CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant.

Slides:



Advertisements
Similar presentations
Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to how to prevent infringement within [business name] September.
Advertisements

Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
Introduction and Overview of Digital Crime and Digital Terrorism
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
1616 Guadalupe Street, UTA (512) ▪ (512) (fax)
National Science Foundation Division of Science Resources Statistics May The Confidential Information Protection and Statistical Efficiency Act.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
Local Company Est Employees. Ex Police. Crime Prevention. CID & Drug Squad. Special Branch. Extensive Training & Experience in Preventing & Detecting.
Information Warfare Theory of Information Warfare
INTERNATIONAL COOPERATION Daniel H. Claman Senior Trial Attorney U.S. Department of Justice.
Hands-On Ethical Hacking and Network Defense
Information Systems Security Officer
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Byron Scott | Nov U.S. Department of Education 2012 Fall Conference Foreign Schools Consumer Information Session 37.
Fiscal Compliance for Department Heads & Directors Daniel Adams Audit Services.
WE PUT YOU BACK IN CONTROL OF YOUR BUSINESS. SACS CONSULTING & INVESTIGATIVE SERVICES.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Information Security Training for Management Complying with the HIPAA Security Law.
Campus Safety The Sullivan University System There were no hate crimes reported that fit any reportable crime bias categories. In accordance with the Crime.
IT Control Objectives for Sarbanes-Oxley
Reporting Requirements POLICY DISCRIMINATION, HARASSMENT, AND SEXUAL MISCONDUCT FACULTY SENATE CONSULTATION, JANUARY 26, 2015.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
HROFFICE USER CONFERENCE 2005 Creating an Effective Ethics and Compliance Program Ascentis User Group September, 2005.
ANTI-MONEY LAUNDERING TRAINING FOR LENDERS Bill Heyman Offit Kurman
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW.
Session 602 Exploring the Evolution of Access: Classified, Privacy, and Proprietary Restrictions.
CHILEAN SYSTEM OF CRIMINAL LIABILITY OF LEGAL ENTITIES BASIC ELEMENTS OF CRIME PREVENTION (LAW Nº20.393) Pablo Gómez Niada Valparaíso’s Regional Prosecutor.
NOT PROTECTIVELY MARKED Data Protection Information Management & Information Security.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Unit 2 Human Rights Part 3 Civil and Human Rights.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
1 Trade Secrets ___________________________ Business Organizations II Mike Brigner, J.D.
Enforcing IP Rights Involving Foreign Companies Greg Vogler Chicago, Illinois May 2013.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
TRADE SECRETS Presented By Joseph A. Calvaruso Orrick, Herrington & Sutcliffe LLP 1 © AIPLA 2012.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
STATE OF GEORGIA OFFICE OF INSPECTOR GENERAL Fraud Risk Within State Government.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
CRIMES Used by permission. For Educational purposes only.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
CONTROLLING INFORMATION SYSTEMS
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Protecting your Managed Services Practice: Are you at Risk?
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Business Counter-Intelligence
OFAC.
Cyber Trends and Market Update
Theft of Trade Secrets & Economic Espionage
Strategic threat assessment
Presentation transcript:

CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant

Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant 3823 Locust Lane Harrisburg, Pennsylvania Office: Cell:

President Ronald Regan Espionage is not a game; it’s a struggle we must win if we are to protect our freedom and our way of life." These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over. These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over.

The Future of Espionage The Future Ain’t What It Used To Be Yogi Berra

Corporate Espionage Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of (Title 18 UCS 1831) (Title 18 UCS 1831)

The Espionage Threat Sources of Information Documents Draft Documents Working or Scrap Paper Computer Based Information Photographs – Maps - Charts

The Espionage Threat Sources of Information Internal Correspondence Legal and Regulatory Filings Open Source Information Company Web and Publications

The Espionage Threat Sources of Information Formal Meeting Conferences and Trade Shows Casual Conservations

The Espionage Threat Employees Who Are In Need of Money Seeking Sex - Love Disgruntled Thrill Seekers ActivistsIdeologues Departing or Former

The Espionage Threat Competitors United States Competitors Foreign Competitors

The Espionage Threat Foreign Intelligence Agencies Hostile Nations RussiaChina North Korea CubaIran

The Espionage Threat Foreign Intelligence Agencies Friendly Nations FranceGermanyJapanIsrael

The Espionage Threat Third World Countries Organized Crime Hackers

The Espionage Threat Terrorist Organizations

The Espionage Threat Countermeasures You Must Conduct A Threat Assessment to Determine Risk External / Internal Flaws In Your Security

The Espionage Threat Countermeasures Policies and Procedures Policies and Procedures In Writing and Easy to Understand Disseminated Reviewed and Updated Annually or When Needed

The Espionage Threat Countermeasures Assets Protection PeopleInformationProperty

The Espionage Threat Countermeasures Loss Prevention Countermeasures to prevent losses from occurring and to limit unpreventable losses.

The Espionage Threat Countermeasures Astor’s Law of Loss Prevention Shortages Rise to the Level of Their Budget. The Improbable is Ignored and Becomes Probable Person’s Opportunity to Steal Varies with His Apparent Trust with His Apparent Trust

The Espionage Threat Countermeasures Astor’s Law of Loss Prevention Effective Loss Prevention is Always Preceded by Extensive Losses Any Loss Prevention Control Fails Only Upon Audit

The Espionage Threat Countermeasures Human Resources Proper Position Descriptions Pre-Employment Investigations Periodic Investigations Non –Disclosure/Competitive Agreements Effective Exit Interviews

The Espionage Threat Countermeasures Awareness Training Awareness Training Prevent Accidental Disclosures PredictabilityConversations Reporting Contacts and Activity

The Espionage Threat Countermeasures Security Force Security Force Professional Staff Proper Staffing Professional Training

The Espionage Threat Countermeasures Security Force Management Professional Security Director Experience-Education Professional Certifications CPP CCO

The Espionage Threat Countermeasures Professional Certifications Certified Protection Professional ( CPP ) Certified Protection Professional ( CPP ) ASIS International

The Espionage Threat Countermeasures Professional Certifications Certified Confidentially Officer ( CCO ) Business Espionage Controls & Countermeasures Association Countermeasures Association

The Espionage Threat Countermeasures Physical Security Physical SecurityCPTEDBarriers Access and Key Management IDS Fire Protection CCTV Security Containers Inventory Control

The Espionage Threat Countermeasures Information Security Information Security Marking All Protected Information Securing Protected Information Network Security

The Espionage Threat Countermeasures Audits and Investigations Regular Audits of All Areas Investigations of Losses Investigations of Violations of Policy

Recovery from an Espionage Threat Economic Espionage Act of (Title 18 UCS 1831) (Title 18 UCS 1831) Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of It imposes up to a 15-year prison term and or a maximum $5000, fines on any person and a $10 million fine on any organization that steals or destroys a trade secret of value with intent to benefit any foreign power. It imposes up to a 15-year prison term and or a maximum $5000, fines on any person and a $10 million fine on any organization that steals or destroys a trade secret of value with intent to benefit any foreign power.

Recovery from an Espionage Threat Economic Espionage Act of (Title 18 UCS 1831) (Title 18 UCS 1831) The act imposes a 10 year prison term and or maximum $250, fine to any person and $5 million fine on any organization who knowingly steals or destroys any trade secret with intent to economically benefit anyone other than the owner and or injuries the owner of the trade secret. The act also allows the forfeiture to the U.S. government of proceeds or property derived from economic espionage and may require forfeiture of property used to commit economic espionage. The act also allows the forfeiture to the U.S. government of proceeds or property derived from economic espionage and may require forfeiture of property used to commit economic espionage.

Recovery from an Espionage Threat To Prosecute You Must Show The Information Has Value MonetaryHiddenAdversary/Competitor

Recovery from an Espionage Threat To Prosecute You Must Show The Information has been Protected Properly Marked for Protection Policies and Procedures Awareness Training

CORPORATE ESPIONAGE COUNTERMEASURES Review What is Corporate Espionage Sources of Information ThreatCountermeasures Recovery from Threat

CORPORATE ESPIONAGE COUNTERMEASURES Questions