Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

Buy
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign
competitors. Every time they went to release a new product (in this case a new
drug), one of their competitors would release a similar drug with a similar name several
weeks before them and would beat them to market. If you understand the drug
industry, you’ll know that this is a serious problem.The first company to get a
product to market usually is able to obtain a higher market share and higher demand
than its competitors.Therefore, this represented a huge monetary loss to the company
and the executives were concerned.

This initially sounded like a potential problem but I needed more details. My
follow-up question was how often had this occurred and over what time period.The
executive I was talking with said it had happened eight times over the prior 12
months. I was sitting there thinking:You think there is a problem? My next question
was,“Why did you wait so long to call someone?”Their answer was,“We figured it
was just a coincidence, because the only way this could have happened was if an
insider was giving the information to a competitor and we trust all of the employees
so this could not be the case.” Over the next several months they were going to
realize how wrong that previous statement was.

I led an internal assessment team and over the course of several months found
three different groups of people (each consisting of 2-4 people), working for two
different competitors. Actually, one group was working for a foreign competitor and
the other two groups were working for a foreign government.
The fact that this story is true is scary, but what makes it even more troubling is
that this happened more than 18 months ago and I have worked on and am aware of
at least 15 other similar cases.The average monetary loss of the case I worked on was
estimated at $350 million annually.
(HTML tags aren't allowed.)

Digital Wedding Photography For Dummies
Digital Wedding Photography For Dummies

Expert advice on becoming a successful wedding photographer

Wedding photography can be a great hobby or home-based business. But while it's an exciting and lucrative field, it also has its challenges.

Now, you can turn to Digital Wedding Photography For Dummies for friendly, hands-on guidance on...

Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu

This book constitutes the refereed proceedings of the 6th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2011, held in Chengdu, China, in August 2011. The 26 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers address all...

Wireless Programming with J2ME: Cracking the Code (With CD-ROM)
Wireless Programming with J2ME: Cracking the Code (With CD-ROM)
Part of the new Cracking the Code Series, Wireless Programming with J2ME provides a look at the code behind wireless Java applications.

Think of J2ME as a tiny version of Java specifically for mobile devices -- perfect for bringing powerful, robust applications to mobile phone, pagers, PDAs, and other handhelds. Writing applications...


Bioinformatics: Tools and Applications
Bioinformatics: Tools and Applications
Biology has progressed tremendously in the last decade due in part to the increased automation in the generation of data from sequences to genotypes to phenotypes. Biology is now very much an information science, and bioinformatics provides the means to connect biological data to hypotheses. Within this volume, we have collated...
Sukhoi Su-27: Famous Russian Aircraft
Sukhoi Su-27: Famous Russian Aircraft
In the late 1960s, the Soviet Union became aware that the U.S. was developing a new generation of jet fighters that had an exceptional range, heavy armor, and great agility in the air. These U.S. aircraft, the F-14 Tomcat, F-15 Eagle, F-16 Fighting Hornet, and F/A-18 Hornet dominated U.S. air power for three decades. In the context of the Cold War,...
Learning Ruby
Learning Ruby
You don't have to know everything about a car to drive one, and you don't need to know everything about Ruby to start programming with it. Written for both experienced and new programmers alike, Learning Ruby is a just-get-in-and-drive book -- a hands-on tutorial that offers lots of Ruby programs and lets you know how and why they work,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy