TRUSTED PERSPECTIVEProtectingCritical InformationIn the Age of Economic Espionageand Identity TheftThe Value Proposition of Our Firm Managing Riskin a Hostile WorldTRUSTED RESULTS© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights. 1
Global Threat, Domestic Risk© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights. 2
Targeting U.S. Corporate AssetsMore than 100 nations targeting U.S. technology secrets.People’s Republic of China is the number one offender.Russia is second.China and Russia have aggressive cyber acquisition and attack systems.China is rapidly becoming manufacturer to the world and intellectual property rights enforcement is not anticipated until at least 2020, despite World Trade Organization agreements.U.S. commands 40 percent of the global research & development spend, making the U.S. a target-rich environment.Many companies have inadequate protections against economic espionage.3© Copyright 2009. ZeroPoint Risk Research LLC. All rights.
Two At-Risk InformationBoth are corporate assets, both are targeted.PersonallyIdentifiableInformationIntellectualProperty&Trade SecretsInformation is stolen by governments, employees, and even byorganized crime, which sells stolen information as part of a $2 trillionglobal money laundering.© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights. 4
High-Risk Information TargetsPersonal DataEnergy TechnologyAdvanced MaterialsInformation TechnologyResource & Environment TechnologyBiotechnology & Advanced Agricultural TechnologyAdvanced Manufacturing and Automation Technology© Copyright 2009. ZeroPoint Risk Research LLC. All rights.   5
Privacy: Personally Identifiable InformationAs defined by state and federal statutes:Personal identifiersFirst nameMiddle initialLast nameAddressName of childrenSocial Security NumberNational identification numberTelephone & fax numbersStreet addressDriver’s license numberVehicle registration plateCredit card numbersFace, fingerprint, handwritingDigital attributes, such as passwordsEmailCertain URLsCertificate & license numbersHealth plan beneficiary numbersFull-face photographic imagesEmployer informationHousehold member informationBiometric identifiers, including fingerprints and voiceprintsDNA© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights. 6
About the Firm© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights. 7
Professional Services RenderedConsultingAdvice & CounselSyndicated ResearchSpecial Research Projects© Copyright 2009. ZeroPoint Risk Research LLC. All rights.   8
Disciplines in Asset ProtectionAdministrative SecurityTechnical SecurityPhysical SecurityPrivacy ComplianceRisk-Based Privacy© Copyright 2009. ZeroPoint Risk Research LLC. All rights.   9TESTING &ANALYSISREMEDIATIONSTRATEGYPOLICY
10Focus on Variable and Cascading RiskLegal RiskFinancial &Investment RiskRegulatoryRiskReputationRiskINTELLECTUAL PROPERTYTRADE SECRETSPERSONALLY IDENTIFIABLE  INFORMATION© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
© Copyright 2009. ZeroPoint Risk Research LLC. All rights.   11The following slide reflects research conductedby ZeroPoint Risk Research on the role offoreign country hosts in protecting third-party intellectual property and trade secrets.
12TradeSecretsEconomicEspionageGlobalInformation Theft DeniedLegislation  CompanyInformation Assets atRisk Must Be Protected Off-ShorePolicyIntellectualPropertyGovernment &IndustrySafe Harbor  for Critical Information ProtectionDefensive Information BarrierOperationsPersonalInformationStandardsForeign Country Role in Counter-Economic Espionage© Copyright 2009. ZeroPoint Risk Research LLC. All rights.
Proprietary Research Tools13© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
Every Enterprise Has a Strategic Risk Inflection Point™© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights. 14
13 Survey Question RangeUS Scenario:PrivacyComplianceUS Scenario:Risk-BasedPrivacyUS Scenario:IntellectualProperty© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights. US Risk DataElements598US Risk DataElements598US Risk DataElements59846 Conditions Analyzed1,794 -7,176 Potential Enterprise Risk Data Elements per Country ERX™ Thermal Map  Identifies and Prioritizes Critical Concerns Enterprise Risk Index™15
Trusted Community Development Model™SecurityStandardsAgreementPrivacyStandardsAgreementSpecificRisksDefinedThis tool is used to assess the risk to intellectual property and trade secrets based on service  agreements with third-party  companies, either domestically  or in foreign countries.  ComplianceTermsDefinedEnforcementMechanismsDefinedAudit TermsAgreementDefined16© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
The Analysts17© Copyright 2009. ZeroPoint Risk Research LLC. All rights.
Executive Research FellowsZeroPoint Risk Executive Research Fellows possess backgrounds in privacy, information security, facility and data center security, forensics, national security, maritime security, defense, military, intelligence, risk management, internal audit, law, compliance, medicine, life sciences, media, and finance and accounting.  These analysts come from many industries, including life sciences, financial services and investment management, banking, government, professional services, the armed forces, communications, and technology.18© Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
About the Chief Risk Analyst, MacDonnell UlschServed on United States  Government Secrecy Commission.Authored security policy paper for United States Senator Sam Nunn.Industrial espionage and security analyst at National Security Institute.Vice President & Chief Analyst, Security, Dun & Bradstreet Dataquest.Director, Global Risk Management, PricewaterhouseCoopers.Sr. Director, regulatory compliance, Gartner, Inc.Author of the book, “Threat! Managing Risk in a Hostile World.”Author of global risk assessment tool intellectual property.Distinguished Fellow of the Ponemon Institute.19By MacDonnell Ulsch © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
FIRM PARTNERSMacDonnell UlschManaging PartnerDon.Ulsch@ZeroPointRisk.comJohn MannixJohn.Mannix@ZeroPointRisk.comLorie SkolskiLorie.Skolski@ZeroPointRisk.comSusan SheaSusan.Shea@ZeroPointRisk.comTelephone (617) 878-2144www.ZeroPointRisk.comCONTACT20Remediating your zero-point of risk!© Copyright 2009. ZeroPoint Risk Research LLC. All rights..

About Zero Point Risk Research Llc

  • 1.
    TRUSTED PERSPECTIVEProtectingCritical InformationInthe Age of Economic Espionageand Identity TheftThe Value Proposition of Our Firm Managing Riskin a Hostile WorldTRUSTED RESULTS© Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 1
  • 2.
    Global Threat, DomesticRisk© Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 2
  • 3.
    Targeting U.S. CorporateAssetsMore than 100 nations targeting U.S. technology secrets.People’s Republic of China is the number one offender.Russia is second.China and Russia have aggressive cyber acquisition and attack systems.China is rapidly becoming manufacturer to the world and intellectual property rights enforcement is not anticipated until at least 2020, despite World Trade Organization agreements.U.S. commands 40 percent of the global research & development spend, making the U.S. a target-rich environment.Many companies have inadequate protections against economic espionage.3© Copyright 2009. ZeroPoint Risk Research LLC. All rights.
  • 4.
    Two At-Risk InformationBothare corporate assets, both are targeted.PersonallyIdentifiableInformationIntellectualProperty&Trade SecretsInformation is stolen by governments, employees, and even byorganized crime, which sells stolen information as part of a $2 trillionglobal money laundering.© Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 4
  • 5.
    High-Risk Information TargetsPersonalDataEnergy TechnologyAdvanced MaterialsInformation TechnologyResource & Environment TechnologyBiotechnology & Advanced Agricultural TechnologyAdvanced Manufacturing and Automation Technology© Copyright 2009. ZeroPoint Risk Research LLC. All rights. 5
  • 6.
    Privacy: Personally IdentifiableInformationAs defined by state and federal statutes:Personal identifiersFirst nameMiddle initialLast nameAddressName of childrenSocial Security NumberNational identification numberTelephone & fax numbersStreet addressDriver’s license numberVehicle registration plateCredit card numbersFace, fingerprint, handwritingDigital attributes, such as passwordsEmailCertain URLsCertificate & license numbersHealth plan beneficiary numbersFull-face photographic imagesEmployer informationHousehold member informationBiometric identifiers, including fingerprints and voiceprintsDNA© Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 6
  • 7.
    About the Firm©Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 7
  • 8.
    Professional Services RenderedConsultingAdvice& CounselSyndicated ResearchSpecial Research Projects© Copyright 2009. ZeroPoint Risk Research LLC. All rights. 8
  • 9.
    Disciplines in AssetProtectionAdministrative SecurityTechnical SecurityPhysical SecurityPrivacy ComplianceRisk-Based Privacy© Copyright 2009. ZeroPoint Risk Research LLC. All rights. 9TESTING &ANALYSISREMEDIATIONSTRATEGYPOLICY
  • 10.
    10Focus on Variableand Cascading RiskLegal RiskFinancial &Investment RiskRegulatoryRiskReputationRiskINTELLECTUAL PROPERTYTRADE SECRETSPERSONALLY IDENTIFIABLE INFORMATION© Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 11.
    © Copyright 2009.ZeroPoint Risk Research LLC. All rights. 11The following slide reflects research conductedby ZeroPoint Risk Research on the role offoreign country hosts in protecting third-party intellectual property and trade secrets.
  • 12.
    12TradeSecretsEconomicEspionageGlobalInformation Theft DeniedLegislation CompanyInformation Assets atRisk Must Be Protected Off-ShorePolicyIntellectualPropertyGovernment &IndustrySafe Harbor for Critical Information ProtectionDefensive Information BarrierOperationsPersonalInformationStandardsForeign Country Role in Counter-Economic Espionage© Copyright 2009. ZeroPoint Risk Research LLC. All rights.
  • 13.
    Proprietary Research Tools13©Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 14.
    Every Enterprise Hasa Strategic Risk Inflection Point™© Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 14
  • 15.
    13 Survey QuestionRangeUS Scenario:PrivacyComplianceUS Scenario:Risk-BasedPrivacyUS Scenario:IntellectualProperty© Copyright 2009. ZeroPoint Risk Research, LLC. All rights. US Risk DataElements598US Risk DataElements598US Risk DataElements59846 Conditions Analyzed1,794 -7,176 Potential Enterprise Risk Data Elements per Country ERX™ Thermal Map Identifies and Prioritizes Critical Concerns Enterprise Risk Index™15
  • 16.
    Trusted Community DevelopmentModel™SecurityStandardsAgreementPrivacyStandardsAgreementSpecificRisksDefinedThis tool is used to assess the risk to intellectual property and trade secrets based on service agreements with third-party companies, either domestically or in foreign countries. ComplianceTermsDefinedEnforcementMechanismsDefinedAudit TermsAgreementDefined16© Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 17.
    The Analysts17© Copyright2009. ZeroPoint Risk Research LLC. All rights.
  • 18.
    Executive Research FellowsZeroPointRisk Executive Research Fellows possess backgrounds in privacy, information security, facility and data center security, forensics, national security, maritime security, defense, military, intelligence, risk management, internal audit, law, compliance, medicine, life sciences, media, and finance and accounting. These analysts come from many industries, including life sciences, financial services and investment management, banking, government, professional services, the armed forces, communications, and technology.18© Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 19.
    About the ChiefRisk Analyst, MacDonnell UlschServed on United States Government Secrecy Commission.Authored security policy paper for United States Senator Sam Nunn.Industrial espionage and security analyst at National Security Institute.Vice President & Chief Analyst, Security, Dun & Bradstreet Dataquest.Director, Global Risk Management, PricewaterhouseCoopers.Sr. Director, regulatory compliance, Gartner, Inc.Author of the book, “Threat! Managing Risk in a Hostile World.”Author of global risk assessment tool intellectual property.Distinguished Fellow of the Ponemon Institute.19By MacDonnell Ulsch © Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 20.
    FIRM PARTNERSMacDonnell UlschManagingPartnerDon.Ulsch@ZeroPointRisk.comJohn MannixJohn.Mannix@ZeroPointRisk.comLorie SkolskiLorie.Skolski@ZeroPointRisk.comSusan SheaSusan.Shea@ZeroPointRisk.comTelephone (617) 878-2144www.ZeroPointRisk.comCONTACT20Remediating your zero-point of risk!© Copyright 2009. ZeroPoint Risk Research LLC. All rights..