Special Interest
Groups
Market Research
& CI Firms
Trade Groups
Consultants
Financial Analysts
Headhunters
Journalists
External Threats to Company Information
It’s not just your competitors…
5
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Threat Matrix Example
Apple Inc.
Domestic Foreign
LegalIllegal
 Traditional Competitors
 Emerging Competitors
 Suppliers/Vendors
 Wireless Carriers &
Customers
 Technology Partners
 Apps Developers
 Tech Bloggers
 Patent Trolls
 Equity & Industry Analysts
 CI & MR Firms
 Journalists
 Special Interest/Trade
Groups
 Headhunters
 Regulators
 Private Investigators &
Attorneys
 Tech Consultants &
Integrators
 Careless or disgruntled
employees
 Former employees
 Labor Unions
 Hackers & cyber criminals
 Social Engineers
 Aggressive /Unethical CI Firms
 Security Researchers/Consultants
 Activists
 Organized Crime
 NSA
 Terrorists
 Disgruntled employees
 Malicious Apps Developers
 H-1B employees from threat countries (i.e. China)
 Hackers & cyber criminals
 Foreign Competitors (i.e. China, S. Korea, etc.)
 Foreign Governments: China, Russia, Germany,
France, Israel, S. Korea, Japan, etc.
 WikiLeaks
 Terrorists & Activists targeting U.S. interests
 Intelligence firms/corporate espionage operatives
 Organized Crime
 Security researchers/consultants
 Malicious Apps Developers
 Employees in threat countries
 Traditional Competitors
 Emerging Competitors
 Suppliers/Vendors
 Customers
 Technology Partners
 Apps Developers
 Tech Bloggers
 Analysts
 CI & MR Firms
 Journalists
 Headhunters
 Regulators
 Tech Consultants &
Integrators
 Foreign Governments
 Special interest/trade groups
6
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Assessing Vulnerabilities
 Identify, Quantify, and Prioritize your organization’s
vulnerabilities
 Catalog your company’s critical information elements
 Assign “value” and prioritization to each element
 Identify vulnerabilities or potential threats for each
element
 Think like the “hunter” – view your organization from the
adversary’s perspective.
 Assess current information handling procedures.
 Test your defenses to determine vulnerabilities – i.e. “red
team” operations & penetration testing
7
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Assessing Risk
Vulnerability to Threat
Very High High Moderate Low
Devastating
Severe
Noticeable
Minor
ImpactofLoss
Risk Matrix
Assigning risk levels to each identified vulnerability
Source: American Society for Industrial Security (ASIS)
8
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
HUMINT techniques used by the pros to
obtain information on your company
The “Human” Factor
9
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
What Needs
to be
Collected?
Who Might
Have The
Information
(or know
someone who
has it)?
Source
Assessment &
Selection
Source
Research
Approach
Development
Source
Contact
 Profile the source
 Determine
background,
interests, hobbies
 Assess
personality &
motivators
Source Identification & Targeting
HUMINT Collection Planning Process
 Break out
KITS/KIQS into
specific info
requirements.
 Identify
information gaps
 Brainstorming source
types, companies,
potential job titles
 Research &
identification of
specific names
 Develop initial
source list
 Develop the
approach,
determine
motivators to
leverage
 Conversation
planning
 Choose elicitation
techniques &
placement
 Plan for follow up
 Telephone, e-mail,
face-to-face,
LinkedIn.
 One or multiple
conversations
 Keep door open
for follow up &
further
development
 Obtain referrals
10
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Elicitation
Elicitation: Obtaining information via carefully planned conversation where the
target is not aware that he/she is being exploited for intelligence purposes
Exploits Several Human Tendencies
 Natural tendency to correct others or prove
someone wrong.
 Need for recognition & desire to be viewed
as an expert in their field.
 Tendency to discuss things that are not
their direct concern, tendency towards
gossip, & general inability to keep secrets.
 Occupational habits of wanting to teach,
advise, correct, or challenge someone.
 Tendency towards self-effacement.
 Tendency towards indiscretion when not in
control of emotions or when there is a
sympathetic/listening ear being offered.
 Tendency of some professionals to share
confidence with or show off their expertise
to another professional.
Tendency to underestimate the value of info
or your ability to understand that info.
Common Approaches/Techniques
 Conversational Hourglass
 Direct statements vs. questions
 Two way conversation (vs. “interview”)
 Rapport building
 Technique Examples:
 Simple flattery
 Naïve mentality (ego suspension)
 Mutual interests
 Opposing stand or partial disagreement
 Quid pro quo
 Exploiting the instinct to complain
 Quotation of “reported facts”
 Disbelief or skepticism
 Criticism
 Oblique references
 Provocation or jocularity
Sources: The Centre for Operational Business Intelligence, Phoenix Consulting, DeGenaro
& Associates
11
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Elicitation
Video: Elicitation Examples
12
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Social Engineering
Social Engineering: Getting people to do things they wouldn’t ordinarily do for
a stranger via misrepresentation, deception, & psychological manipulation
Source: “The Art of Deception”, Kevin Mitnick
Leverages Six Psychological Motivators
 Authority – Tendency to comply with a
request from a person in authority.
 Likeability – Tendency to comply when the
requestor is likeable or has similar
interests/beliefs.
 Reciprocation – Tendency to comply when
given the promise (or assumption) of getting
something in return.
 Consistency – Tendency to comply after
having made a public commitment,
endorsement, or promise (i.e. company
security policies).
 Social Validation – Tendency to comply
when doing so appears in line with what
others are doing.
 Scarcity – Tendency to comply when it is
believed the object sought is in short supply
and others are competing for it.
Common Approaches
 Posing as a fellow employee or company
exec, partner, vendor, customer, law
enforcement, regulator, or anyone in
authority.
 Using insider lingo to gain trust.
 Sending a virus or Trojan as an e-mail
attachment or getting the victim to visit an
infected website.
 Using a false pop-up password window.
 Capturing victim’s keystrokes via a keylogger.
 Leaving an infected flash drive or CD around
the workplace or dropping it with the mail
room or receptionist for intra-office delivery.
Setting up e-mail, voicemail, or infected sites
to appear internal. Asking for a file to be
transferred to an apparent internal location.
 Pretending to be from a remote office and
asking for email or system access locally.
13
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Video: Real-Life Social Engineering Attack
Social Engineering
14
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Warning Signs
 Refusal to give callback number
 Out-of-ordinary request
 Claim of authority
 Stresses urgency
 Threatens negative consequences of non-
compliance
 Shows discomfort when questioned
 Name dropping
 Compliments or flattery
 Flirting
 Asks you to open a file or click on a
hyperlink
Warning Signs of a Social
Engineering Attack Warning Signs of Elicitation
 Attempt to establish rapport, common
interests, use of flattery
 Lack of direct questions & specificity
 Heavy use of silence
 Offer of quid pro quo
 Statement of “reported” facts
 Use of naiveté
 Provocation, disbelief, opposing stand
 Refusal to sign an NDA (only applies to
ethical collectors)
15
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Protection Plan Suggestions
 AWARENESS TRAINING!!
 Constant and ongoing, customized towards all disciplines within the company
 Develop an OPSEC & information security culture within the company (i.e. “Scared Quiet”)
 Understand your threats & vulnerabilities, & what needs to be protected
 Develop and enforce information security guidelines & policies for dealing with external entities
seeking information.
 Work with IT regarding use of VPN’s and anonymous browsing capabilities for travelers.
 Corporate Threat Assessment /Watch Team
 Represented by multiple departments (CI, Security, IT, Legal, HR, Operations)
 Mark & secure all confidential documents & products
 Limit access to sensitive information & prototypes
 Special briefings & guidelines for international travelers (or all travelers, for that matter)
 Assume all overseas communications are being intercepted
 Assume all overseas hotel rooms are bugged
 Utilize NDAs and non-compete agreements
 Information security audits & guidelines for vendors/partners
 Closely investigate all potential partners
 Set up a hotline (telephone, e-mail, intranet) for reporting suspicious calls & activity
 Investigate (and act on) suspicious activity
 Run simulated attacks against your own company to assess vulnerabilities.
Never make it easy or cheap for an adversary
16
Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013
Protection & Countermeasures
 Culture of secrecy. Everything is strictly “need to know”.
 Immediate termination for even minor info security violations. Spouses & family are viewed as security risks.
 “Silos within Silos” - “Cell” workgroup structure - highly compartmented, each cell doesn’t know what other cells are working
on. Only senior execs know the whole “puzzle”. Workers prohibited from discussing their work with other employees.
 “Scared Silent” security lecture for every new hire.
 Workspaces are highly monitored. Prototypes are chained to desks and laser etched, with locator chips.
 Swift & aggressive investigations of information leaks.
 Uses a variety of components manufacturers to better track leaks. Security assessments & audits of 3rd party vendors.
 Physical access to company areas is highly restricted and compartmented based on badge. No one has access to every area.
 Separate NDAs for individual projects.
 Remote data erasing and geolocation for lost or stolen employee laptops/smartphones/devices.
 Confidential documents have secret watermarks to better track back to the leaker.
 Plainclothes security officers lurk the nearby bars watching for careless employees.
 Corporate org charts do not exist
 Employees hired into “dummy” positions and aren’t told what their real job will be until their first day of employment.
 Security Operations Center fields reports of suspicious activities and aggressively investigates all incidents.
 Corporate Threat Assessment Team, identifying and monitoring new and existing threats.
 Rolling 3-year security roadmap
 Aggressive internet monitoring of employee activity and potential leaks.
 Close coordination with law enforcement agencies around the globe.
 Ongoing penetration testing.
Apple‘s InfoSec Practices (Extreme measures)
>$42 million annual Information Security budget, >8,000 identified vulnerabilities
17

Más contenido relacionado

La actualidad más candente

Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesEthisphere
 
Role of HR after discovering Fraud
Role of HR after discovering FraudRole of HR after discovering Fraud
Role of HR after discovering FraudNational HRD Network
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorConf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorTechExeter
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Role of encryption in security vs privacy debate
Role of encryption in security vs privacy debateRole of encryption in security vs privacy debate
Role of encryption in security vs privacy debateKristine Hejna
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Mark Arena
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Santiago Bassett
 
Crowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceCrowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceAlienVault
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingManas Das
 

La actualidad más candente (14)

Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data Breaches
 
Role of HR after discovering Fraud
Role of HR after discovering FraudRole of HR after discovering Fraud
Role of HR after discovering Fraud
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorConf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Role of encryption in security vs privacy debate
Role of encryption in security vs privacy debateRole of encryption in security vs privacy debate
Role of encryption in security vs privacy debate
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
 
Crowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceCrowd-Sourced Threat Intelligence
Crowd-Sourced Threat Intelligence
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Destacado

Amazing things only mothers do
Amazing things only mothers doAmazing things only mothers do
Amazing things only mothers dolkpro91
 
Ohio University Libraries Social Media Strategies
Ohio University Libraries Social Media StrategiesOhio University Libraries Social Media Strategies
Ohio University Libraries Social Media StrategiesJessica Hagman
 
Proposta de logomarca - Auder (rosi)
Proposta de logomarca - Auder (rosi)Proposta de logomarca - Auder (rosi)
Proposta de logomarca - Auder (rosi)MDN Comunicação
 
Достопримечательности Верх-Исетского района
Достопримечательности Верх-Исетского районаДостопримечательности Верх-Исетского района
Достопримечательности Верх-Исетского районаЕвгений Лазо
 
Tp n° 3 informatica
Tp n° 3 informaticaTp n° 3 informatica
Tp n° 3 informaticaflormarini
 
Fca 111 Hombre y Sociedad
Fca 111 Hombre y SociedadFca 111 Hombre y Sociedad
Fca 111 Hombre y SociedadKel Naru
 
Mercy camps for children
Mercy camps for childrenMercy camps for children
Mercy camps for childrennightvigil
 
Tutorial dominguez
Tutorial dominguezTutorial dominguez
Tutorial dominguezMacaluso22
 
Career 2011 (02)
Career 2011  (02)Career 2011  (02)
Career 2011 (02)whale999
 
Library 101: Developing & Assessing a Social Media Campaign
Library 101: Developing & Assessing a Social Media CampaignLibrary 101: Developing & Assessing a Social Media Campaign
Library 101: Developing & Assessing a Social Media CampaignJessica Hagman
 
Mapa conceptual obligaciones 21
Mapa conceptual obligaciones 21Mapa conceptual obligaciones 21
Mapa conceptual obligaciones 21norimar alvarez
 
Zapisnik s 59. sjednice Školskog odbora - 2016.
Zapisnik s 59. sjednice Školskog odbora - 2016.Zapisnik s 59. sjednice Školskog odbora - 2016.
Zapisnik s 59. sjednice Školskog odbora - 2016.Trgovacka skola - Zagreb
 

Destacado (19)

Amazing things only mothers do
Amazing things only mothers doAmazing things only mothers do
Amazing things only mothers do
 
Ohio University Libraries Social Media Strategies
Ohio University Libraries Social Media StrategiesOhio University Libraries Social Media Strategies
Ohio University Libraries Social Media Strategies
 
Proposta de logomarca - Auder (rosi)
Proposta de logomarca - Auder (rosi)Proposta de logomarca - Auder (rosi)
Proposta de logomarca - Auder (rosi)
 
Достопримечательности Верх-Исетского района
Достопримечательности Верх-Исетского районаДостопримечательности Верх-Исетского района
Достопримечательности Верх-Исетского района
 
Tp n° 3 informatica
Tp n° 3 informaticaTp n° 3 informatica
Tp n° 3 informatica
 
Fca 111 Hombre y Sociedad
Fca 111 Hombre y SociedadFca 111 Hombre y Sociedad
Fca 111 Hombre y Sociedad
 
Archipresi
ArchipresiArchipresi
Archipresi
 
Mercy camps for children
Mercy camps for childrenMercy camps for children
Mercy camps for children
 
ensayo
ensayoensayo
ensayo
 
Tutorial dominguez
Tutorial dominguezTutorial dominguez
Tutorial dominguez
 
Mipc1
Mipc1Mipc1
Mipc1
 
Nada
NadaNada
Nada
 
Career 2011 (02)
Career 2011  (02)Career 2011  (02)
Career 2011 (02)
 
Library 101: Developing & Assessing a Social Media Campaign
Library 101: Developing & Assessing a Social Media CampaignLibrary 101: Developing & Assessing a Social Media Campaign
Library 101: Developing & Assessing a Social Media Campaign
 
Ensayo
EnsayoEnsayo
Ensayo
 
Zapisnik sa 60. sjednice
Zapisnik sa 60. sjedniceZapisnik sa 60. sjednice
Zapisnik sa 60. sjednice
 
Mapa conceptual obligaciones 21
Mapa conceptual obligaciones 21Mapa conceptual obligaciones 21
Mapa conceptual obligaciones 21
 
Zapisnik s 59. sjednice Školskog odbora - 2016.
Zapisnik s 59. sjednice Školskog odbora - 2016.Zapisnik s 59. sjednice Školskog odbora - 2016.
Zapisnik s 59. sjednice Školskog odbora - 2016.
 
014212 527471 hasierako eskutitza
014212 527471 hasierako eskutitza014212 527471 hasierako eskutitza
014212 527471 hasierako eskutitza
 

Similar a Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your Business Secrets and Intellectual Assets

ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationSnag
 
Internal Investigations
Internal InvestigationsInternal Investigations
Internal Investigationsalberto0
 
Cyber_Security_Issues_and_Challenges.pptx
Cyber_Security_Issues_and_Challenges.pptxCyber_Security_Issues_and_Challenges.pptx
Cyber_Security_Issues_and_Challenges.pptxGracePeter10
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
Social Engineering Presentation 2008 Linkedin[1]
Social Engineering Presentation 2008 Linkedin[1]Social Engineering Presentation 2008 Linkedin[1]
Social Engineering Presentation 2008 Linkedin[1]Tim Rhodes
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...AIIM International
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 

Similar a Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your Business Secrets and Intellectual Assets (20)

ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
 
Internal Investigations
Internal InvestigationsInternal Investigations
Internal Investigations
 
Riverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentationRiverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentation
 
Cyber_Security_Issues_and_Challenges.pptx
Cyber_Security_Issues_and_Challenges.pptxCyber_Security_Issues_and_Challenges.pptx
Cyber_Security_Issues_and_Challenges.pptx
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Social Engineering Presentation 2008 Linkedin[1]
Social Engineering Presentation 2008 Linkedin[1]Social Engineering Presentation 2008 Linkedin[1]
Social Engineering Presentation 2008 Linkedin[1]
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
Investigating tips
Investigating tipsInvestigating tips
Investigating tips
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 

Más de IntelCollab.com

How Knowledge Management and Big Data Multiply the Impact of CI
How Knowledge Management and Big Data Multiply the Impact of CIHow Knowledge Management and Big Data Multiply the Impact of CI
How Knowledge Management and Big Data Multiply the Impact of CIIntelCollab.com
 
How Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
How Intelligence Practices Reduce the Fuzziness at the Front End of InnovationHow Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
How Intelligence Practices Reduce the Fuzziness at the Front End of InnovationIntelCollab.com
 
How Not to Run a War Game – Lessons Learned from an Industry Vet
How Not to Run a War Game – Lessons Learned from an Industry VetHow Not to Run a War Game – Lessons Learned from an Industry Vet
How Not to Run a War Game – Lessons Learned from an Industry VetIntelCollab.com
 
How to Drive Maximum Value from Your Intelligence Function
How to Drive Maximum Value from Your Intelligence FunctionHow to Drive Maximum Value from Your Intelligence Function
How to Drive Maximum Value from Your Intelligence FunctionIntelCollab.com
 
How to Maximize the Role of Insights Throughout the Product Lifecycle
How to Maximize the Role of Insights Throughout the Product LifecycleHow to Maximize the Role of Insights Throughout the Product Lifecycle
How to Maximize the Role of Insights Throughout the Product LifecycleIntelCollab.com
 
How to Use Financial Early Warning Indicators to Understand Competitor KPIs
How to Use Financial Early Warning Indicators to Understand Competitor KPIsHow to Use Financial Early Warning Indicators to Understand Competitor KPIs
How to Use Financial Early Warning Indicators to Understand Competitor KPIsIntelCollab.com
 
How Intelligence Drives Public Policy Change and Creates Non-Market Advantage
How Intelligence Drives Public Policy Change and Creates Non-Market AdvantageHow Intelligence Drives Public Policy Change and Creates Non-Market Advantage
How Intelligence Drives Public Policy Change and Creates Non-Market AdvantageIntelCollab.com
 
How Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
How Wargaming Refined Go-To-Market Plans Amid European Telecom UpheavalHow Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
How Wargaming Refined Go-To-Market Plans Amid European Telecom UpheavalIntelCollab.com
 
How Leading Indicators Keep You Ahead of the Curve in Emerging Markets
How Leading Indicators Keep You Ahead of the Curve in Emerging MarketsHow Leading Indicators Keep You Ahead of the Curve in Emerging Markets
How Leading Indicators Keep You Ahead of the Curve in Emerging MarketsIntelCollab.com
 
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...IntelCollab.com
 
How Two Top Universities are Preparing the Next Generation of Intelligence An...
How Two Top Universities are Preparing the Next Generation of Intelligence An...How Two Top Universities are Preparing the Next Generation of Intelligence An...
How Two Top Universities are Preparing the Next Generation of Intelligence An...IntelCollab.com
 
How to Upgrade Competitive Intelligence Brand Value to First Class
How to Upgrade Competitive Intelligence Brand Value to First ClassHow to Upgrade Competitive Intelligence Brand Value to First Class
How to Upgrade Competitive Intelligence Brand Value to First ClassIntelCollab.com
 
How Five Financial Ratios Predict a Competitor's Business Sustainability
How Five Financial Ratios Predict a Competitor's Business SustainabilityHow Five Financial Ratios Predict a Competitor's Business Sustainability
How Five Financial Ratios Predict a Competitor's Business SustainabilityIntelCollab.com
 
How to Win Versus New Global Competitors from Emerging Economies
How to Win Versus New Global Competitors from Emerging EconomiesHow to Win Versus New Global Competitors from Emerging Economies
How to Win Versus New Global Competitors from Emerging EconomiesIntelCollab.com
 
How Recruitment and Human Resources Drive Competitive Advantage
How Recruitment and Human Resources Drive Competitive AdvantageHow Recruitment and Human Resources Drive Competitive Advantage
How Recruitment and Human Resources Drive Competitive AdvantageIntelCollab.com
 
How to Build a Social Learning Community for Analytics and Insights Professio...
How to Build a Social Learning Community for Analytics and Insights Professio...How to Build a Social Learning Community for Analytics and Insights Professio...
How to Build a Social Learning Community for Analytics and Insights Professio...IntelCollab.com
 
How to Identify User Needs with Key Intelligence Topics
How to Identify User Needs with Key Intelligence TopicsHow to Identify User Needs with Key Intelligence Topics
How to Identify User Needs with Key Intelligence TopicsIntelCollab.com
 
How to Use Strategic Mapping to Interpret and Optimize Market Intelligence
How to Use Strategic Mapping to Interpret and Optimize Market IntelligenceHow to Use Strategic Mapping to Interpret and Optimize Market Intelligence
How to Use Strategic Mapping to Interpret and Optimize Market IntelligenceIntelCollab.com
 
How to Evolve Intelligence Organizations for Maximum Success
How to Evolve Intelligence Organizations for Maximum SuccessHow to Evolve Intelligence Organizations for Maximum Success
How to Evolve Intelligence Organizations for Maximum SuccessIntelCollab.com
 
How to Prepare for 2025's Intelligence Technology
How to Prepare for 2025's Intelligence TechnologyHow to Prepare for 2025's Intelligence Technology
How to Prepare for 2025's Intelligence TechnologyIntelCollab.com
 

Más de IntelCollab.com (20)

How Knowledge Management and Big Data Multiply the Impact of CI
How Knowledge Management and Big Data Multiply the Impact of CIHow Knowledge Management and Big Data Multiply the Impact of CI
How Knowledge Management and Big Data Multiply the Impact of CI
 
How Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
How Intelligence Practices Reduce the Fuzziness at the Front End of InnovationHow Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
How Intelligence Practices Reduce the Fuzziness at the Front End of Innovation
 
How Not to Run a War Game – Lessons Learned from an Industry Vet
How Not to Run a War Game – Lessons Learned from an Industry VetHow Not to Run a War Game – Lessons Learned from an Industry Vet
How Not to Run a War Game – Lessons Learned from an Industry Vet
 
How to Drive Maximum Value from Your Intelligence Function
How to Drive Maximum Value from Your Intelligence FunctionHow to Drive Maximum Value from Your Intelligence Function
How to Drive Maximum Value from Your Intelligence Function
 
How to Maximize the Role of Insights Throughout the Product Lifecycle
How to Maximize the Role of Insights Throughout the Product LifecycleHow to Maximize the Role of Insights Throughout the Product Lifecycle
How to Maximize the Role of Insights Throughout the Product Lifecycle
 
How to Use Financial Early Warning Indicators to Understand Competitor KPIs
How to Use Financial Early Warning Indicators to Understand Competitor KPIsHow to Use Financial Early Warning Indicators to Understand Competitor KPIs
How to Use Financial Early Warning Indicators to Understand Competitor KPIs
 
How Intelligence Drives Public Policy Change and Creates Non-Market Advantage
How Intelligence Drives Public Policy Change and Creates Non-Market AdvantageHow Intelligence Drives Public Policy Change and Creates Non-Market Advantage
How Intelligence Drives Public Policy Change and Creates Non-Market Advantage
 
How Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
How Wargaming Refined Go-To-Market Plans Amid European Telecom UpheavalHow Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
How Wargaming Refined Go-To-Market Plans Amid European Telecom Upheaval
 
How Leading Indicators Keep You Ahead of the Curve in Emerging Markets
How Leading Indicators Keep You Ahead of the Curve in Emerging MarketsHow Leading Indicators Keep You Ahead of the Curve in Emerging Markets
How Leading Indicators Keep You Ahead of the Curve in Emerging Markets
 
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
How Energy & Utilities Must Adopt Intelligence Best Practices to Compete Agai...
 
How Two Top Universities are Preparing the Next Generation of Intelligence An...
How Two Top Universities are Preparing the Next Generation of Intelligence An...How Two Top Universities are Preparing the Next Generation of Intelligence An...
How Two Top Universities are Preparing the Next Generation of Intelligence An...
 
How to Upgrade Competitive Intelligence Brand Value to First Class
How to Upgrade Competitive Intelligence Brand Value to First ClassHow to Upgrade Competitive Intelligence Brand Value to First Class
How to Upgrade Competitive Intelligence Brand Value to First Class
 
How Five Financial Ratios Predict a Competitor's Business Sustainability
How Five Financial Ratios Predict a Competitor's Business SustainabilityHow Five Financial Ratios Predict a Competitor's Business Sustainability
How Five Financial Ratios Predict a Competitor's Business Sustainability
 
How to Win Versus New Global Competitors from Emerging Economies
How to Win Versus New Global Competitors from Emerging EconomiesHow to Win Versus New Global Competitors from Emerging Economies
How to Win Versus New Global Competitors from Emerging Economies
 
How Recruitment and Human Resources Drive Competitive Advantage
How Recruitment and Human Resources Drive Competitive AdvantageHow Recruitment and Human Resources Drive Competitive Advantage
How Recruitment and Human Resources Drive Competitive Advantage
 
How to Build a Social Learning Community for Analytics and Insights Professio...
How to Build a Social Learning Community for Analytics and Insights Professio...How to Build a Social Learning Community for Analytics and Insights Professio...
How to Build a Social Learning Community for Analytics and Insights Professio...
 
How to Identify User Needs with Key Intelligence Topics
How to Identify User Needs with Key Intelligence TopicsHow to Identify User Needs with Key Intelligence Topics
How to Identify User Needs with Key Intelligence Topics
 
How to Use Strategic Mapping to Interpret and Optimize Market Intelligence
How to Use Strategic Mapping to Interpret and Optimize Market IntelligenceHow to Use Strategic Mapping to Interpret and Optimize Market Intelligence
How to Use Strategic Mapping to Interpret and Optimize Market Intelligence
 
How to Evolve Intelligence Organizations for Maximum Success
How to Evolve Intelligence Organizations for Maximum SuccessHow to Evolve Intelligence Organizations for Maximum Success
How to Evolve Intelligence Organizations for Maximum Success
 
How to Prepare for 2025's Intelligence Technology
How to Prepare for 2025's Intelligence TechnologyHow to Prepare for 2025's Intelligence Technology
How to Prepare for 2025's Intelligence Technology
 

Último

Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 

Último (20)

Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 

Securing Your Perimeter: Preventing Loss, Theft and Misappropriation of Your Business Secrets and Intellectual Assets

  • 1. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 SCIP Atlanta Chapter Meeting Securing Your Perimeter: Preventing Loss, Theft, and Misappropriation of Your Business Secrets & Intellectual Assets October 1, 2013
  • 2. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Contact Information 2 Derek Johnson, CFA Chief Executive Officer +1 608-268-3470 Derek.Johnson@AuroraWDC.com John Thomson Chief Research Officer +1 770-519-2560 John.Thomson@AuroraWDC.com
  • 3. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Operations Security Process 1. Identify Critical Information 2. Analyze the Threat 3. Analyze Vulnerabilities 4. Assess Risk 5. Apply Protection & Countermeasures 3
  • 4. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 What Needs to Be Protected?  Intellectual Property/Trade Secrets  Bidding strategies  Cost & margin information  Customer lists  Formulas  Merger/acquisition plans  Negotiating strategies  International marketing/entry plans  Personnel records  Product development roadmaps  Recruiting strategy  Travel itineraries  Location of sensitive R&D facilities  Competitive intelligence reports/analysis  What else? Can vary from company to company…. 4
  • 5. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Activists Foreign Governments Competitors Customers Hackers, Criminal Elements Regulators Vendors Lobbyists, Trade, Special Interest Groups Market Research & CI Firms Trade Groups Consultants Financial Analysts Headhunters Journalists External Threats to Company Information It’s not just your competitors… 5
  • 6. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Threat Matrix Example Apple Inc. Domestic Foreign LegalIllegal  Traditional Competitors  Emerging Competitors  Suppliers/Vendors  Wireless Carriers & Customers  Technology Partners  Apps Developers  Tech Bloggers  Patent Trolls  Equity & Industry Analysts  CI & MR Firms  Journalists  Special Interest/Trade Groups  Headhunters  Regulators  Private Investigators & Attorneys  Tech Consultants & Integrators  Careless or disgruntled employees  Former employees  Labor Unions  Hackers & cyber criminals  Social Engineers  Aggressive /Unethical CI Firms  Security Researchers/Consultants  Activists  Organized Crime  NSA  Terrorists  Disgruntled employees  Malicious Apps Developers  H-1B employees from threat countries (i.e. China)  Hackers & cyber criminals  Foreign Competitors (i.e. China, S. Korea, etc.)  Foreign Governments: China, Russia, Germany, France, Israel, S. Korea, Japan, etc.  WikiLeaks  Terrorists & Activists targeting U.S. interests  Intelligence firms/corporate espionage operatives  Organized Crime  Security researchers/consultants  Malicious Apps Developers  Employees in threat countries  Traditional Competitors  Emerging Competitors  Suppliers/Vendors  Customers  Technology Partners  Apps Developers  Tech Bloggers  Analysts  CI & MR Firms  Journalists  Headhunters  Regulators  Tech Consultants & Integrators  Foreign Governments  Special interest/trade groups 6
  • 7. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Assessing Vulnerabilities  Identify, Quantify, and Prioritize your organization’s vulnerabilities  Catalog your company’s critical information elements  Assign “value” and prioritization to each element  Identify vulnerabilities or potential threats for each element  Think like the “hunter” – view your organization from the adversary’s perspective.  Assess current information handling procedures.  Test your defenses to determine vulnerabilities – i.e. “red team” operations & penetration testing 7
  • 8. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Assessing Risk Vulnerability to Threat Very High High Moderate Low Devastating Severe Noticeable Minor ImpactofLoss Risk Matrix Assigning risk levels to each identified vulnerability Source: American Society for Industrial Security (ASIS) 8
  • 9. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 HUMINT techniques used by the pros to obtain information on your company The “Human” Factor 9
  • 10. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 What Needs to be Collected? Who Might Have The Information (or know someone who has it)? Source Assessment & Selection Source Research Approach Development Source Contact  Profile the source  Determine background, interests, hobbies  Assess personality & motivators Source Identification & Targeting HUMINT Collection Planning Process  Break out KITS/KIQS into specific info requirements.  Identify information gaps  Brainstorming source types, companies, potential job titles  Research & identification of specific names  Develop initial source list  Develop the approach, determine motivators to leverage  Conversation planning  Choose elicitation techniques & placement  Plan for follow up  Telephone, e-mail, face-to-face, LinkedIn.  One or multiple conversations  Keep door open for follow up & further development  Obtain referrals 10
  • 11. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Elicitation Elicitation: Obtaining information via carefully planned conversation where the target is not aware that he/she is being exploited for intelligence purposes Exploits Several Human Tendencies  Natural tendency to correct others or prove someone wrong.  Need for recognition & desire to be viewed as an expert in their field.  Tendency to discuss things that are not their direct concern, tendency towards gossip, & general inability to keep secrets.  Occupational habits of wanting to teach, advise, correct, or challenge someone.  Tendency towards self-effacement.  Tendency towards indiscretion when not in control of emotions or when there is a sympathetic/listening ear being offered.  Tendency of some professionals to share confidence with or show off their expertise to another professional. Tendency to underestimate the value of info or your ability to understand that info. Common Approaches/Techniques  Conversational Hourglass  Direct statements vs. questions  Two way conversation (vs. “interview”)  Rapport building  Technique Examples:  Simple flattery  Naïve mentality (ego suspension)  Mutual interests  Opposing stand or partial disagreement  Quid pro quo  Exploiting the instinct to complain  Quotation of “reported facts”  Disbelief or skepticism  Criticism  Oblique references  Provocation or jocularity Sources: The Centre for Operational Business Intelligence, Phoenix Consulting, DeGenaro & Associates 11
  • 12. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Elicitation Video: Elicitation Examples 12
  • 13. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Social Engineering Social Engineering: Getting people to do things they wouldn’t ordinarily do for a stranger via misrepresentation, deception, & psychological manipulation Source: “The Art of Deception”, Kevin Mitnick Leverages Six Psychological Motivators  Authority – Tendency to comply with a request from a person in authority.  Likeability – Tendency to comply when the requestor is likeable or has similar interests/beliefs.  Reciprocation – Tendency to comply when given the promise (or assumption) of getting something in return.  Consistency – Tendency to comply after having made a public commitment, endorsement, or promise (i.e. company security policies).  Social Validation – Tendency to comply when doing so appears in line with what others are doing.  Scarcity – Tendency to comply when it is believed the object sought is in short supply and others are competing for it. Common Approaches  Posing as a fellow employee or company exec, partner, vendor, customer, law enforcement, regulator, or anyone in authority.  Using insider lingo to gain trust.  Sending a virus or Trojan as an e-mail attachment or getting the victim to visit an infected website.  Using a false pop-up password window.  Capturing victim’s keystrokes via a keylogger.  Leaving an infected flash drive or CD around the workplace or dropping it with the mail room or receptionist for intra-office delivery. Setting up e-mail, voicemail, or infected sites to appear internal. Asking for a file to be transferred to an apparent internal location.  Pretending to be from a remote office and asking for email or system access locally. 13
  • 14. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Video: Real-Life Social Engineering Attack Social Engineering 14
  • 15. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Warning Signs  Refusal to give callback number  Out-of-ordinary request  Claim of authority  Stresses urgency  Threatens negative consequences of non- compliance  Shows discomfort when questioned  Name dropping  Compliments or flattery  Flirting  Asks you to open a file or click on a hyperlink Warning Signs of a Social Engineering Attack Warning Signs of Elicitation  Attempt to establish rapport, common interests, use of flattery  Lack of direct questions & specificity  Heavy use of silence  Offer of quid pro quo  Statement of “reported” facts  Use of naiveté  Provocation, disbelief, opposing stand  Refusal to sign an NDA (only applies to ethical collectors) 15
  • 16. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Protection Plan Suggestions  AWARENESS TRAINING!!  Constant and ongoing, customized towards all disciplines within the company  Develop an OPSEC & information security culture within the company (i.e. “Scared Quiet”)  Understand your threats & vulnerabilities, & what needs to be protected  Develop and enforce information security guidelines & policies for dealing with external entities seeking information.  Work with IT regarding use of VPN’s and anonymous browsing capabilities for travelers.  Corporate Threat Assessment /Watch Team  Represented by multiple departments (CI, Security, IT, Legal, HR, Operations)  Mark & secure all confidential documents & products  Limit access to sensitive information & prototypes  Special briefings & guidelines for international travelers (or all travelers, for that matter)  Assume all overseas communications are being intercepted  Assume all overseas hotel rooms are bugged  Utilize NDAs and non-compete agreements  Information security audits & guidelines for vendors/partners  Closely investigate all potential partners  Set up a hotline (telephone, e-mail, intranet) for reporting suspicious calls & activity  Investigate (and act on) suspicious activity  Run simulated attacks against your own company to assess vulnerabilities. Never make it easy or cheap for an adversary 16
  • 17. Confidential and Proprietary – Not Intended for Distribution Beyond SCIP Chapter Attendees: Meeting Date October 1, 2013 Protection & Countermeasures  Culture of secrecy. Everything is strictly “need to know”.  Immediate termination for even minor info security violations. Spouses & family are viewed as security risks.  “Silos within Silos” - “Cell” workgroup structure - highly compartmented, each cell doesn’t know what other cells are working on. Only senior execs know the whole “puzzle”. Workers prohibited from discussing their work with other employees.  “Scared Silent” security lecture for every new hire.  Workspaces are highly monitored. Prototypes are chained to desks and laser etched, with locator chips.  Swift & aggressive investigations of information leaks.  Uses a variety of components manufacturers to better track leaks. Security assessments & audits of 3rd party vendors.  Physical access to company areas is highly restricted and compartmented based on badge. No one has access to every area.  Separate NDAs for individual projects.  Remote data erasing and geolocation for lost or stolen employee laptops/smartphones/devices.  Confidential documents have secret watermarks to better track back to the leaker.  Plainclothes security officers lurk the nearby bars watching for careless employees.  Corporate org charts do not exist  Employees hired into “dummy” positions and aren’t told what their real job will be until their first day of employment.  Security Operations Center fields reports of suspicious activities and aggressively investigates all incidents.  Corporate Threat Assessment Team, identifying and monitoring new and existing threats.  Rolling 3-year security roadmap  Aggressive internet monitoring of employee activity and potential leaks.  Close coordination with law enforcement agencies around the globe.  Ongoing penetration testing. Apple‘s InfoSec Practices (Extreme measures) >$42 million annual Information Security budget, >8,000 identified vulnerabilities 17