SlideShare a Scribd company logo
1 of 17
How Really Safe Are Your Secrets?




                        Presented by

      ARGUS INTERNATIONAL RISK SERVICES
     Global Security | Intelligence | Risk Management
What is Corporate Espionage?

Argus Definition; The
deliberate targeting and theft
of commercially and
proprietarily driven
technologies, ideas, and
services which if known or
transferred to any other
agent, would severely
damage, inhibit, or destroy
the original commercial
enterprise.
Is this a US only problem?
Japan’s Ministry of Economy, Trade, and
Industry conducted a survey of 625
manufacturing firms in late 2007 and found that
more than 35 percent of those responding
reported some form of technology loss. More
than 60 percent of those leaks involved China.    The British Security Service’s
                                                  Center for the Protection of
South Korea says that the costs from foreign      National Infrastructure warned
economic espionage in 2008 were $82               hundreds of UK business leaders
billion, up from $26 billion in 2004. The         in 2010 of Chinese economic
South Koreans report that 60 percent of           espionage practices, including
victims are small- and medium-sized               giving gifts of cameras and
businesses and that half of all economic          memory sticks equipped with
espionage comes from China.                       cyber implants at trade fairs and
Germany’s Federal Office for the Protection of    exhibitions. This followed similar
the Constitution (BfV) estimates that German      notification sent to 300 UK
companies lose $28 billion-$71 billion and        business leaders in 2007 warning
30,000-70,000 jobs per year from foreign          them of a coordinated cyber
economic espionage. Approximately 70 percent      espionage campaign against the
of all cases involve insiders.                    British economy.
Question: Am I a Target?

 Answer: Yes, you are!
Espionage in                     America
In 2001, Procter & Gamble admitted to a spying operation,
alleged to have been carried out over 6 months, on its hair-
care competitor Unilever. Their cunning plan, which P&G
referred to as an “unfortunate incident,” included going
through Unilever’s trash in search of documents, although if
Unilever habitually threw away full documents entitled
“Super Secret Product Information That Will Crush P&G”
their days as an industry leader are numbered.
Espionage in                     America
Michael Mitchell worked on the marketing and
sales of Kevlar for DuPont until he was fired in
2006. Unwilling to sign on to unemployment with
his tail between his legs, instead he offered to
provide his services to Kolon Industries Inc, a
Korean form which just happens to be one of two
companies that manufactures fibers that can
tough it out with Kevlar in the toughness stakes.

After emailing his new bosses confidential
information on Kevlar, he went back to old
colleagues at DuPont to find out more.
Unsurprisingly, DuPont executives found out
about this less than cunning scheme and notified
the FBI. Mitchell was sentenced to 18 months in
prison and ordered to pay DuPont over $180,000.
Espionage in                       America
In 2009 Starwood rocked the hospitality
world when they accused household
name Hilton of industrial espionage based
on Hilton’s employment of 10 executives
and managers from Starwood. Starwood’s
accusations were centered around luxury
brand ideas, with the former head of
Starwood’s luxury brands group alleged to
have downloaded “truckloads” of
documents before leaving for the bigger
firm.

In 2010, the two groups reached a
settlement that required the Hilton group
to make payments to Starwood, as well as
refrain from developing a competing
luxury hotel brand until 2013. The call for
federal monitors to supervise Hilton’s
conduct shows that it isn’t just Paris who’s
on the wrong side of the law occasionally.
Who are the Main Culprits of
           Espionage?




Russia and China view themselves as strategic competitors of the United States
and are the most aggressive collectors of US economic information and
technology.

Other countries with closer ties to the United States, including Israel, have
conducted CNE and other forms of intelligence collection to obtain US economic
and technology data, often taking advantage of the access they enjoy as allies or
partners to collect sensitive military data and information on other programs.
What is the Annual $$$ Cost of Espionage?
The methods and data available to accurately
depict the annual losses are minimalist at best.
As of 2008, combined losses between
Academic, Government, Military and
Commercial Enterprises are estimated to be
anywhere from $2 billion to $400 billion per
year. The tremendous range shows that our
system has not yet evolved to be quantify the
amount of losses.

The true cost could be way over the $400
BILLION estimate and surely no where near the
$2 Billion range.
                                                   Fact: 65% of all USA IT Managers
Common-sense prevailing, the reality is we have    admit they do not know what
no idea of how much information has been
stolen, manipulated, reproduced, and/or the        information leaves their company,
impact of its dissemination.
                                                   or who would have accessed it from
                                                   outside the company.
Where does the Greatest Threat Come From?

 As we have seen from the previous slides,
 the greatest threat comes from INSIDER
 THREATS – basically “People”
What are the Motivators for Espionage?
Why do “They” do it?
  •   Financial Gain
  •   Revenge Against Colleagues or Management
  •   Lack of Promotion or Company Recognition
  •   Career/Employer Change
  •   Personal Satisfaction (Ego) or Personal Problems (Family)
  •   Sabotage (Destructive Behavior)
  •   Thrill Seeking (I am smarter and can get away with it…)
  •   Sometimes – Just to do it!
How Do You Assess the Risk Your Organization Faces?
The Cycle of Threat Mitigation?
What Can I Do to Minimize The Threat?
Information Strategy
• Develop a “transparency strategy” that determines how closed or open the company
 needs to be based on the services provided.

Insider Threat Programs and Awareness

• Institute security training and awareness campaigns; convey threats to company
  information accessed through portable devices and when traveling abroad.

• Establish an insider threat program that consists of information technology-enabled threat
  detection, foreign travel and contact notifications, personnel security and evaluation,
  insider threat awareness and training, and reporting and analysis.

• Conduct background checks that vet users before providing them company information.

• Implement non-disclosure agreements with employees and business partners.

• Establish employee exit procedures; most employees who steal intellectual property
  commit the theft within one month of resignation.
Cont: Slide 2 of 3

Effective Data Management
• Get a handle on company data—not just in databases but also in e-mail messages, on
  individual computers, and as data objects in web portals; categorize and classify the data,
  and choose the most appropriate set of controls and markings for each class of data;
  identify which data should be kept and for how long. Understand that it is impossible to
  protect everything.

• Establish compartmentalized access programs to protect unique trade secrets and
  proprietary information; centralize intellectual property data—which will make for better
  security and facilitate information sharing.

• Restrict distribution of sensitive data; establish a shared data infrastructure to reduce the
  quantity of data held by the organization and discourage unnecessary printing and
  reproduction. Network Security, Auditing, and Monitoring

• Conduct real-time monitoring/auditing of the networks; maintain thorough records of
  who is accessing servers, and modifying, copying, deleting, or downloading files.

• Install software tools—content management, data loss prevention, network forensics—on
  individual computer workstations to protect files.
Cont: Slide 3 of 3
• Encrypt data on servers and password-protect company information.

• Incorporate multi-factor authentication measures—biometrics, PINs, and
  passwords combined with knowledge-based questions—to help verify users of
  information and computer systems.

• Create a formal corporate policy for mobility—develop measures for centrally
  controlling and monitoring which devices can be attached to corporate
  networks and systems and what data can be downloaded, uploaded, and
  stored on them.

• Formalize a social media policy for the company and implement strategies for
  minimizing data loss from on-line social networking.

Contingency Planning
• Establish a continuity of operations plan—back up data and systems; create
  disaster recovery plans; and plan for data breach contingencies.

• Conduct regular penetration testing of company infrastructure as well as of
  third-party shared service provider systems.

• Establish document creation, retention, and destruction policies.
.
Threats are Everywhere
Don’t let your company become a Victim




                      Authored By:
             Jonathan Snyder, CHS, SME, ATO
            COUNTERINTELLIGENCE SERVICES

More Related Content

What's hot

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessJohann Lo
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
How secure are you?
How secure are you?How secure are you?
How secure are you?Joe Morris
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.pptshaks9151
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Sooraj Maurya
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 

What's hot (20)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 

Viewers also liked

Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 

Viewers also liked (6)

Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Malicious software
Malicious softwareMalicious software
Malicious software
 

Similar to CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus International Risk Services

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Grant Barker
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Proofpoint
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 

Similar to CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus International Risk Services (20)

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 

Recently uploaded

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 

Recently uploaded (20)

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus International Risk Services

  • 1. How Really Safe Are Your Secrets? Presented by ARGUS INTERNATIONAL RISK SERVICES Global Security | Intelligence | Risk Management
  • 2. What is Corporate Espionage? Argus Definition; The deliberate targeting and theft of commercially and proprietarily driven technologies, ideas, and services which if known or transferred to any other agent, would severely damage, inhibit, or destroy the original commercial enterprise.
  • 3. Is this a US only problem? Japan’s Ministry of Economy, Trade, and Industry conducted a survey of 625 manufacturing firms in late 2007 and found that more than 35 percent of those responding reported some form of technology loss. More than 60 percent of those leaks involved China. The British Security Service’s Center for the Protection of South Korea says that the costs from foreign National Infrastructure warned economic espionage in 2008 were $82 hundreds of UK business leaders billion, up from $26 billion in 2004. The in 2010 of Chinese economic South Koreans report that 60 percent of espionage practices, including victims are small- and medium-sized giving gifts of cameras and businesses and that half of all economic memory sticks equipped with espionage comes from China. cyber implants at trade fairs and Germany’s Federal Office for the Protection of exhibitions. This followed similar the Constitution (BfV) estimates that German notification sent to 300 UK companies lose $28 billion-$71 billion and business leaders in 2007 warning 30,000-70,000 jobs per year from foreign them of a coordinated cyber economic espionage. Approximately 70 percent espionage campaign against the of all cases involve insiders. British economy.
  • 4. Question: Am I a Target? Answer: Yes, you are!
  • 5. Espionage in America In 2001, Procter & Gamble admitted to a spying operation, alleged to have been carried out over 6 months, on its hair- care competitor Unilever. Their cunning plan, which P&G referred to as an “unfortunate incident,” included going through Unilever’s trash in search of documents, although if Unilever habitually threw away full documents entitled “Super Secret Product Information That Will Crush P&G” their days as an industry leader are numbered.
  • 6. Espionage in America Michael Mitchell worked on the marketing and sales of Kevlar for DuPont until he was fired in 2006. Unwilling to sign on to unemployment with his tail between his legs, instead he offered to provide his services to Kolon Industries Inc, a Korean form which just happens to be one of two companies that manufactures fibers that can tough it out with Kevlar in the toughness stakes. After emailing his new bosses confidential information on Kevlar, he went back to old colleagues at DuPont to find out more. Unsurprisingly, DuPont executives found out about this less than cunning scheme and notified the FBI. Mitchell was sentenced to 18 months in prison and ordered to pay DuPont over $180,000.
  • 7. Espionage in America In 2009 Starwood rocked the hospitality world when they accused household name Hilton of industrial espionage based on Hilton’s employment of 10 executives and managers from Starwood. Starwood’s accusations were centered around luxury brand ideas, with the former head of Starwood’s luxury brands group alleged to have downloaded “truckloads” of documents before leaving for the bigger firm. In 2010, the two groups reached a settlement that required the Hilton group to make payments to Starwood, as well as refrain from developing a competing luxury hotel brand until 2013. The call for federal monitors to supervise Hilton’s conduct shows that it isn’t just Paris who’s on the wrong side of the law occasionally.
  • 8. Who are the Main Culprits of Espionage? Russia and China view themselves as strategic competitors of the United States and are the most aggressive collectors of US economic information and technology. Other countries with closer ties to the United States, including Israel, have conducted CNE and other forms of intelligence collection to obtain US economic and technology data, often taking advantage of the access they enjoy as allies or partners to collect sensitive military data and information on other programs.
  • 9. What is the Annual $$$ Cost of Espionage? The methods and data available to accurately depict the annual losses are minimalist at best. As of 2008, combined losses between Academic, Government, Military and Commercial Enterprises are estimated to be anywhere from $2 billion to $400 billion per year. The tremendous range shows that our system has not yet evolved to be quantify the amount of losses. The true cost could be way over the $400 BILLION estimate and surely no where near the $2 Billion range. Fact: 65% of all USA IT Managers Common-sense prevailing, the reality is we have admit they do not know what no idea of how much information has been stolen, manipulated, reproduced, and/or the information leaves their company, impact of its dissemination. or who would have accessed it from outside the company.
  • 10. Where does the Greatest Threat Come From? As we have seen from the previous slides, the greatest threat comes from INSIDER THREATS – basically “People”
  • 11. What are the Motivators for Espionage? Why do “They” do it? • Financial Gain • Revenge Against Colleagues or Management • Lack of Promotion or Company Recognition • Career/Employer Change • Personal Satisfaction (Ego) or Personal Problems (Family) • Sabotage (Destructive Behavior) • Thrill Seeking (I am smarter and can get away with it…) • Sometimes – Just to do it!
  • 12. How Do You Assess the Risk Your Organization Faces?
  • 13. The Cycle of Threat Mitigation?
  • 14. What Can I Do to Minimize The Threat? Information Strategy • Develop a “transparency strategy” that determines how closed or open the company needs to be based on the services provided. Insider Threat Programs and Awareness • Institute security training and awareness campaigns; convey threats to company information accessed through portable devices and when traveling abroad. • Establish an insider threat program that consists of information technology-enabled threat detection, foreign travel and contact notifications, personnel security and evaluation, insider threat awareness and training, and reporting and analysis. • Conduct background checks that vet users before providing them company information. • Implement non-disclosure agreements with employees and business partners. • Establish employee exit procedures; most employees who steal intellectual property commit the theft within one month of resignation.
  • 15. Cont: Slide 2 of 3 Effective Data Management • Get a handle on company data—not just in databases but also in e-mail messages, on individual computers, and as data objects in web portals; categorize and classify the data, and choose the most appropriate set of controls and markings for each class of data; identify which data should be kept and for how long. Understand that it is impossible to protect everything. • Establish compartmentalized access programs to protect unique trade secrets and proprietary information; centralize intellectual property data—which will make for better security and facilitate information sharing. • Restrict distribution of sensitive data; establish a shared data infrastructure to reduce the quantity of data held by the organization and discourage unnecessary printing and reproduction. Network Security, Auditing, and Monitoring • Conduct real-time monitoring/auditing of the networks; maintain thorough records of who is accessing servers, and modifying, copying, deleting, or downloading files. • Install software tools—content management, data loss prevention, network forensics—on individual computer workstations to protect files.
  • 16. Cont: Slide 3 of 3 • Encrypt data on servers and password-protect company information. • Incorporate multi-factor authentication measures—biometrics, PINs, and passwords combined with knowledge-based questions—to help verify users of information and computer systems. • Create a formal corporate policy for mobility—develop measures for centrally controlling and monitoring which devices can be attached to corporate networks and systems and what data can be downloaded, uploaded, and stored on them. • Formalize a social media policy for the company and implement strategies for minimizing data loss from on-line social networking. Contingency Planning • Establish a continuity of operations plan—back up data and systems; create disaster recovery plans; and plan for data breach contingencies. • Conduct regular penetration testing of company infrastructure as well as of third-party shared service provider systems. • Establish document creation, retention, and destruction policies. .
  • 17. Threats are Everywhere Don’t let your company become a Victim Authored By: Jonathan Snyder, CHS, SME, ATO COUNTERINTELLIGENCE SERVICES