SlideShare a Scribd company logo
How Really Safe Are Your Secrets?




                        Presented by

      ARGUS INTERNATIONAL RISK SERVICES
     Global Security | Intelligence | Risk Management
What is Corporate Espionage?

Argus Definition; The
deliberate targeting and theft
of commercially and
proprietarily driven
technologies, ideas, and
services which if known or
transferred to any other
agent, would severely
damage, inhibit, or destroy
the original commercial
enterprise.
Is this a US only problem?
Japan’s Ministry of Economy, Trade, and
Industry conducted a survey of 625
manufacturing firms in late 2007 and found that
more than 35 percent of those responding
reported some form of technology loss. More
than 60 percent of those leaks involved China.    The British Security Service’s
                                                  Center for the Protection of
South Korea says that the costs from foreign      National Infrastructure warned
economic espionage in 2008 were $82               hundreds of UK business leaders
billion, up from $26 billion in 2004. The         in 2010 of Chinese economic
South Koreans report that 60 percent of           espionage practices, including
victims are small- and medium-sized               giving gifts of cameras and
businesses and that half of all economic          memory sticks equipped with
espionage comes from China.                       cyber implants at trade fairs and
Germany’s Federal Office for the Protection of    exhibitions. This followed similar
the Constitution (BfV) estimates that German      notification sent to 300 UK
companies lose $28 billion-$71 billion and        business leaders in 2007 warning
30,000-70,000 jobs per year from foreign          them of a coordinated cyber
economic espionage. Approximately 70 percent      espionage campaign against the
of all cases involve insiders.                    British economy.
Question: Am I a Target?

 Answer: Yes, you are!
Espionage in                     America
In 2001, Procter & Gamble admitted to a spying operation,
alleged to have been carried out over 6 months, on its hair-
care competitor Unilever. Their cunning plan, which P&G
referred to as an “unfortunate incident,” included going
through Unilever’s trash in search of documents, although if
Unilever habitually threw away full documents entitled
“Super Secret Product Information That Will Crush P&G”
their days as an industry leader are numbered.
Espionage in                     America
Michael Mitchell worked on the marketing and
sales of Kevlar for DuPont until he was fired in
2006. Unwilling to sign on to unemployment with
his tail between his legs, instead he offered to
provide his services to Kolon Industries Inc, a
Korean form which just happens to be one of two
companies that manufactures fibers that can
tough it out with Kevlar in the toughness stakes.

After emailing his new bosses confidential
information on Kevlar, he went back to old
colleagues at DuPont to find out more.
Unsurprisingly, DuPont executives found out
about this less than cunning scheme and notified
the FBI. Mitchell was sentenced to 18 months in
prison and ordered to pay DuPont over $180,000.
Espionage in                       America
In 2009 Starwood rocked the hospitality
world when they accused household
name Hilton of industrial espionage based
on Hilton’s employment of 10 executives
and managers from Starwood. Starwood’s
accusations were centered around luxury
brand ideas, with the former head of
Starwood’s luxury brands group alleged to
have downloaded “truckloads” of
documents before leaving for the bigger
firm.

In 2010, the two groups reached a
settlement that required the Hilton group
to make payments to Starwood, as well as
refrain from developing a competing
luxury hotel brand until 2013. The call for
federal monitors to supervise Hilton’s
conduct shows that it isn’t just Paris who’s
on the wrong side of the law occasionally.
Who are the Main Culprits of
           Espionage?




Russia and China view themselves as strategic competitors of the United States
and are the most aggressive collectors of US economic information and
technology.

Other countries with closer ties to the United States, including Israel, have
conducted CNE and other forms of intelligence collection to obtain US economic
and technology data, often taking advantage of the access they enjoy as allies or
partners to collect sensitive military data and information on other programs.
What is the Annual $$$ Cost of Espionage?
The methods and data available to accurately
depict the annual losses are minimalist at best.
As of 2008, combined losses between
Academic, Government, Military and
Commercial Enterprises are estimated to be
anywhere from $2 billion to $400 billion per
year. The tremendous range shows that our
system has not yet evolved to be quantify the
amount of losses.

The true cost could be way over the $400
BILLION estimate and surely no where near the
$2 Billion range.
                                                   Fact: 65% of all USA IT Managers
Common-sense prevailing, the reality is we have    admit they do not know what
no idea of how much information has been
stolen, manipulated, reproduced, and/or the        information leaves their company,
impact of its dissemination.
                                                   or who would have accessed it from
                                                   outside the company.
Where does the Greatest Threat Come From?

 As we have seen from the previous slides,
 the greatest threat comes from INSIDER
 THREATS – basically “People”
What are the Motivators for Espionage?
Why do “They” do it?
  •   Financial Gain
  •   Revenge Against Colleagues or Management
  •   Lack of Promotion or Company Recognition
  •   Career/Employer Change
  •   Personal Satisfaction (Ego) or Personal Problems (Family)
  •   Sabotage (Destructive Behavior)
  •   Thrill Seeking (I am smarter and can get away with it…)
  •   Sometimes – Just to do it!
How Do You Assess the Risk Your Organization Faces?
The Cycle of Threat Mitigation?
What Can I Do to Minimize The Threat?
Information Strategy
• Develop a “transparency strategy” that determines how closed or open the company
 needs to be based on the services provided.

Insider Threat Programs and Awareness

• Institute security training and awareness campaigns; convey threats to company
  information accessed through portable devices and when traveling abroad.

• Establish an insider threat program that consists of information technology-enabled threat
  detection, foreign travel and contact notifications, personnel security and evaluation,
  insider threat awareness and training, and reporting and analysis.

• Conduct background checks that vet users before providing them company information.

• Implement non-disclosure agreements with employees and business partners.

• Establish employee exit procedures; most employees who steal intellectual property
  commit the theft within one month of resignation.
Cont: Slide 2 of 3

Effective Data Management
• Get a handle on company data—not just in databases but also in e-mail messages, on
  individual computers, and as data objects in web portals; categorize and classify the data,
  and choose the most appropriate set of controls and markings for each class of data;
  identify which data should be kept and for how long. Understand that it is impossible to
  protect everything.

• Establish compartmentalized access programs to protect unique trade secrets and
  proprietary information; centralize intellectual property data—which will make for better
  security and facilitate information sharing.

• Restrict distribution of sensitive data; establish a shared data infrastructure to reduce the
  quantity of data held by the organization and discourage unnecessary printing and
  reproduction. Network Security, Auditing, and Monitoring

• Conduct real-time monitoring/auditing of the networks; maintain thorough records of
  who is accessing servers, and modifying, copying, deleting, or downloading files.

• Install software tools—content management, data loss prevention, network forensics—on
  individual computer workstations to protect files.
Cont: Slide 3 of 3
• Encrypt data on servers and password-protect company information.

• Incorporate multi-factor authentication measures—biometrics, PINs, and
  passwords combined with knowledge-based questions—to help verify users of
  information and computer systems.

• Create a formal corporate policy for mobility—develop measures for centrally
  controlling and monitoring which devices can be attached to corporate
  networks and systems and what data can be downloaded, uploaded, and
  stored on them.

• Formalize a social media policy for the company and implement strategies for
  minimizing data loss from on-line social networking.

Contingency Planning
• Establish a continuity of operations plan—back up data and systems; create
  disaster recovery plans; and plan for data breach contingencies.

• Conduct regular penetration testing of company infrastructure as well as of
  third-party shared service provider systems.

• Establish document creation, retention, and destruction policies.
.
Threats are Everywhere
Don’t let your company become a Victim




                      Authored By:
             Jonathan Snyder, CHS, SME, ATO
            COUNTERINTELLIGENCE SERVICES

More Related Content

What's hot

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Johann Lo
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
blogzilla
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
Joe Morris
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
shaks9151
 
Cyber security
Cyber security Cyber security
Cyber security
REVA UNIVERSITY
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
Sooraj Maurya
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
Darshan Aswani
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
International Institute for Learning
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
smriti Basson
 
Computer crime
Computer crimeComputer crime
Computer crime
Uc Man
 

What's hot (20)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Computer crime
Computer crimeComputer crime
Computer crime
 

Viewers also liked

Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
Hamza Muhammad
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 

Viewers also liked (6)

Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Malicious software
Malicious softwareMalicious software
Malicious software
 

Similar to CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus International Risk Services

security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
ronoelias98
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
Grant Barker
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
bugcrowd
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
EMC
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
Don Caeiro
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
Mark Albala
 

Similar to CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus International Risk Services (20)

security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 

Recently uploaded

Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
jamalseoexpert1978
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 

Recently uploaded (20)

Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 

CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus International Risk Services

  • 1. How Really Safe Are Your Secrets? Presented by ARGUS INTERNATIONAL RISK SERVICES Global Security | Intelligence | Risk Management
  • 2. What is Corporate Espionage? Argus Definition; The deliberate targeting and theft of commercially and proprietarily driven technologies, ideas, and services which if known or transferred to any other agent, would severely damage, inhibit, or destroy the original commercial enterprise.
  • 3. Is this a US only problem? Japan’s Ministry of Economy, Trade, and Industry conducted a survey of 625 manufacturing firms in late 2007 and found that more than 35 percent of those responding reported some form of technology loss. More than 60 percent of those leaks involved China. The British Security Service’s Center for the Protection of South Korea says that the costs from foreign National Infrastructure warned economic espionage in 2008 were $82 hundreds of UK business leaders billion, up from $26 billion in 2004. The in 2010 of Chinese economic South Koreans report that 60 percent of espionage practices, including victims are small- and medium-sized giving gifts of cameras and businesses and that half of all economic memory sticks equipped with espionage comes from China. cyber implants at trade fairs and Germany’s Federal Office for the Protection of exhibitions. This followed similar the Constitution (BfV) estimates that German notification sent to 300 UK companies lose $28 billion-$71 billion and business leaders in 2007 warning 30,000-70,000 jobs per year from foreign them of a coordinated cyber economic espionage. Approximately 70 percent espionage campaign against the of all cases involve insiders. British economy.
  • 4. Question: Am I a Target? Answer: Yes, you are!
  • 5. Espionage in America In 2001, Procter & Gamble admitted to a spying operation, alleged to have been carried out over 6 months, on its hair- care competitor Unilever. Their cunning plan, which P&G referred to as an “unfortunate incident,” included going through Unilever’s trash in search of documents, although if Unilever habitually threw away full documents entitled “Super Secret Product Information That Will Crush P&G” their days as an industry leader are numbered.
  • 6. Espionage in America Michael Mitchell worked on the marketing and sales of Kevlar for DuPont until he was fired in 2006. Unwilling to sign on to unemployment with his tail between his legs, instead he offered to provide his services to Kolon Industries Inc, a Korean form which just happens to be one of two companies that manufactures fibers that can tough it out with Kevlar in the toughness stakes. After emailing his new bosses confidential information on Kevlar, he went back to old colleagues at DuPont to find out more. Unsurprisingly, DuPont executives found out about this less than cunning scheme and notified the FBI. Mitchell was sentenced to 18 months in prison and ordered to pay DuPont over $180,000.
  • 7. Espionage in America In 2009 Starwood rocked the hospitality world when they accused household name Hilton of industrial espionage based on Hilton’s employment of 10 executives and managers from Starwood. Starwood’s accusations were centered around luxury brand ideas, with the former head of Starwood’s luxury brands group alleged to have downloaded “truckloads” of documents before leaving for the bigger firm. In 2010, the two groups reached a settlement that required the Hilton group to make payments to Starwood, as well as refrain from developing a competing luxury hotel brand until 2013. The call for federal monitors to supervise Hilton’s conduct shows that it isn’t just Paris who’s on the wrong side of the law occasionally.
  • 8. Who are the Main Culprits of Espionage? Russia and China view themselves as strategic competitors of the United States and are the most aggressive collectors of US economic information and technology. Other countries with closer ties to the United States, including Israel, have conducted CNE and other forms of intelligence collection to obtain US economic and technology data, often taking advantage of the access they enjoy as allies or partners to collect sensitive military data and information on other programs.
  • 9. What is the Annual $$$ Cost of Espionage? The methods and data available to accurately depict the annual losses are minimalist at best. As of 2008, combined losses between Academic, Government, Military and Commercial Enterprises are estimated to be anywhere from $2 billion to $400 billion per year. The tremendous range shows that our system has not yet evolved to be quantify the amount of losses. The true cost could be way over the $400 BILLION estimate and surely no where near the $2 Billion range. Fact: 65% of all USA IT Managers Common-sense prevailing, the reality is we have admit they do not know what no idea of how much information has been stolen, manipulated, reproduced, and/or the information leaves their company, impact of its dissemination. or who would have accessed it from outside the company.
  • 10. Where does the Greatest Threat Come From? As we have seen from the previous slides, the greatest threat comes from INSIDER THREATS – basically “People”
  • 11. What are the Motivators for Espionage? Why do “They” do it? • Financial Gain • Revenge Against Colleagues or Management • Lack of Promotion or Company Recognition • Career/Employer Change • Personal Satisfaction (Ego) or Personal Problems (Family) • Sabotage (Destructive Behavior) • Thrill Seeking (I am smarter and can get away with it…) • Sometimes – Just to do it!
  • 12. How Do You Assess the Risk Your Organization Faces?
  • 13. The Cycle of Threat Mitigation?
  • 14. What Can I Do to Minimize The Threat? Information Strategy • Develop a “transparency strategy” that determines how closed or open the company needs to be based on the services provided. Insider Threat Programs and Awareness • Institute security training and awareness campaigns; convey threats to company information accessed through portable devices and when traveling abroad. • Establish an insider threat program that consists of information technology-enabled threat detection, foreign travel and contact notifications, personnel security and evaluation, insider threat awareness and training, and reporting and analysis. • Conduct background checks that vet users before providing them company information. • Implement non-disclosure agreements with employees and business partners. • Establish employee exit procedures; most employees who steal intellectual property commit the theft within one month of resignation.
  • 15. Cont: Slide 2 of 3 Effective Data Management • Get a handle on company data—not just in databases but also in e-mail messages, on individual computers, and as data objects in web portals; categorize and classify the data, and choose the most appropriate set of controls and markings for each class of data; identify which data should be kept and for how long. Understand that it is impossible to protect everything. • Establish compartmentalized access programs to protect unique trade secrets and proprietary information; centralize intellectual property data—which will make for better security and facilitate information sharing. • Restrict distribution of sensitive data; establish a shared data infrastructure to reduce the quantity of data held by the organization and discourage unnecessary printing and reproduction. Network Security, Auditing, and Monitoring • Conduct real-time monitoring/auditing of the networks; maintain thorough records of who is accessing servers, and modifying, copying, deleting, or downloading files. • Install software tools—content management, data loss prevention, network forensics—on individual computer workstations to protect files.
  • 16. Cont: Slide 3 of 3 • Encrypt data on servers and password-protect company information. • Incorporate multi-factor authentication measures—biometrics, PINs, and passwords combined with knowledge-based questions—to help verify users of information and computer systems. • Create a formal corporate policy for mobility—develop measures for centrally controlling and monitoring which devices can be attached to corporate networks and systems and what data can be downloaded, uploaded, and stored on them. • Formalize a social media policy for the company and implement strategies for minimizing data loss from on-line social networking. Contingency Planning • Establish a continuity of operations plan—back up data and systems; create disaster recovery plans; and plan for data breach contingencies. • Conduct regular penetration testing of company infrastructure as well as of third-party shared service provider systems. • Establish document creation, retention, and destruction policies. .
  • 17. Threats are Everywhere Don’t let your company become a Victim Authored By: Jonathan Snyder, CHS, SME, ATO COUNTERINTELLIGENCE SERVICES