Business Counter-Intelligence

Slides:



Advertisements
Similar presentations
Intellectual Capital The Root of Value MGST 601 November 23, 2000.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.
CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant.
Workshop V Multinational Inventions- How to Reconcile IP Issues Moderated by Lawrence T. Welch Eli Lilly and Company.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
International Workshop on Safety Culture, Beijing 1 Creating a Safety Culture and Foreign Experiences Huang Shengchu, Hu Yuhong, Peng cheng China.
Lecture 8: Risk Management Controlling Risk
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Bullet Proof IP Perkins Coie LLP.  Full Service Firm slanted towards high tech companies  700 lawyers; 14 offices  Named one of the "Best 100 Companies"
Types of Intellectual Property Patent Patent Trademarks Trademarks Copyright Copyright Trade Secrets Trade Secrets.
Introduction to Network Defense
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
GE’s Key Growth Initiative Globalization is not only striving to grow revenues by selling goods and services in global markets. It also means globalizing.
Session 602 Exploring the Evolution of Access: Classified, Privacy, and Proprietary Restrictions.
Threat Assessment in a Logical Environment U.S. Financial Infrastructure Physical to Logical environment Protection and Threat Assessment Safe School.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Intellectual Property and Its Role in Economic Development
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
The World Leader in High Performance Signal Processing Solutions Global Intellectual Property Protection December 2014 Jason Fiorillo Chief I.P. Counsel.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Information Warfare Playgrounds to Battlegrounds.
SMEs & IP Experiences in Wales Andrew Beale Director, IP Wales®
Cyber Security Nevada Businesses Overview June, 2014.
Current Korea Patent Court System, compared to that of the U.S.A. Pilot program.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Introduction to Intellectual Property Class One: TYPES OF IP Prof. Susanna Frederick Fischer The Catholic University of America August 25, 2003.
John Wiley & Sons, Inc c POLITICAL AND LEGAL ENVIRONMENT Chapter Five.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Information Warfare Playgrounds to Battlegrounds.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Management Practices Lecture-5 1. Recap Behavioral Management The Hawthorne Studies Theory X and Y Theory X v. Theory Y Theory Z Systems Considerations.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Technical Counterintelligence Technical Surveillance Counter Measures Services.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Risk management.
MGMT 452 Corporate Social Responsibility
Ogletree, Deakins, Nash, Smoak & Stewart PC
Comprehensive Security and Compliance at an Affordable Price.
Business Strategy and Policy
Information Technology Sector
Cyber Security: State of the Nation
Introduction Intellectual property includes the application of property in the areas of trade secrets, patents, trademarks, and copyrights.
Legal, Regulations, Compliance and Investigations
Risk Assessment and Risk Management
Capturing Creativity: Intellectual Asset Management and IP Strategy.
Chapter 4 Law, Regulations, and Compliance
Security Essentials for Small Businesses
WEEK 1 Background for International Business
PGE Chris Nolke, Director of Cybersecurity
Patent Information Annual Conference 2011
Objectives Telecommunications and Network Physical and Personnel
IP and legal issues Super-project.eu.
Identifying Intangible Assets and Intellectual Property
Human Resource Management
Strategic threat assessment
National Interest & Foreign Policy
Employee Security Awareness
IP ISSUES IN LICENSING OF TECHNOLOGY IN THE ELECTRONICS INDUSTRY
Presentation transcript:

Business Counter-Intelligence Protecting Your Most Precious Asset: Information Kroll Robert L. Grenier USA

Business Counter-Intelligence Protecting Your Most Precious Asset

Your Greatest Asset: Information “Classic” Intellectual Property Trademarks, copyrights, patents Trade Secrets Not public knowledge Provide economic advantage Strive to protect Others’ Information in Your Care

IP (cont.) All Considered IP 70-80% of U.S. companies’ value Motivated to protect Obliged under Sarbanes-Oxley 404

U.S., developed economies the main target The Threat Economic Espionage …from Competitors: U.S., developed economies the main target Estimated U.S. annual loss: $250-400 billion Greatly Under-reported …from Foreign Governments: FBI: 22% government-sponsored Governments see strategic interest Russia, China, Taiwan, S. Korea, others

Growing Vulnerability Companies More Vulnerable Than Ever Advancement of technology, computing, communications The human factor: Ignorance of vulnerabilities The “disposable employee” Key vulnerability: The “insider spy”

Defending Governments Overwhelmed Governments Recognize the Threat… e.g., Canada, UK, France, Germany, Sweden, Switzerland …But Can Do Little NCIX and FBI highlight the scope of threat Economic Espionage Act pursued Few prosecutions Simply overwhelmed Businesses Are On Their Own

What Companies Can Do: Business Counter-Intelligence Valuation: What is IP Worth? Prioritization: What Most Needs Protection? Assess the Threat: Who wants it? What are their methods? Assess Vulnerability Where and how we do business What are the gaps/points of failure How do we match against known espionage methods?

Business Counter-Intelligence (cont.) Remediation: Info Security: Electronic and paper-based Systems administration Network architecture Information architecture Physical Security Facilities Plans, policies & procedures Human security Personnel screening and monitoring Business culture and practices Awareness education and training