The Loss of Intellectual Property in
the Digital Age:
What Companies can do to Protect
Themselves
Christopher Kranich
The Digital Revolution
• People are now more connected
– More information in less time
– More often
– Greater distances
– Many security challenges for business
Cyber-based Threats to IP
• Sources evolving and growing rapidly
– Competitors
– Malicious employees
– Well intentioned employees
– Criminal groups
– Hacktivists
– Foreign governments
IP is Valuable
• Cost to design new projects or services
– Engineers
– Designers
• Cost to manufacture
– Proprietary processes
– Material sourcing
– Pricing information
• Marketing costs
New Work Locations
• From home
• On The road
• Businesses/public places
• Security
– More chances for deletion, theft of compromise
• WiFi networks
• Device theft of damage
• Over the Shoulder
• Co-mingling of the personal and the private
Types of Devices
• Laptops
• Theft, Over-the-shoulder, WiFi
• Smart Phones
• Theft, WiFi, unpatched
• Tablets
• Theft, WiFi, unpatched
• Desktops
• Not updated, no virus protections
More Data
• Large capacity
• Smaller storage medium
• Cheap
• More cloud-based storage
• User can download a large amount of IP
quickly
• Malicious or innocent intentions
Reasons IP is Compromised
• Innocent Reasons
– Work outside of office
– Curiosity
– Recovered IP
• Malicious Reasons
– Do not like job
– Sell IP for profit
– Hacktivism
– For fun
Employee Views of IP
• Attribute ownership to the person who
created it
• Cheap, easily moved, copied, and manipulated
• Okay to take with them to their next job
Symantec Report
VW vs. GM
• Executives took 1000’s of pages
• Photocopied in physical from
– Secretary
– Other Witnesses
• Carried out in boxes of briefcases
• Lots of witnesses to IP removal
• 100 million Dollar settlement
Starwood vs. Hilton
• Over 100,000 files stolen
– Starwood luxury concept
• Hilton came up with their own version
– Board presentations
– Market research studies
– Valued at 1 million Dollars
• Downloaded to laptop
– Easy to steal data
– Quick, behind closed doors, portable
What Companies Can Do To Protect Themselves
Encrypt Data
• VPN
• Full-disk encryption
• USB sticks
• Emails and attachments
Mobile Device Management
• Common for employees to bring their own
device (BYOD)
• Poses many security challenges
– Corporate data vulnerable to theft, damage, or
deletion
– Hard to keep track of
– Corporate data and personal data on same device
Software Solutions
• MobileNow
• MobileIron
• Zenprise
• IBM
• Symantec
• Airwatch
Customizable Device Policies
• Control which device features and built-in
apps can be used
• Specify what the authentication requirements
are
• Apply specific policy sets to specific groups of
users
– Time, roles, types of data, location
Jailbroken or Rooted Devices
• Pose a big security risk
– Unstable or not updated
• Detect these devices
• Enforce greater controls for them
– Lock or wipe
– Ban from network
– Approved apps
– Vpn
– Device kept up-to-date
Centralized Updating
• Update OS and apps remotely
– Convenient and easy
• All devices patched at the same time
– All devices on same footing
– Eliminates specific vulnerabilities
Applications
• App blacklisting
• Block and revoke any apps from any user
• Track usage
• App-to-app encryption
Email Features
• Ability to encrypt attachments
• Prevent unauthorized copying and forwarding
• Restrict sharing of attachments to certain apps
• Specify attachment file types to encrypt
Data Storage
• Storage all data in a home directory
– Persisitent and centralized location
– Easy to set up automatic backups
– Easy to selectively distribute data
– Easy to track data and wipe if neccesary
– Can have multiple clients
• Different platforms accessing the same directory
Data Access Restrictions
• Geofencing
– Data only accessible in certain locations
– Prevents data from being accessed off site or an
area of the office
• Time-Based
– Data only accessible at certain times
• When employees are working
• When a project is active
Remote Lock, Locate, and Wipe
• Lost or stolen
• Infected with malware
• User leaves company
Data Leakage Prevention
• Deep content inspection
• Reads data to find high value IP
• Does not prevent attacks
• Limits accidental deletion or moving
Data Leakage Prevention
• System figures out sensitive data on it’s own
• Logs moving, copying, and deleting
• Prevents user from emailing data out by
making it read only
• Requires fine tuning
Attribute-Based Access Control
• Grants access based on attributes
– Location
– Authentication method
– Deviation from the norm
– Type of data
– Time of access
Cloud Storage Solutions
• Data integrity
• Access is controlled
• Data must be available when needed
Cloud Storage Solutions
• Policy for backing up data
• Data is encrypted in storage
• Data is sent to facility securely
• Data is backed up regularly
• Data is kept in multiple locations
Employee Training
• Protect credentials
• Good passwords or passphrases
• Social engineering
• Alerting IT
Basic Security Principles
• Log activities
• Set up alerts
• Use IDS system
• Set up firewalls on internet connections
• Control physical access
Basic Security Principles
• Set up user accounts
• Give users their own account
• Provide the minimum amount of access
needed
Questions and Comments

More Related Content

PPTX
gkkwqdqqndqw2121234Security essentials domain 4
PPTX
Cybertopic_2security
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PPTX
DCD Converged Brazil 2016
PPTX
10 Quick Cybersecurity Wins for Small Business
PDF
Shadow it risks & control managing the unknown unknowns in the deep &...
PPTX
CISSP - Chapter 3 - Physical security
gkkwqdqqndqw2121234Security essentials domain 4
Cybertopic_2security
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
DCD Converged Brazil 2016
10 Quick Cybersecurity Wins for Small Business
Shadow it risks & control managing the unknown unknowns in the deep &...
CISSP - Chapter 3 - Physical security

What's hot (18)

PPTX
Benefits of IT Outsourcing
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PDF
1. Security and Risk Management
PDF
3. Security Engineering
PDF
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
PDF
3. Security Engineering
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PDF
Proprietary Information
PDF
CISSP Prep: Ch 4. Security Engineering (Part 1)
PDF
CISSP Prep: Ch 6. Identity and Access Management
PPTX
Solving Document Security
PPTX
Farfield systems caoabilities feb 2013
PDF
Lecture 6 internet services in network
PDF
Small Business Guide to Information Security
PPTX
Essential Layers of IBM i Security Series – Network Security
PPTX
Identity-Based Privacy (IBP)
PDF
CNIT 125 7. Security Assessment and Testing
PDF
Andy Blumenthal Talks About Mobility Solutions
Benefits of IT Outsourcing
CNIT 125: Ch 2. Security and Risk Management (Part 2)
1. Security and Risk Management
3. Security Engineering
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
3. Security Engineering
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Proprietary Information
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 6. Identity and Access Management
Solving Document Security
Farfield systems caoabilities feb 2013
Lecture 6 internet services in network
Small Business Guide to Information Security
Essential Layers of IBM i Security Series – Network Security
Identity-Based Privacy (IBP)
CNIT 125 7. Security Assessment and Testing
Andy Blumenthal Talks About Mobility Solutions
Ad

Viewers also liked (17)

PPTX
Intellectual Property Rights
PPTX
badgediva.com
PPT
Sorting searching
PPT
Veranderdiagnose (een samenvatting)
PPT
Identifing And Controlling Intellectual Property Loss Exposures
PPTX
Type of data @ Web Mining Discussion
DOC
Factors Influencing Knowledge Management
PPTX
Purpose-Driven Organizations: a Conceptual Model
PPTX
Trends that will influence the future of knowledge work
PPT
Impact of digital technology on intellectual property
PDF
Web mining slides
PPTX
Intellectual Property Rights In India: Patents Trademarks And Copyrights
PPTX
Intellectual Property Rights (IPR)
PPT
Web Mining
PPTX
Intellectual Property 101
PPT
Data mining slides
 
PPTX
Knowledge management
Intellectual Property Rights
badgediva.com
Sorting searching
Veranderdiagnose (een samenvatting)
Identifing And Controlling Intellectual Property Loss Exposures
Type of data @ Web Mining Discussion
Factors Influencing Knowledge Management
Purpose-Driven Organizations: a Conceptual Model
Trends that will influence the future of knowledge work
Impact of digital technology on intellectual property
Web mining slides
Intellectual Property Rights In India: Patents Trademarks And Copyrights
Intellectual Property Rights (IPR)
Web Mining
Intellectual Property 101
Data mining slides
 
Knowledge management
Ad

Similar to The Loss of Intellectual Property in the Digital Age: What Companies can d… (20)

DOCX
Protecting Intellectual Property in the Age of WikiLeaks
PDF
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PPTX
It security the condensed version
PPTX
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
PPTX
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PPTX
Implementing security for your library | PLAN Tech Day Conference
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
PPT
Network Security, Change Control, Outsourcing
PDF
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
PDF
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
PDF
IT Security Presentation - IIMC 2014 Conference
PPT
Network security, change control, outsourcing
PDF
Data security in cloud
PPTX
cyber security
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PDF
Fall2015SecurityShow
Protecting Intellectual Property in the Age of WikiLeaks
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
PCTY 2012, IBM Security and Strategy v. Fabio Panada
It security the condensed version
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Implementing security for your library | PLAN Tech Day Conference
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs
Network Security, Change Control, Outsourcing
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
IT Security Presentation - IIMC 2014 Conference
Network security, change control, outsourcing
Data security in cloud
cyber security
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Fall2015SecurityShow

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPT
Geologic Time for studying geology for geologist
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
WOOl fibre morphology and structure.pdf for textiles
DOCX
search engine optimization ppt fir known well about this
PDF
Five Habits of High-Impact Board Members
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
What is a Computer? Input Devices /output devices
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Chapter 5: Probability Theory and Statistics
The various Industrial Revolutions .pptx
A review of recent deep learning applications in wood surface defect identifi...
Geologic Time for studying geology for geologist
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A comparative study of natural language inference in Swahili using monolingua...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
observCloud-Native Containerability and monitoring.pptx
Zenith AI: Advanced Artificial Intelligence
CloudStack 4.21: First Look Webinar slides
Benefits of Physical activity for teenagers.pptx
Assigned Numbers - 2025 - Bluetooth® Document
WOOl fibre morphology and structure.pdf for textiles
search engine optimization ppt fir known well about this
Five Habits of High-Impact Board Members
Developing a website for English-speaking practice to English as a foreign la...
What is a Computer? Input Devices /output devices
Module 1.ppt Iot fundamentals and Architecture
1 - Historical Antecedents, Social Consideration.pdf
A novel scalable deep ensemble learning framework for big data classification...
Chapter 5: Probability Theory and Statistics

The Loss of Intellectual Property in the Digital Age: What Companies can d…

  • 1. The Loss of Intellectual Property in the Digital Age: What Companies can do to Protect Themselves Christopher Kranich
  • 2. The Digital Revolution • People are now more connected – More information in less time – More often – Greater distances – Many security challenges for business
  • 3. Cyber-based Threats to IP • Sources evolving and growing rapidly – Competitors – Malicious employees – Well intentioned employees – Criminal groups – Hacktivists – Foreign governments
  • 4. IP is Valuable • Cost to design new projects or services – Engineers – Designers • Cost to manufacture – Proprietary processes – Material sourcing – Pricing information • Marketing costs
  • 5. New Work Locations • From home • On The road • Businesses/public places • Security – More chances for deletion, theft of compromise • WiFi networks • Device theft of damage • Over the Shoulder • Co-mingling of the personal and the private
  • 6. Types of Devices • Laptops • Theft, Over-the-shoulder, WiFi • Smart Phones • Theft, WiFi, unpatched • Tablets • Theft, WiFi, unpatched • Desktops • Not updated, no virus protections
  • 7. More Data • Large capacity • Smaller storage medium • Cheap • More cloud-based storage • User can download a large amount of IP quickly • Malicious or innocent intentions
  • 8. Reasons IP is Compromised • Innocent Reasons – Work outside of office – Curiosity – Recovered IP • Malicious Reasons – Do not like job – Sell IP for profit – Hacktivism – For fun
  • 9. Employee Views of IP • Attribute ownership to the person who created it • Cheap, easily moved, copied, and manipulated • Okay to take with them to their next job Symantec Report
  • 10. VW vs. GM • Executives took 1000’s of pages • Photocopied in physical from – Secretary – Other Witnesses • Carried out in boxes of briefcases • Lots of witnesses to IP removal • 100 million Dollar settlement
  • 11. Starwood vs. Hilton • Over 100,000 files stolen – Starwood luxury concept • Hilton came up with their own version – Board presentations – Market research studies – Valued at 1 million Dollars • Downloaded to laptop – Easy to steal data – Quick, behind closed doors, portable
  • 12. What Companies Can Do To Protect Themselves
  • 13. Encrypt Data • VPN • Full-disk encryption • USB sticks • Emails and attachments
  • 14. Mobile Device Management • Common for employees to bring their own device (BYOD) • Poses many security challenges – Corporate data vulnerable to theft, damage, or deletion – Hard to keep track of – Corporate data and personal data on same device
  • 15. Software Solutions • MobileNow • MobileIron • Zenprise • IBM • Symantec • Airwatch
  • 16. Customizable Device Policies • Control which device features and built-in apps can be used • Specify what the authentication requirements are • Apply specific policy sets to specific groups of users – Time, roles, types of data, location
  • 17. Jailbroken or Rooted Devices • Pose a big security risk – Unstable or not updated • Detect these devices • Enforce greater controls for them – Lock or wipe – Ban from network – Approved apps – Vpn – Device kept up-to-date
  • 18. Centralized Updating • Update OS and apps remotely – Convenient and easy • All devices patched at the same time – All devices on same footing – Eliminates specific vulnerabilities
  • 19. Applications • App blacklisting • Block and revoke any apps from any user • Track usage • App-to-app encryption
  • 20. Email Features • Ability to encrypt attachments • Prevent unauthorized copying and forwarding • Restrict sharing of attachments to certain apps • Specify attachment file types to encrypt
  • 21. Data Storage • Storage all data in a home directory – Persisitent and centralized location – Easy to set up automatic backups – Easy to selectively distribute data – Easy to track data and wipe if neccesary – Can have multiple clients • Different platforms accessing the same directory
  • 22. Data Access Restrictions • Geofencing – Data only accessible in certain locations – Prevents data from being accessed off site or an area of the office • Time-Based – Data only accessible at certain times • When employees are working • When a project is active
  • 23. Remote Lock, Locate, and Wipe • Lost or stolen • Infected with malware • User leaves company
  • 24. Data Leakage Prevention • Deep content inspection • Reads data to find high value IP • Does not prevent attacks • Limits accidental deletion or moving
  • 25. Data Leakage Prevention • System figures out sensitive data on it’s own • Logs moving, copying, and deleting • Prevents user from emailing data out by making it read only • Requires fine tuning
  • 26. Attribute-Based Access Control • Grants access based on attributes – Location – Authentication method – Deviation from the norm – Type of data – Time of access
  • 27. Cloud Storage Solutions • Data integrity • Access is controlled • Data must be available when needed
  • 28. Cloud Storage Solutions • Policy for backing up data • Data is encrypted in storage • Data is sent to facility securely • Data is backed up regularly • Data is kept in multiple locations
  • 29. Employee Training • Protect credentials • Good passwords or passphrases • Social engineering • Alerting IT
  • 30. Basic Security Principles • Log activities • Set up alerts • Use IDS system • Set up firewalls on internet connections • Control physical access
  • 31. Basic Security Principles • Set up user accounts • Give users their own account • Provide the minimum amount of access needed