SlideShare a Scribd company logo
TRUSTED PERSPECTIVE Protecting Critical Information In the Age of Economic Espionage and Identity Theft The Value Proposition of Our Firm  Managing Risk in a Hostile World TRUSTED RESULTS © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.  1
Global Threat, Domestic Risk © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.  2
Targeting U.S. Corporate Assets More than 100 nations targeting U.S. technology secrets. People’s Republic of China is the number one offender. Russia is second. China and Russia have aggressive cyber acquisition and attack systems. China is rapidly becoming manufacturer to the world and intellectual property rights enforcement is not anticipated until at least 2020, despite World Trade Organization agreements. U.S. commands 40 percent of the global research & development spend, making the U.S. a target-rich environment. Many companies have inadequate protections against economic espionage. 3 © Copyright 2009. ZeroPoint Risk Research LLC. All rights.
Two At-Risk Information Both are corporate assets, both are targeted. Personally Identifiable Information Intellectual Property & Trade Secrets Information is stolen by governments, employees, and even by organized crime, which sells stolen information as part of a $2 trillion global money laundering. © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.  4
High-Risk Information Targets Personal Data Energy Technology Advanced Materials Information Technology Resource & Environment Technology Biotechnology & Advanced Agricultural Technology Advanced Manufacturing and Automation Technology © Copyright 2009. ZeroPoint Risk Research LLC. All rights.    5
Privacy: Personally Identifiable Information As defined by state and federal statutes: Personal identifiers First name Middle initial Last name Address Name of children Social Security Number National identification number Telephone & fax numbers Street address Driver’s license number Vehicle registration plate Credit card numbers Face, fingerprint, handwriting Digital attributes, such as passwords Email Certain URLs Certificate & license numbers Health plan beneficiary numbers Full-face photographic images Employer information Household member information Biometric identifiers, including fingerprints and voiceprints DNA © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.  6
About the Firm © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.  7
Professional Services Rendered Consulting Advice & Counsel Syndicated Research Special Research Projects © Copyright 2009. ZeroPoint Risk Research LLC. All rights.    8
Disciplines in Asset Protection Administrative Security Technical Security Physical Security Privacy Compliance Risk-Based Privacy © Copyright 2009. ZeroPoint Risk Research LLC. All rights.    9 TESTING  & ANALYSIS REMEDIATION STRATEGY POLICY
10 Focus on Variable and Cascading Risk Legal Risk Financial  & Investment Risk Regulatory Risk Reputation Risk INTELLECTUAL PROPERTY TRADE SECRETS PERSONALLY IDENTIFIABLE  INFORMATION © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
© Copyright 2009. ZeroPoint Risk Research LLC. All rights.    11 The following slide reflects research conducted by ZeroPoint Risk Research on the role of foreign country hosts in protecting third-party  intellectual property and trade secrets.
12 Trade Secrets Economic Espionage Global Information  Theft Denied Legislation   Company Information Assets at Risk Must Be Protected Off-Shore Policy Intellectual Property Government & Industry Safe Harbor  for Critical Information Protection Defensive Information Barrier Operations Personal Information Standards Foreign Country Role in Counter-Economic Espionage © Copyright 2009. ZeroPoint Risk Research LLC. All rights.
Proprietary Research Tools 13 © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
Every Enterprise Has a Strategic Risk Inflection Point™ © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.  14
13 Survey Question Range US Scenario: Privacy Compliance US Scenario: Risk-Based Privacy US Scenario: Intellectual Property © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.  US Risk Data Elements 598 US Risk Data Elements 598 US Risk Data Elements 598 46 Conditions Analyzed 1,794 -7,176 Potential Enterprise Risk Data Elements per Country  ERX™ Thermal Map  Identifies and Prioritizes Critical Concerns  Enterprise Risk Index™ 15
Trusted Community Development Model™ Security Standards Agreement Privacy Standards Agreement Specific Risks Defined This tool is used to assess the risk to intellectual property and trade secrets based on service   agreements with third-party  companies, either domestically  or in foreign countries.   Compliance Terms Defined Enforcement Mechanisms Defined Audit Terms Agreement Defined 16 © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
The Analysts 17 © Copyright 2009. ZeroPoint Risk Research LLC. All rights.
Executive Research Fellows ZeroPoint Risk Executive Research Fellows possess backgrounds in privacy, information security, facility and data center security, forensics, national security, maritime security, defense, military, intelligence, risk management, internal audit, law, compliance, medicine, life sciences, media, and finance and accounting.  These analysts come from many industries, including life sciences, financial services and investment management, banking, government, professional services, the armed forces, communications, and technology. 18 © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
About the Chief Risk Analyst, MacDonnell Ulsch Served on United States  Government Secrecy Commission. Authored security policy paper for United States Senator Sam Nunn. Industrial espionage and security analyst at National Security Institute. Vice President & Chief Analyst, Security, Dun & Bradstreet Dataquest. Director, Global Risk Management, PricewaterhouseCoopers. Sr. Director, regulatory compliance, Gartner, Inc. Author of the book, “Threat! Managing Risk in a Hostile World.” Author of global risk assessment tool intellectual property. Distinguished Fellow of the Ponemon Institute. 19 By MacDonnell Ulsch  © Copyright 2009.  ZeroPoint Risk Research, LLC.  All rights.
FIRM PARTNERS MacDonnell Ulsch Managing Partner Don.Ulsch@ZeroPointRisk.com John Mannix John.Mannix@ZeroPointRisk.com Lorie Skolski Lorie.Skolski@ZeroPointRisk.com Susan Shea Susan.Shea@ZeroPointRisk.com Telephone (617) 878-2144 www.ZeroPointRisk.com CONTACT 20 Remediating your  zero-point of risk! © Copyright 2009. ZeroPoint Risk Research LLC. All rights..

More Related Content

What's hot

Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Eric Vanderburg
 
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
Dr. Ahmed Al Zaidy
 
Alliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate PresentationAlliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate Presentation
Richard Cole
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
Christopher Rieser
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
Dr. Ahmed Al Zaidy
 
Forensic3e ppt ch03
Forensic3e ppt ch03Forensic3e ppt ch03
Forensic3e ppt ch03
Skillspire LLC
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Turner and Associates, Inc.
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
Dr. Ahmed Al Zaidy
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
Raymond Cunningham
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Financial Poise
 
Forensic3e ppt ch07
Forensic3e ppt ch07Forensic3e ppt ch07
Forensic3e ppt ch07
Skillspire LLC
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
Dr. Ahmed Al Zaidy
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
Dr. Ahmed Al Zaidy
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
HB Litigation Conferences
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Quarles & Brady
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
nsheel
 
Corporate Intelligence C. Foglini Partie 1
Corporate Intelligence C. Foglini Partie 1Corporate Intelligence C. Foglini Partie 1
Corporate Intelligence C. Foglini Partie 1
HECLausanneUNIL
 

What's hot (20)

Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
 
Alliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate PresentationAlliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate Presentation
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3Fundamentals of Information Systems Security Chapter 3
Fundamentals of Information Systems Security Chapter 3
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
Forensic3e ppt ch03
Forensic3e ppt ch03Forensic3e ppt ch03
Forensic3e ppt ch03
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8Fundamentals of Information Systems Security Chapter 8
Fundamentals of Information Systems Security Chapter 8
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Forensic3e ppt ch07
Forensic3e ppt ch07Forensic3e ppt ch07
Forensic3e ppt ch07
 
Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13Fundamentals of Information Systems Security Chapter 13
Fundamentals of Information Systems Security Chapter 13
 
Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14Fundamentals of Information Systems Security Chapter 14
Fundamentals of Information Systems Security Chapter 14
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Corporate Intelligence C. Foglini Partie 1
Corporate Intelligence C. Foglini Partie 1Corporate Intelligence C. Foglini Partie 1
Corporate Intelligence C. Foglini Partie 1
 

Viewers also liked

Rapport d'activité Gimélec 2013-2014
Rapport d'activité Gimélec 2013-2014Rapport d'activité Gimélec 2013-2014
Rapport d'activité Gimélec 2013-2014
Gimélec
 
Website Development Gurgoan india
Website Development Gurgoan indiaWebsite Development Gurgoan india
Website Development Gurgoan india
ITinfoCube
 
Como comprar Nerium sin tarjeta en México [2015]
Como comprar Nerium sin tarjeta en México [2015]Como comprar Nerium sin tarjeta en México [2015]
Como comprar Nerium sin tarjeta en México [2015]
youngerskinin90days
 
200 años de correo
200 años de correo200 años de correo
200 años de correo
Alumnos Instituto Grilli
 
Ejercicios de lengua estiramientos
Ejercicios de lengua estiramientosEjercicios de lengua estiramientos
Ejercicios de lengua estiramientos
wickingamer
 
Fatores que Influenciam o Crescimento Infantil Somático até os 2 anos de Idade
Fatores que Influenciam o Crescimento Infantil Somático até os 2 anos de IdadeFatores que Influenciam o Crescimento Infantil Somático até os 2 anos de Idade
Fatores que Influenciam o Crescimento Infantil Somático até os 2 anos de Idade
Van Der Häägen Brazil
 
C.i n°1092 [ww w.vosbooks.com]
C.i n°1092 [ww w.vosbooks.com]C.i n°1092 [ww w.vosbooks.com]
C.i n°1092 [ww w.vosbooks.com]
Sloarsbis Richard
 
The Mobile Recruiting Experience
The Mobile Recruiting ExperienceThe Mobile Recruiting Experience
The Mobile Recruiting Experience
Geoff Peterson
 
Newsletter5.12.14
Newsletter5.12.14Newsletter5.12.14
Newsletter5.12.14BIS HCM
 
Bondia.cat 26/04/2013
Bondia.cat 26/04/2013Bondia.cat 26/04/2013
Bondia.cat 26/04/2013
Bondia Lleida Sl
 
Me 6 consultor+¡a docencia public coach 2001 2009 01 2011
Me 6 consultor+¡a docencia public coach  2001 2009  01 2011Me 6 consultor+¡a docencia public coach  2001 2009  01 2011
Me 6 consultor+¡a docencia public coach 2001 2009 01 2011MARCOS ERIZE
 
GlobalOne-Presentación En Español
GlobalOne-Presentación En EspañolGlobalOne-Presentación En Español
GlobalOne-Presentación En Español
Nelson Medina
 
Salzburger Cityjump - first edition in 2013
Salzburger Cityjump - first edition in 2013Salzburger Cityjump - first edition in 2013
Salzburger Cityjump - first edition in 2013
athletics gmbh
 
LG 22LS3500 Manual de Instruções da Televisão
LG 22LS3500 Manual de Instruções da TelevisãoLG 22LS3500 Manual de Instruções da Televisão
LG 22LS3500 Manual de Instruções da Televisão
Comprar TV
 
Serial Communication in LabVIEW FPGA on Xilinx Spartan 3E Starter board
Serial Communication in LabVIEW FPGA on Xilinx Spartan 3E Starter boardSerial Communication in LabVIEW FPGA on Xilinx Spartan 3E Starter board
Serial Communication in LabVIEW FPGA on Xilinx Spartan 3E Starter boardVincent Claes
 
Presentacion conafe
Presentacion conafePresentacion conafe
Presentacion conafe
Fani Belmontes
 
Pembiakan tumbuhan secara seks
Pembiakan tumbuhan secara seksPembiakan tumbuhan secara seks
Pembiakan tumbuhan secara seksWISMARIZAH
 
Nuevasopciones gf rmedia
Nuevasopciones gf rmediaNuevasopciones gf rmedia
Nuevasopciones gf rmedia
Daniel Umaña
 

Viewers also liked (20)

Rapport d'activité Gimélec 2013-2014
Rapport d'activité Gimélec 2013-2014Rapport d'activité Gimélec 2013-2014
Rapport d'activité Gimélec 2013-2014
 
Innovamos42
Innovamos42Innovamos42
Innovamos42
 
Website Development Gurgoan india
Website Development Gurgoan indiaWebsite Development Gurgoan india
Website Development Gurgoan india
 
Como comprar Nerium sin tarjeta en México [2015]
Como comprar Nerium sin tarjeta en México [2015]Como comprar Nerium sin tarjeta en México [2015]
Como comprar Nerium sin tarjeta en México [2015]
 
200 años de correo
200 años de correo200 años de correo
200 años de correo
 
Ejercicios de lengua estiramientos
Ejercicios de lengua estiramientosEjercicios de lengua estiramientos
Ejercicios de lengua estiramientos
 
Fatores que Influenciam o Crescimento Infantil Somático até os 2 anos de Idade
Fatores que Influenciam o Crescimento Infantil Somático até os 2 anos de IdadeFatores que Influenciam o Crescimento Infantil Somático até os 2 anos de Idade
Fatores que Influenciam o Crescimento Infantil Somático até os 2 anos de Idade
 
C.i n°1092 [ww w.vosbooks.com]
C.i n°1092 [ww w.vosbooks.com]C.i n°1092 [ww w.vosbooks.com]
C.i n°1092 [ww w.vosbooks.com]
 
The Mobile Recruiting Experience
The Mobile Recruiting ExperienceThe Mobile Recruiting Experience
The Mobile Recruiting Experience
 
Newsletter5.12.14
Newsletter5.12.14Newsletter5.12.14
Newsletter5.12.14
 
Bondia.cat 26/04/2013
Bondia.cat 26/04/2013Bondia.cat 26/04/2013
Bondia.cat 26/04/2013
 
Adress Ganj
Adress GanjAdress Ganj
Adress Ganj
 
Me 6 consultor+¡a docencia public coach 2001 2009 01 2011
Me 6 consultor+¡a docencia public coach  2001 2009  01 2011Me 6 consultor+¡a docencia public coach  2001 2009  01 2011
Me 6 consultor+¡a docencia public coach 2001 2009 01 2011
 
GlobalOne-Presentación En Español
GlobalOne-Presentación En EspañolGlobalOne-Presentación En Español
GlobalOne-Presentación En Español
 
Salzburger Cityjump - first edition in 2013
Salzburger Cityjump - first edition in 2013Salzburger Cityjump - first edition in 2013
Salzburger Cityjump - first edition in 2013
 
LG 22LS3500 Manual de Instruções da Televisão
LG 22LS3500 Manual de Instruções da TelevisãoLG 22LS3500 Manual de Instruções da Televisão
LG 22LS3500 Manual de Instruções da Televisão
 
Serial Communication in LabVIEW FPGA on Xilinx Spartan 3E Starter board
Serial Communication in LabVIEW FPGA on Xilinx Spartan 3E Starter boardSerial Communication in LabVIEW FPGA on Xilinx Spartan 3E Starter board
Serial Communication in LabVIEW FPGA on Xilinx Spartan 3E Starter board
 
Presentacion conafe
Presentacion conafePresentacion conafe
Presentacion conafe
 
Pembiakan tumbuhan secara seks
Pembiakan tumbuhan secara seksPembiakan tumbuhan secara seks
Pembiakan tumbuhan secara seks
 
Nuevasopciones gf rmedia
Nuevasopciones gf rmediaNuevasopciones gf rmedia
Nuevasopciones gf rmedia
 

Similar to About Zero Point Risk Research Llc

Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
Patrick Florer
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Business Days
 
Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breach
Patrick Florer
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Precisely
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
businessforward
 
Deconstructing The Cost Of A Data Breach
Deconstructing The Cost Of A Data BreachDeconstructing The Cost Of A Data Breach
Deconstructing The Cost Of A Data Breach
hgoodnight
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
Patrick Florer
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
Financial Poise
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
Megan Espinoza
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
Richardus Indrajit
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Frank Backes
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 

Similar to About Zero Point Risk Research Llc (20)

Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breach
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Deconstructing The Cost Of A Data Breach
Deconstructing The Cost Of A Data BreachDeconstructing The Cost Of A Data Breach
Deconstructing The Cost Of A Data Breach
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 

About Zero Point Risk Research Llc

  • 1. TRUSTED PERSPECTIVE Protecting Critical Information In the Age of Economic Espionage and Identity Theft The Value Proposition of Our Firm Managing Risk in a Hostile World TRUSTED RESULTS © Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 1
  • 2. Global Threat, Domestic Risk © Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 2
  • 3. Targeting U.S. Corporate Assets More than 100 nations targeting U.S. technology secrets. People’s Republic of China is the number one offender. Russia is second. China and Russia have aggressive cyber acquisition and attack systems. China is rapidly becoming manufacturer to the world and intellectual property rights enforcement is not anticipated until at least 2020, despite World Trade Organization agreements. U.S. commands 40 percent of the global research & development spend, making the U.S. a target-rich environment. Many companies have inadequate protections against economic espionage. 3 © Copyright 2009. ZeroPoint Risk Research LLC. All rights.
  • 4. Two At-Risk Information Both are corporate assets, both are targeted. Personally Identifiable Information Intellectual Property & Trade Secrets Information is stolen by governments, employees, and even by organized crime, which sells stolen information as part of a $2 trillion global money laundering. © Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 4
  • 5. High-Risk Information Targets Personal Data Energy Technology Advanced Materials Information Technology Resource & Environment Technology Biotechnology & Advanced Agricultural Technology Advanced Manufacturing and Automation Technology © Copyright 2009. ZeroPoint Risk Research LLC. All rights. 5
  • 6. Privacy: Personally Identifiable Information As defined by state and federal statutes: Personal identifiers First name Middle initial Last name Address Name of children Social Security Number National identification number Telephone & fax numbers Street address Driver’s license number Vehicle registration plate Credit card numbers Face, fingerprint, handwriting Digital attributes, such as passwords Email Certain URLs Certificate & license numbers Health plan beneficiary numbers Full-face photographic images Employer information Household member information Biometric identifiers, including fingerprints and voiceprints DNA © Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 6
  • 7. About the Firm © Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 7
  • 8. Professional Services Rendered Consulting Advice & Counsel Syndicated Research Special Research Projects © Copyright 2009. ZeroPoint Risk Research LLC. All rights. 8
  • 9. Disciplines in Asset Protection Administrative Security Technical Security Physical Security Privacy Compliance Risk-Based Privacy © Copyright 2009. ZeroPoint Risk Research LLC. All rights. 9 TESTING & ANALYSIS REMEDIATION STRATEGY POLICY
  • 10. 10 Focus on Variable and Cascading Risk Legal Risk Financial & Investment Risk Regulatory Risk Reputation Risk INTELLECTUAL PROPERTY TRADE SECRETS PERSONALLY IDENTIFIABLE INFORMATION © Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 11. © Copyright 2009. ZeroPoint Risk Research LLC. All rights. 11 The following slide reflects research conducted by ZeroPoint Risk Research on the role of foreign country hosts in protecting third-party intellectual property and trade secrets.
  • 12. 12 Trade Secrets Economic Espionage Global Information Theft Denied Legislation Company Information Assets at Risk Must Be Protected Off-Shore Policy Intellectual Property Government & Industry Safe Harbor for Critical Information Protection Defensive Information Barrier Operations Personal Information Standards Foreign Country Role in Counter-Economic Espionage © Copyright 2009. ZeroPoint Risk Research LLC. All rights.
  • 13. Proprietary Research Tools 13 © Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 14. Every Enterprise Has a Strategic Risk Inflection Point™ © Copyright 2009. ZeroPoint Risk Research, LLC. All rights. 14
  • 15. 13 Survey Question Range US Scenario: Privacy Compliance US Scenario: Risk-Based Privacy US Scenario: Intellectual Property © Copyright 2009. ZeroPoint Risk Research, LLC. All rights. US Risk Data Elements 598 US Risk Data Elements 598 US Risk Data Elements 598 46 Conditions Analyzed 1,794 -7,176 Potential Enterprise Risk Data Elements per Country ERX™ Thermal Map Identifies and Prioritizes Critical Concerns Enterprise Risk Index™ 15
  • 16. Trusted Community Development Model™ Security Standards Agreement Privacy Standards Agreement Specific Risks Defined This tool is used to assess the risk to intellectual property and trade secrets based on service agreements with third-party companies, either domestically or in foreign countries. Compliance Terms Defined Enforcement Mechanisms Defined Audit Terms Agreement Defined 16 © Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 17. The Analysts 17 © Copyright 2009. ZeroPoint Risk Research LLC. All rights.
  • 18. Executive Research Fellows ZeroPoint Risk Executive Research Fellows possess backgrounds in privacy, information security, facility and data center security, forensics, national security, maritime security, defense, military, intelligence, risk management, internal audit, law, compliance, medicine, life sciences, media, and finance and accounting. These analysts come from many industries, including life sciences, financial services and investment management, banking, government, professional services, the armed forces, communications, and technology. 18 © Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 19. About the Chief Risk Analyst, MacDonnell Ulsch Served on United States Government Secrecy Commission. Authored security policy paper for United States Senator Sam Nunn. Industrial espionage and security analyst at National Security Institute. Vice President & Chief Analyst, Security, Dun & Bradstreet Dataquest. Director, Global Risk Management, PricewaterhouseCoopers. Sr. Director, regulatory compliance, Gartner, Inc. Author of the book, “Threat! Managing Risk in a Hostile World.” Author of global risk assessment tool intellectual property. Distinguished Fellow of the Ponemon Institute. 19 By MacDonnell Ulsch © Copyright 2009. ZeroPoint Risk Research, LLC. All rights.
  • 20. FIRM PARTNERS MacDonnell Ulsch Managing Partner Don.Ulsch@ZeroPointRisk.com John Mannix John.Mannix@ZeroPointRisk.com Lorie Skolski Lorie.Skolski@ZeroPointRisk.com Susan Shea Susan.Shea@ZeroPointRisk.com Telephone (617) 878-2144 www.ZeroPointRisk.com CONTACT 20 Remediating your zero-point of risk! © Copyright 2009. ZeroPoint Risk Research LLC. All rights..