O'Reilly logo

Business Espionage by Bruce Wimmer, CPP

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

11

Comprehensive Countermeasures

Abstract

This chapter is an attempt to avoid the problem of dividing physical/personnel security and technical and IT security into distinct organizational divided silos. While chapters 8 and 9 addressed these threats separately, this chapter explains why each organization much ensure that these two security elements work together, cooperate and function as a team, perhaps under a chief security officers (CSO) function.

Key words

electronic eavesdropping

social engineering

Technical Surveillance Countermeasures (TSCM)

espionage

spying

business espionage

IT security

physical security

personnel security

Human Resources

Contracting/Procurement

and Facilities

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required