Book description
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected.
Drawn from the author’s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage.
- Shows how to identify a company’s threats, weaknesses, and most critical assets
- Provides proven and practical countermeasures that any business can employ to protect their most sensitive assets from both internal and external threats
- Uses real-life case studies and examples to help the reader understand how to apply the tactics discussed
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Author Biography
- Introduction
- Part 1: Understanding the Problem of Business Espionage
-
Part 2: Business Espionage Countermeasures
- 8: Protecting Your Most Critical Resources
-
9: Physical and Personnel Security Countermeasures
- Abstract
- Introduction
- Business Espionage Security Awareness Training
- Business Espionage Reporting Program
- Travel Security Program that Includes Business Espionage Threat
- Clear, Demonstrated Senior Leadership Support
- Identifying and Properly Classifying Sensitive Information
- Conduct a Holistic Risk Assessment
- Access controls
- Control of Office Machines
- Use of Tiger and Red Team Testing
- Non-Disclosure, Non-Compete, and Other Legal Agreements
- Limiting Where/How Company Information Can Be Worked On or Discussed
- Develop Special Measures for Marketing and Sales Staff
- Liaise with Counterespionage Government Agencies
- Offensive Counterespionage
- Summary
- 10: Technical Electronic and Computer Countermeasures
- 11: Comprehensive Countermeasures
- Conclusion
- Index
Product information
- Title: Business Espionage
- Author(s):
- Release date: March 2015
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780124200593
You might also like
book
Metasploit
"The best guide to the Metasploit Framework." ? HD Moore, Founder of the Metasploit Project The …
book
Learn Windows PowerShell in a Month of Lunches, Third Edition
Learn Windows PowerShell in a Month of Lunches, Third Edition is an innovative tutorial designed for …
book
Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set
The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection …
book
Software Engineering at Google
Today, software engineers need to know not only how to program effectively but also how to …