Proactive Counter Espionage as a Part of Business Continuity and Resiliency

  • Network defenses such as firewalls, defense in depth approaches, intrusion detection systems and others.
  • Data defenses are set up for its encryption, classification and destruction, as well as policies for data when it is in use, motion and at rest, not to mention data loss prevention plans.
  • Malware defenses including anti-virus, spam filters and email filters.
  1. Information: Tangible and intangible information. Internal knowledge of organizational structure and operations. Trade Secrets. Business intentions.
  2. Access: To data, networks, servers, people, proprietary ideas, trade secrets, money, internal strategy and intent.
  3. Intellect: Innovative ideas (past, present and future), insight and perspective. Intellectual capacity and capability. Motivation and aspiration.

--

--

--

Experimenter | Strategy & Innovation | Emerging Tech | National Security | Wellness Advocate | Story-telling Fashion | Art #ArtAboutAI → www.Lkcyber.com

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Why OAuth2 ?

Announcement on the violated Production of Brave Tokens

How hard is it to hack someone’s cell phone if you just know their phone number?

APIS Pay Open beta Service launching

Proxies vs VPN — Are They Really That Different

I am sending you 1π!

NFT Crypto | Aspenlabs.io

Spark Hackathon: Nucypher Technical Introduction

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Dr. Lydia Kostopoulos

Dr. Lydia Kostopoulos

Experimenter | Strategy & Innovation | Emerging Tech | National Security | Wellness Advocate | Story-telling Fashion | Art #ArtAboutAI → www.Lkcyber.com

More from Medium

Traffic Control Policies

Mini Virtual Lab with OSSIM & OSSEC

What Does Sustainability mean for Banking & Financial Services Institutions and how Artificial…

Task 14 Final task