Book description
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.
- It’s Not “Someone Else’s Problem: Your Enterprise is at Risk Identify the dangers associated with intellectual property theft and economic espionage
- The Threat Comes from Many Sources Describes the types of attackers, threat vectors, and modes of attack
- The Threat is Real Explore case studies of real-world incidents in stark relief
- How to Defend Your Enterprise Identify all aspects of a comprehensive program to tackle such threats and risks
- How to Deliver the Message: Awareness and Education Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright page
- Authors
- Introduction
-
Part 1: The Challenge
- Introduction
- Chapter 1: The Tale of the Targeted Trojan
- Chapter 2: When Insiders and/or Competitors Target a Business’s Intellectual Property
- Chapter 3: When State Entities Target a Business’s Intellectual Property
- Chapter 4: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property
- Chapter 5: Virtual Roundtable on Intellectual Property and Economic Espionage
-
Part 2: The Strategy
- Introduction
- Chapter 6: Elements of a Holistic Program
- Chapter 7: Case Study: Cisco’s Award-Winning Awareness Program
- Chapter 8: Case Study: A Bold New Approach in Awareness and Education Meets an Ignoble Fate
- Chapter 9: Case Study: The Mysterious Social Engineering Attacks on Entity Y
- Chapter 10: Personnel Security
- Chapter 11: Physical Security: The “Duh” Factor
- Chapter 12: Information Security
- Chapter 13: The Intelligent Approach
- Chapter 14: Protecting Intellectual Property in a Crisis Situation
- Chapter 15: How to Sell Your Intellectual Property Protection Program
- Chapter 16: Conclusion
- Appendix A: Baseline Controls for Information Security Mapped to ISO
- Appendix B: Leveraging Your Tax Dollar
- Appendix C: Notes on Cyber Forensics
- Appendix D: U.S. International Trade Commission Section 337 Process
- Appendix E: U.S. Trade Representative’s 2007 Special 301 Watch List
-
Appendix F: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
- Background and Contact Information
- Description of the Trade Secret:
- General Physical Measures Taken to Protect the Trade Secret
- Confidentiality and Non-Disclosure Agreements
- Computer-Stored Trade Secrets
- Document Control
- Employee Controls
- Description of the Theft of Trade Secret
- Civil Enforcement Proceedings
- Index
Product information
- Title: Secrets Stolen, Fortunes Lost
- Author(s):
- Release date: August 2011
- Publisher(s): Syngress
- ISBN: 9780080558806
You might also like
book
Business Innovation from Israel's Masters of Espionage
When you're outgunned, when you're outnumbered 100 to 1, you have two choices: innovate and improvise. …
book
Trade Secret Theft, Industrial Espionage, and the China Threat
This book provides an overview of economic espionage as practiced by a range of nations from …
book
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by …
book
Protecting Your Business’ Intellectual Property: Patents, Trademarks, Copyrights, and Trade Secrets
This Element is an excerpt from The Truth About Starting a Business (9780137144501), by Bruce R. …