SlideShare a Scribd company logo
1 of 32
The Loss of Intellectual Property in
the Digital Age:
What Companies can do to Protect
Themselves
Christopher Kranich
The Digital Revolution
• People are now more connected
– More information in less time
– More often
– Greater distances
– Many security challenges for business
Cyber-based Threats to IP
• Sources evolving and growing rapidly
– Competitors
– Malicious employees
– Well intentioned employees
– Criminal groups
– Hacktivists
– Foreign governments
IP is Valuable
• Cost to design new projects or services
– Engineers
– Designers
• Cost to manufacture
– Proprietary processes
– Material sourcing
– Pricing information
• Marketing costs
New Work Locations
• From home
• On The road
• Businesses/public places
• Security
– More chances for deletion, theft of compromise
• WiFi networks
• Device theft of damage
• Over the Shoulder
• Co-mingling of the personal and the private
Types of Devices
• Laptops
• Theft, Over-the-shoulder, WiFi
• Smart Phones
• Theft, WiFi, unpatched
• Tablets
• Theft, WiFi, unpatched
• Desktops
• Not updated, no virus protections
More Data
• Large capacity
• Smaller storage medium
• Cheap
• More cloud-based storage
• User can download a large amount of IP
quickly
• Malicious or innocent intentions
Reasons IP is Compromised
• Innocent Reasons
– Work outside of office
– Curiosity
– Recovered IP
• Malicious Reasons
– Do not like job
– Sell IP for profit
– Hacktivism
– For fun
Employee Views of IP
• Attribute ownership to the person who
created it
• Cheap, easily moved, copied, and manipulated
• Okay to take with them to their next job
Symantec Report
VW vs. GM
• Executives took 1000’s of pages
• Photocopied in physical from
– Secretary
– Other Witnesses
• Carried out in boxes of briefcases
• Lots of witnesses to IP removal
• 100 million Dollar settlement
Starwood vs. Hilton
• Over 100,000 files stolen
– Starwood luxury concept
• Hilton came up with their own version
– Board presentations
– Market research studies
– Valued at 1 million Dollars
• Downloaded to laptop
– Easy to steal data
– Quick, behind closed doors, portable
What Companies Can Do To Protect Themselves
Encrypt Data
• VPN
• Full-disk encryption
• USB sticks
• Emails and attachments
Mobile Device Management
• Common for employees to bring their own
device (BYOD)
• Poses many security challenges
– Corporate data vulnerable to theft, damage, or
deletion
– Hard to keep track of
– Corporate data and personal data on same device
Software Solutions
• MobileNow
• MobileIron
• Zenprise
• IBM
• Symantec
• Airwatch
Customizable Device Policies
• Control which device features and built-in
apps can be used
• Specify what the authentication requirements
are
• Apply specific policy sets to specific groups of
users
– Time, roles, types of data, location
Jailbroken or Rooted Devices
• Pose a big security risk
– Unstable or not updated
• Detect these devices
• Enforce greater controls for them
– Lock or wipe
– Ban from network
– Approved apps
– Vpn
– Device kept up-to-date
Centralized Updating
• Update OS and apps remotely
– Convenient and easy
• All devices patched at the same time
– All devices on same footing
– Eliminates specific vulnerabilities
Applications
• App blacklisting
• Block and revoke any apps from any user
• Track usage
• App-to-app encryption
Email Features
• Ability to encrypt attachments
• Prevent unauthorized copying and forwarding
• Restrict sharing of attachments to certain apps
• Specify attachment file types to encrypt
Data Storage
• Storage all data in a home directory
– Persisitent and centralized location
– Easy to set up automatic backups
– Easy to selectively distribute data
– Easy to track data and wipe if neccesary
– Can have multiple clients
• Different platforms accessing the same directory
Data Access Restrictions
• Geofencing
– Data only accessible in certain locations
– Prevents data from being accessed off site or an
area of the office
• Time-Based
– Data only accessible at certain times
• When employees are working
• When a project is active
Remote Lock, Locate, and Wipe
• Lost or stolen
• Infected with malware
• User leaves company
Data Leakage Prevention
• Deep content inspection
• Reads data to find high value IP
• Does not prevent attacks
• Limits accidental deletion or moving
Data Leakage Prevention
• System figures out sensitive data on it’s own
• Logs moving, copying, and deleting
• Prevents user from emailing data out by
making it read only
• Requires fine tuning
Attribute-Based Access Control
• Grants access based on attributes
– Location
– Authentication method
– Deviation from the norm
– Type of data
– Time of access
Cloud Storage Solutions
• Data integrity
• Access is controlled
• Data must be available when needed
Cloud Storage Solutions
• Policy for backing up data
• Data is encrypted in storage
• Data is sent to facility securely
• Data is backed up regularly
• Data is kept in multiple locations
Employee Training
• Protect credentials
• Good passwords or passphrases
• Social engineering
• Alerting IT
Basic Security Principles
• Log activities
• Set up alerts
• Use IDS system
• Set up firewalls on internet connections
• Control physical access
Basic Security Principles
• Set up user accounts
• Give users their own account
• Provide the minimum amount of access
needed
Questions and Comments

More Related Content

What's hot

Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT OutsourcingMultiTech IT
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Sreejesh Madonandy
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
Proprietary Information
Proprietary InformationProprietary Information
Proprietary Informationhypknight
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)Sam Bowne
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosAmazon Web Services
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document SecurityZia Consulting
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013John Secondari
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in networkTanveer Malik
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security Leo Welder
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityPrecisely
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingSam Bowne
 
Andy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy (Avraham) Blumenthal
 

What's hot (19)

Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Proprietary Information
Proprietary InformationProprietary Information
Proprietary Information
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document Security
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in network
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
Andy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility Solutions
 

Viewers also liked

Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 
Veranderdiagnose (een samenvatting)
Veranderdiagnose (een samenvatting)Veranderdiagnose (een samenvatting)
Veranderdiagnose (een samenvatting)Jan Wietsma
 
Identifing And Controlling Intellectual Property Loss Exposures
Identifing And Controlling Intellectual Property Loss ExposuresIdentifing And Controlling Intellectual Property Loss Exposures
Identifing And Controlling Intellectual Property Loss ExposuresMVeterano
 
Type of data @ Web Mining Discussion
Type of data @ Web Mining DiscussionType of data @ Web Mining Discussion
Type of data @ Web Mining DiscussionCherryBerry2
 
Purpose-Driven Organizations: a Conceptual Model
Purpose-Driven Organizations: a Conceptual ModelPurpose-Driven Organizations: a Conceptual Model
Purpose-Driven Organizations: a Conceptual ModelSteven Beauchem
 
Trends that will influence the future of knowledge work
Trends that will influence the future of knowledge workTrends that will influence the future of knowledge work
Trends that will influence the future of knowledge workSteven Beauchem
 
Impact of digital technology on intellectual property
Impact of digital technology on intellectual propertyImpact of digital technology on intellectual property
Impact of digital technology on intellectual propertyKonok Mondal
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slidesmahavir_a
 
Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights JRA & Associates
 
Intellectual Property 101
Intellectual Property 101Intellectual Property 101
Intellectual Property 101gregmstark
 
Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 
Knowledge management
Knowledge managementKnowledge management
Knowledge managementSehar Abbas
 

Viewers also liked (17)

Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
badgediva.com
badgediva.combadgediva.com
badgediva.com
 
Sorting searching
Sorting searchingSorting searching
Sorting searching
 
Veranderdiagnose (een samenvatting)
Veranderdiagnose (een samenvatting)Veranderdiagnose (een samenvatting)
Veranderdiagnose (een samenvatting)
 
Identifing And Controlling Intellectual Property Loss Exposures
Identifing And Controlling Intellectual Property Loss ExposuresIdentifing And Controlling Intellectual Property Loss Exposures
Identifing And Controlling Intellectual Property Loss Exposures
 
Type of data @ Web Mining Discussion
Type of data @ Web Mining DiscussionType of data @ Web Mining Discussion
Type of data @ Web Mining Discussion
 
Factors Influencing Knowledge Management
Factors Influencing Knowledge ManagementFactors Influencing Knowledge Management
Factors Influencing Knowledge Management
 
Purpose-Driven Organizations: a Conceptual Model
Purpose-Driven Organizations: a Conceptual ModelPurpose-Driven Organizations: a Conceptual Model
Purpose-Driven Organizations: a Conceptual Model
 
Trends that will influence the future of knowledge work
Trends that will influence the future of knowledge workTrends that will influence the future of knowledge work
Trends that will influence the future of knowledge work
 
Impact of digital technology on intellectual property
Impact of digital technology on intellectual propertyImpact of digital technology on intellectual property
Impact of digital technology on intellectual property
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slides
 
Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights In India: Patents Trademarks And Copyrights
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
Web Mining
Web Mining Web Mining
Web Mining
 
Intellectual Property 101
Intellectual Property 101Intellectual Property 101
Intellectual Property 101
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 

Similar to The Loss of Intellectual Property in the Digital Age: What Companies can d…

Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Aptera Inc
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseMobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseBlueinfy Solutions
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,Olajide Kuku
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
Information Security
Information SecurityInformation Security
Information Securitysonykhan3
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali LinuxJason Murray
 
Cloud Computing Basics for Small Business
Cloud Computing Basics for Small BusinessCloud Computing Basics for Small Business
Cloud Computing Basics for Small BusinessGWI
 

Similar to The Loss of Intellectual Property in the Digital Age: What Companies can d… (20)

Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseMobile security chess board - attacks & defense
Mobile security chess board - attacks & defense
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
 
Threats
ThreatsThreats
Threats
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
 
Cloud Computing Basics for Small Business
Cloud Computing Basics for Small BusinessCloud Computing Basics for Small Business
Cloud Computing Basics for Small Business
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

The Loss of Intellectual Property in the Digital Age: What Companies can d…

  • 1. The Loss of Intellectual Property in the Digital Age: What Companies can do to Protect Themselves Christopher Kranich
  • 2. The Digital Revolution • People are now more connected – More information in less time – More often – Greater distances – Many security challenges for business
  • 3. Cyber-based Threats to IP • Sources evolving and growing rapidly – Competitors – Malicious employees – Well intentioned employees – Criminal groups – Hacktivists – Foreign governments
  • 4. IP is Valuable • Cost to design new projects or services – Engineers – Designers • Cost to manufacture – Proprietary processes – Material sourcing – Pricing information • Marketing costs
  • 5. New Work Locations • From home • On The road • Businesses/public places • Security – More chances for deletion, theft of compromise • WiFi networks • Device theft of damage • Over the Shoulder • Co-mingling of the personal and the private
  • 6. Types of Devices • Laptops • Theft, Over-the-shoulder, WiFi • Smart Phones • Theft, WiFi, unpatched • Tablets • Theft, WiFi, unpatched • Desktops • Not updated, no virus protections
  • 7. More Data • Large capacity • Smaller storage medium • Cheap • More cloud-based storage • User can download a large amount of IP quickly • Malicious or innocent intentions
  • 8. Reasons IP is Compromised • Innocent Reasons – Work outside of office – Curiosity – Recovered IP • Malicious Reasons – Do not like job – Sell IP for profit – Hacktivism – For fun
  • 9. Employee Views of IP • Attribute ownership to the person who created it • Cheap, easily moved, copied, and manipulated • Okay to take with them to their next job Symantec Report
  • 10. VW vs. GM • Executives took 1000’s of pages • Photocopied in physical from – Secretary – Other Witnesses • Carried out in boxes of briefcases • Lots of witnesses to IP removal • 100 million Dollar settlement
  • 11. Starwood vs. Hilton • Over 100,000 files stolen – Starwood luxury concept • Hilton came up with their own version – Board presentations – Market research studies – Valued at 1 million Dollars • Downloaded to laptop – Easy to steal data – Quick, behind closed doors, portable
  • 12. What Companies Can Do To Protect Themselves
  • 13. Encrypt Data • VPN • Full-disk encryption • USB sticks • Emails and attachments
  • 14. Mobile Device Management • Common for employees to bring their own device (BYOD) • Poses many security challenges – Corporate data vulnerable to theft, damage, or deletion – Hard to keep track of – Corporate data and personal data on same device
  • 15. Software Solutions • MobileNow • MobileIron • Zenprise • IBM • Symantec • Airwatch
  • 16. Customizable Device Policies • Control which device features and built-in apps can be used • Specify what the authentication requirements are • Apply specific policy sets to specific groups of users – Time, roles, types of data, location
  • 17. Jailbroken or Rooted Devices • Pose a big security risk – Unstable or not updated • Detect these devices • Enforce greater controls for them – Lock or wipe – Ban from network – Approved apps – Vpn – Device kept up-to-date
  • 18. Centralized Updating • Update OS and apps remotely – Convenient and easy • All devices patched at the same time – All devices on same footing – Eliminates specific vulnerabilities
  • 19. Applications • App blacklisting • Block and revoke any apps from any user • Track usage • App-to-app encryption
  • 20. Email Features • Ability to encrypt attachments • Prevent unauthorized copying and forwarding • Restrict sharing of attachments to certain apps • Specify attachment file types to encrypt
  • 21. Data Storage • Storage all data in a home directory – Persisitent and centralized location – Easy to set up automatic backups – Easy to selectively distribute data – Easy to track data and wipe if neccesary – Can have multiple clients • Different platforms accessing the same directory
  • 22. Data Access Restrictions • Geofencing – Data only accessible in certain locations – Prevents data from being accessed off site or an area of the office • Time-Based – Data only accessible at certain times • When employees are working • When a project is active
  • 23. Remote Lock, Locate, and Wipe • Lost or stolen • Infected with malware • User leaves company
  • 24. Data Leakage Prevention • Deep content inspection • Reads data to find high value IP • Does not prevent attacks • Limits accidental deletion or moving
  • 25. Data Leakage Prevention • System figures out sensitive data on it’s own • Logs moving, copying, and deleting • Prevents user from emailing data out by making it read only • Requires fine tuning
  • 26. Attribute-Based Access Control • Grants access based on attributes – Location – Authentication method – Deviation from the norm – Type of data – Time of access
  • 27. Cloud Storage Solutions • Data integrity • Access is controlled • Data must be available when needed
  • 28. Cloud Storage Solutions • Policy for backing up data • Data is encrypted in storage • Data is sent to facility securely • Data is backed up regularly • Data is kept in multiple locations
  • 29. Employee Training • Protect credentials • Good passwords or passphrases • Social engineering • Alerting IT
  • 30. Basic Security Principles • Log activities • Set up alerts • Use IDS system • Set up firewalls on internet connections • Control physical access
  • 31. Basic Security Principles • Set up user accounts • Give users their own account • Provide the minimum amount of access needed