BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to...
Transcript of BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to...
![Page 1: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/1.jpg)
1
B U S I N E S S E S P I O N A G E T H R EAT S A N D C O M P R E H E N S I V E , OV E R L A P P I N G M U LT I D I M E N S I O N A L C O U N T E R M EA S U R E S
B R U C E W I M M E R , C P P ; B I L L S C H E N K E L B E R G ; A R T L E S S E R
![Page 2: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/2.jpg)
2W H O …
Bruce Wimmer, CPP, G4S CRS = Human Threats/Countermeasures
Bill Schenkelberg, Wapack Labs = Cyber Threats (IT)/Countermeasures
Art Lesser, Merit Security = Technical Threats/Countermeasures
![Page 3: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/3.jpg)
3
HUMAN AND TRADITIONAL THREATS
![Page 4: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/4.jpg)
4HUMAN THREATS – Modus Operandi:
HUMAN THREATS – Modus Operandi :
• Hiring away or recruiting selected employees (in place) who take info with them[cyber]
• Some employees leave to form new business [technical devices left behind or cyber]
• Planting spies as employees or contractors inside the target business (insider ‘plants’)
• Breaking into business areas to steal information/items (sometimes misunderstood as theft of items for resale value)
• In-person or telephonic social engineering to gain access to facilities (and hence information) or to obtain information even if only to use it to better socially engineer later
• Trash cover and document theft
![Page 5: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/5.jpg)
5
HUMAN THREATS – Modus Operandi (continued):
• Stealing/removing things (including samples, prototypes, laptops, removable drives, printer/copier drives) [cyber and technical]
• Social Engineering or Piggy-Backing into company to place listening devices/transmitters [technical]
• Insiders (employees, contractors [cleaners, security, etc]) exploiting and/or expanding access to sensitive business related information or planting devices in offices or meeting rooms or using existing electronic equipment [technical]
• Breaking into/manipulating locks to allow access to server rooms, telephone closets, etc. to make monitoring possible [technical and cyber]
• Social Engineering or Insiders getting into server rooms, telephone closets and manipulating printer/copiers [cyber and technical]
![Page 6: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/6.jpg)
6
HUMAN THREATS – Modus Operandi (continued):
• Travel to high threat countries (hotel rooms, client or partner/local offices) [technical and cyber] = My “DIRTY DOZEN” list of countries (PR China, Russia, Japan, South Korea, Cuba, France, Israel, Taiwan, Vietnam, India, Venezuela and Brazil)
• Eavesdropping by human ear in a room, lounge, restaurant aircraft or vehicle [technical too]
• Going on facility tours or attending functions at a facility and observing or “wandering” around
• Using overt or covert cameras and photographing equipment, processes, notes, presentations, etc. [technical]
![Page 7: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/7.jpg)
7
CYBER/IT THREATS
![Page 8: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/8.jpg)
8T O P C Y B E R
T H R E AT S
Phishing Attacks
![Page 9: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/9.jpg)
9
9https://pentagontours.osd.mil/Tours/
![Page 10: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/10.jpg)
10
10
Insider Threat
![Page 11: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/11.jpg)
11
11
Denial of Service (DDoS)
![Page 12: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/12.jpg)
12
12
Malware
![Page 13: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/13.jpg)
13
13
Weak Credentials
BetaNews.com
![Page 14: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/14.jpg)
14
TECHNICAL THREATS
![Page 15: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/15.jpg)
15
TSCM?
Electronic Countermeasures
Bug Sweeps
What Is
What you don’t know You don’t know
And it can hurt you
![Page 16: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/16.jpg)
16
Threats (Vulnerabilities)
RF Analysis
Telecommunications Devices and Wiring
Non-RF (Tape Recorder)
Sensitive Documentation (CDP)
Wireless Analysis
IoT
![Page 17: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/17.jpg)
17
Privacy &
Confidentiality
Safeguarding
Who is vulnerable?
Why are they vulnerable?
What can be compromised?
![Page 18: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/18.jpg)
18
Aspects of TSCM
Radio Frequency (RF) Devices
Telecommunication
Non-RF Devices
Documents/Clean Desk Policy (CDP)
Wireless Analysis
Internet of Things (IoT)
![Page 19: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/19.jpg)
19
Specific Threats
![Page 20: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/20.jpg)
20
R.F. DEVICES
![Page 21: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/21.jpg)
21
R.F. DEVICES
![Page 22: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/22.jpg)
22
Non R.F. Devices
Bugs or Planted Recording Devices(Do not emit R.F.)
![Page 23: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/23.jpg)
23
Telecommunications
Eavesdropping using telephone lines/devices
CAT Cables - 8 - Wire
Phones have 2 microphones and 2 speakers
![Page 24: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/24.jpg)
24
How do we protect ourselves from all these Threats?
COUNTERMEASURES
![Page 25: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/25.jpg)
25
HUMAN COUNTERMEASURES
![Page 26: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/26.jpg)
26
HUMAN THREAT COUNTERMEASURES
• Background screening (pre-employment and on-going/updated); thorough due diligence for all suppliers, partners and contractors (know who you are dealing with and who they deal with or who really owns them) – Do NOT hire or partner with problems!
• Legal agreements for staff and contractors (non-compete, non-disclosure, etc.)
• Termination/resignation protocols including review of legal agreements when someone leaves
• Employee education and awareness training; including specialized training for reception area staff, sales, staff who organize/arrange and attend meetings, travelers and senior management
• Employee reporting methods/requirements (hotlines, etc.); encourage reporting!
![Page 27: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/27.jpg)
27
HUMAN THREAT COUNTERMEASURES (continued)
• Challenging/reporting of individuals who are in controlled areas without displaying a badge; leadership sets the example and standard
•Document destruction that includes cross-cut pulverizing; destruction by a third-party should be on-site, witnessed/monitored
• Spot checks of open trash
• Tiger/Red Team testing; hold people accountable
• Limiting tours or unescorted time in a facility or office
![Page 28: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/28.jpg)
28
HUMAN THREAT COUNTERMEASURES (continued)
• Need-to-know information controls and determination of “highest consequence” information and equipment
• Identified and clearly marked/identified sensitive information ; clearly delineated, marked and labeled with levels of “classification”
•Access controls/locks (including offices) and openly displayed identification badges; internal area Intrusion Detection Systems
• Escort and “no lone” zone programs
• Clean desk program; no documents left on common printer or copier; locked offices, desks and storage
• Travel security program that includes business espionage Threats and Countermeasures education and awareness
![Page 29: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/29.jpg)
29
CYBER COUNTERMEASURES
![Page 30: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/30.jpg)
30W H AT T O D O - P H I S H I N G
•Understand that Phishing remains a top threat to networks. Senior management or privileged account owners are often the target of spear-phishing attacks.Look for spoofed email addresses and suspicious links. Know your supply chain.
Understand
Set continuing threat/vulnerability training and education. Once is not enough. If applicable and reasonable, use advanced anti-phishing software
Set
Make sure all IT personnel are watching for phishing attacks and how employees respond to the attacks. Vet the use of cell phone integration with the company network.
Vet
Perform Red Team tests; not to embarrass, but for awareness.Perform
Robotics in supply chain
![Page 31: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/31.jpg)
31W H AT T O D O – I N S I D E R T H R E AT S
•Understand that “insider threats” are real and one of the most difficult to detect.
Understand
Set strict parameters for network access. Based on the “need to know” principal.
Set
HR must work with C-Suite and HR to mitigate potential insider threats.Vet
Perform HR audits to spot potential insider threats. i.e.: Routine Background checks.
Perform
Robotics in supply chain
![Page 32: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/32.jpg)
32W H AT T O D O – D D O S
•DDoS attacks - non-standard use of old vulnerabilities, new botnets, cryptocurrencies madness, high-profile DDoS attack (or not) with a political subtext, & activism/hacktivism.
Understand
Set dedicated IT personnel to monitor the network for signs of intrusion and infection. Keep networks separated to avoid lateral movement.
Set
Develop strict prevention and mitigation strategies (NIST standards)Vet
Perform monitoring or outsource to a security company SOC.Perform
Robotics in supply chain
![Page 33: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/33.jpg)
33W H AT T O D O – M A LWA R E
•Understand that malware infection is on the rise and getting worse. Understand
Set solid anti-virus programs and daily updates. Set
Vet the anti-virus apps before and during use. Take heed to the warnings.Vet
Perform updates and develop a Blacklist inclusion program.Perform
Robotics in supply chain
![Page 34: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/34.jpg)
34W H A T T O D O – W E A K P A S S W O R D S
•People are creatures of habit and seek simple processes (and solutions). Understand
Set programs to force proper password usage. Deny easy passwords. Make employees change passwords often. 2 party authentication.
Set
Vet habitual users who have password issues (unintended insider threat).Vet
Perform monitoring to detect password altercations.Perform
Robotics in supply chain
![Page 35: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/35.jpg)
35
TECHNICAL COUNTERMEASURES
![Page 36: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/36.jpg)
36
Counter Measures and
Detection MethodsR.F. Devices
Non R.F. Devices
Telecommunications Devices and Wiring
CDP
© 2018 Private and Confidential, Merit Security
![Page 37: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/37.jpg)
37
Audit
© 2018 Private and Confidential, Merit Security
![Page 38: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/38.jpg)
38
R.F. DETECTOR
DEVICES
![Page 39: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/39.jpg)
39
NonR.F. DetectionHidden or Dormant Devices
Non Linear Junction Detectors
![Page 40: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/40.jpg)
40Telecommunications
Detection
Telephone Line Detector and Analyzer
Low Voltage Wiring
![Page 41: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/41.jpg)
41
Electronic Inspection
![Page 42: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/42.jpg)
42
© 2018 Private and Confidential, Merit Security
Clean Desk
Policy
Sensitive documents, CDP
Passwords under keyboard
Tape recorder under desk
Thumb drives
Peripheral storage devices
![Page 43: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/43.jpg)
43
© 2018 Private and Confidential, Merit Security
Physical
InspectionMiscellaneous devices not found by electronic means
![Page 44: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/44.jpg)
44
SUMMARYRadio Frequency Devices
Very Low Frequency Devices
Telecommunications and Wiring
CDP
Physical
![Page 45: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/45.jpg)
45
THREATS/COUNTERMEASURES
• Real-World Case Example - where it all came together!
• Global Company
• Guarding and physical security -- Insider
• Cyber Security
• Technical
• Value of a Risk Assessment and Education/AwarnessTraining
![Page 46: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/46.jpg)
46
THREATS/COUNTERMEASURES
• There are, in fact, numerous Threats and, hence,
Countermeasures that overlap and do not fit exclusively into a single Human, Cyber or Technical silo.
• The best way to counter Business Espionage is a comprehensive and multidimensional program that includes Human, Technical and Cyber Countermeasures.
![Page 47: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/47.jpg)
47THREATS/COUNTERMEASURES
Ancient African Proverb:
“If you want to go fast, go alone. If you want to go far, slow down and go together."
![Page 48: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/48.jpg)
48
Thank you!QUESTIONS??
![Page 49: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing](https://reader034.fdocuments.net/reader034/viewer/2022050421/5f902c1877721d556862f4f8/html5/thumbnails/49.jpg)
49
BRUCE WIMMER, CPP
Senior Director
G4S Corporate Risk Services
Email: [email protected]
Mobile: 352 238-0392