SlideShare a Scribd company logo
1 of 6
Discover | Deter| Deny | Deliver
One of the greatest risk for
today’s business community is
the increasing exposure to
corporate espionage.
The Cold War is over, but foreign
        intelligence services have only refocused
        their targeting.

        Countries have dedicated large portions of
        their intelligence services to collect vital
        economic data, trade secrets, intellectual
        property and proprietary designs from you.


You are not Immune to Corporate Espionage
• Economic Espionage
is (1) whoever knowingly performs targeting or
acquisition of trade secrets to (2) knowingly benefit any
foreign government, foreign instrumentality, or foreign
agent. (Title18 U.S.C., Section 1831).

• Trade Espionage
occurs when someone (1) knowingly performs targeting or
acquisition of trade secrets or intends to convert a trade secret
to (2) knowingly benefit anyone other than the owner.
Commonly referred to as Industrial Espionage. (Title 18
U.S.C., SECTION 1832).
•   Target and recruit Insiders
•   Collect intelligence through technical and
    cyber attacks
•   Dumpster diving and wiretapping
•   Establish Legitimate Business
D4 security consultants

More Related Content

Similar to D4 security consultants

Trade Secrets, Economic Espionage and Other Perils of Doing Business with China
Trade Secrets, Economic Espionage and Other Perils of Doing Business with ChinaTrade Secrets, Economic Espionage and Other Perils of Doing Business with China
Trade Secrets, Economic Espionage and Other Perils of Doing Business with ChinaCause Empowerment
 
Economic espionage
Economic espionageEconomic espionage
Economic espionagej-sanz
 
Trade Secrets, Economic Espionage and Other Perils of Doing Business with China
Trade Secrets, Economic Espionage and Other Perils of Doing Business with ChinaTrade Secrets, Economic Espionage and Other Perils of Doing Business with China
Trade Secrets, Economic Espionage and Other Perils of Doing Business with ChinaCause Empowerment
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018bhagyasri patel
 
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Scueto77
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageVi Tính Hoàng Nam
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).pptSYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).pptNickellReddy
 
Voice of the Customer: Piecing together AWS services to deliver monitoring an...
Voice of the Customer: Piecing together AWS services to deliver monitoring an...Voice of the Customer: Piecing together AWS services to deliver monitoring an...
Voice of the Customer: Piecing together AWS services to deliver monitoring an...Amazon Web Services
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
 
seminarCyberTerrorism.pptx.pdf
seminarCyberTerrorism.pptx.pdfseminarCyberTerrorism.pptx.pdf
seminarCyberTerrorism.pptx.pdfKaivanParikh
 
The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDResilient Systems
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageIRJET Journal
 
Ce hv8 module 19 cryptography
Ce hv8 module 19 cryptographyCe hv8 module 19 cryptography
Ce hv8 module 19 cryptographyMehrdad Jingoism
 

Similar to D4 security consultants (20)

Trade Secrets, Economic Espionage and Other Perils of Doing Business with China
Trade Secrets, Economic Espionage and Other Perils of Doing Business with ChinaTrade Secrets, Economic Espionage and Other Perils of Doing Business with China
Trade Secrets, Economic Espionage and Other Perils of Doing Business with China
 
Economic espionage
Economic espionageEconomic espionage
Economic espionage
 
Trade Secrets, Economic Espionage and Other Perils of Doing Business with China
Trade Secrets, Economic Espionage and Other Perils of Doing Business with ChinaTrade Secrets, Economic Espionage and Other Perils of Doing Business with China
Trade Secrets, Economic Espionage and Other Perils of Doing Business with China
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018
 
Hack
HackHack
Hack
 
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill ...
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionage
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).pptSYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
 
Voice of the Customer: Piecing together AWS services to deliver monitoring an...
Voice of the Customer: Piecing together AWS services to deliver monitoring an...Voice of the Customer: Piecing together AWS services to deliver monitoring an...
Voice of the Customer: Piecing together AWS services to deliver monitoring an...
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
seminarCyberTerrorism.pptx.pdf
seminarCyberTerrorism.pptx.pdfseminarCyberTerrorism.pptx.pdf
seminarCyberTerrorism.pptx.pdf
 
The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUD
 
Economic fraud
Economic fraudEconomic fraud
Economic fraud
 
Chapter14
Chapter14Chapter14
Chapter14
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate Espionage
 
Ce hv8 module 19 cryptography
Ce hv8 module 19 cryptographyCe hv8 module 19 cryptography
Ce hv8 module 19 cryptography
 

D4 security consultants

  • 1. Discover | Deter| Deny | Deliver
  • 2. One of the greatest risk for today’s business community is the increasing exposure to corporate espionage.
  • 3. The Cold War is over, but foreign intelligence services have only refocused their targeting. Countries have dedicated large portions of their intelligence services to collect vital economic data, trade secrets, intellectual property and proprietary designs from you. You are not Immune to Corporate Espionage
  • 4. • Economic Espionage is (1) whoever knowingly performs targeting or acquisition of trade secrets to (2) knowingly benefit any foreign government, foreign instrumentality, or foreign agent. (Title18 U.S.C., Section 1831). • Trade Espionage occurs when someone (1) knowingly performs targeting or acquisition of trade secrets or intends to convert a trade secret to (2) knowingly benefit anyone other than the owner. Commonly referred to as Industrial Espionage. (Title 18 U.S.C., SECTION 1832).
  • 5. Target and recruit Insiders • Collect intelligence through technical and cyber attacks • Dumpster diving and wiretapping • Establish Legitimate Business