Information Protection and the Four Elements of Business Espionage PowerPoint PPT Presentation

presentation player overlay
1 / 21
About This Presentation
Transcript and Presenter's Notes

Title: Information Protection and the Four Elements of Business Espionage


1
(No Transcript)
2
Information Protection and theFour Elements of
Business Espionage
  • Justin King

3
Introduction
  • Business espionage what is it?
  • Who is doing it?
  • What are they after?
  • How do they do it?
  • Four elements of business espionage
  • Pretext attacks
  • Technical surveillance
  • Computer abuse
  • Undercover attacks
  • The way forward
  • Questions

4
Business Espionage what is it?
  • Economic, Industrial or Business?
  • Competitive intelligence or spying?
  • Illegal or just unethical?

5
Who is doing it?
  • Government intelligence agencies
  • Commercial attack teams
  • Private investigators
  • Opportunist / disgruntled employee

6
In The Press
  • Canadian Business
  • 13 February 2005

7
What are they after?
  • Gain competitive information
  • Pricing
  • New product development
  • Company strategy
  • Client base

8
What are they after?
Information gathered for the German Federal
Government
9
What are they after?
  • Gain competitive information
  • Pricing
  • New product development
  • Company strategy
  • Client base
  • Expose fraud
  • Blackmail
  • Kidnap and ransom
  • Denial of service (DoS)

10
How do they do it?
How do they do it?
  • Pretext attacks
  • Technical surveillance
  • Computer abuse
  • Undercover attacks

11
Pretext Attacks
  • What are pretext attacks?
  • The Delphi technique
  • Early warning signs
  • Information sourced

12
Technical Security
  • What is technical surveillance?
  • Equipment
  • Spy shop toys?
  • Commercial, expensive, bespoke
  • Burst transmission and frequency hopping
  • Encrypted
  • Snuggle bugs
  • Mobile phones
  • Infinity systems
  • Lasers
  • Information sourced
  • Limitations

13
Computer Abuse
  • What is computer abuse?
  • Computer thefts a cover for espionage?
  • Is it a problem or a tactic to sell security
    products?
  • How much is your laptop worth?
  • Early warning signs
  • Remote usage
  • Information sourced

14
Undercover Attacks
  • What is an undercover attack?
  • In-house and out-house
  • Attacks of a thousand cuts
  • False flags
  • The spy entrepreneur
  • Information sourced

15
The Way Forward
  • Management function
  • Information security risk assessment
  • Controls and countermeasures
  • Implementation
  • Training
  • Monitoring
  • The future of business espionage

16
Statistics
17
Priority of Infosec to UK Businesses top
Management or Director Groups
18
What proportion of UK Businesses had a Security
Incident last year?
19
What type of Security Breach did UK Businesses
Suffer?
20
Summary
  • Information is power
  • This is nothing new
  • There are countermeasures available

21
Questions
  • Justin King
  • 44 (0)20 7323 6630
  • jk_at_c2i-international.com
Write a Comment
User Comments (0)
About PowerShow.com