corporate espionage

Download Corporate Espionage

Post on 11-Jun-2015

1.412 views

Category:

Documents

2 download

Embed Size (px)

DESCRIPTION

- "Bullet-proofing your business in the information age"

TRANSCRIPT

  • 1. Lifeforce One International[email_address]

2. Corporate Espionage Bullet-proofing your business in the information age! Lifeforce One International[email_address] 3. What exactly is Corporate Espionage?

  • Corporate Espionageis the clandestine collection of sensitive, restricted or classified information. This information by its very nature is not openly accessible and can only be obtained through covert means.

Lifeforce One International[email_address] 4. Interesting Characteristics of Corporate Espionage

  • When the search goes from the public to the private, industrial espionage is an illegal act.
  • Frequently, spies gain access to private information by finding someone who works for the spied upon company.
  • Does not frequently resort to violence.

Lifeforce One International[email_address] 5. Actual Cases

  • Rio Tinto

Lifeforce One International[email_address] Rio hacked at time of Hu arrest Updated Mon Apr 19, 2010 9:12pm AEST Rio Tinto has been attacked by computer hackers, in what experts say is a growing global problem. Rio Tinto has been attacked by computer hackers, in what experts say is a growing global problem. (ABC News: Damien Larkin's, file photo) Google furious at 'sophisticated' China cyber attacks Updated Wed Jan 13, 2010 11:32am AEDT Google has threatened to shut down its operations in China after uncovering what it said were "highly sophisticated" cyber attacks aimed at Chinese human rights activists. Google 6. So How is It Done?? Lifeforce One International[email_address] 7. Competitive Intel. vs.Corp. Espionage(Methodology)

  • Corporate Espionage
  • (Illegal Methods of Collection)
  • Positioning inside the targeted company.
    • Internal Personnel (Employees)
    • External Personnel (Kites)
  • Physical Intrusion
    • B&E
  • Technical Collection
    • Whacking
    • Eavesdropping
    • Hacking
  • Competitive Intelligence
  • ( Legal Methods of Collection)
  • Joint Ventures
  • OSI
  • Hiring Away
  • Trade Shows
  • Recruitment of foreign nationals

Lifeforce One International[email_address] 8. So what is our first step?

  • Step 1
  • Knowwhat information is criticalto your businesses continuity!!

Lifeforce One International[email_address] 9. Critical Information? (Step #2)

  • Client lists
  • Trade Secrets
  • Expansion plans
  • Marketing plans
  • Personnel records
  • Production processes
  • Confidential financial data
  • Customer billing information
  • R&D blueprints for new technologies
  • That information whichin competitor hands can cause serious disruption of a business or possible unrecoverable loss of revenue!!

Lifeforce One International[email_address] 10. Prevention & Mitigation (Step #3)

  • Physical
    • Access
    • Authorization
    • Waste management
  • Operational
    • Need to Know policies
    • Security policies for vendors
    • Marketing personnel
  • Personnel
    • Diligent vetting processes
    • HR and Security Partnership
    • Marketing personnel
  • Technical

Lifeforce One International[email_address] 11. In Summary

  • When it comes to corporate espionage and the potential financial loss, remember the best defence is a well planned offence!

Lifeforce One International[email_address] 12. Corporate Espionage Bullet-proofing your business in the information age!

  • THANK YOU!

Lifeforce One International[email_address] 13. Corporate Espionage Bullet-proofing your business in the information age! Lifeforce One International[email_address]