Listen "Defending Against Chinese State-Sponsored Espionage Efforts"
Episode Synopsis
Episode 34 of the podcast covers how enterprise can defend against Chinese state-sponsored espionage efforts to steal intellectual property. Q1 (01:00) What are the computer network exploitation and insider threat TTPs you've seen throughout your career to steal intellectual property on the part of the Chinese government? Q2 (04:09) What are some investigative examples of each? Q3 (09:35) What can companies do to protect themselves? What are the critical monitoring mechanisms that are critical to detecting a breach? Q4 (13:51) What are the critical monitoring mechanisms to put in place on insider threat? Q5 (16:15) If you were advising a CISO with limited budget, and this was your biggest threat, what would you prioritize?
More episodes of the podcast the CYBER5
Insider Threats and Social Engineering Tactics by Counterintelligence Institute’s Peter Warmka
08/03/2023
The Top Nisos Investigations Of the Last Seven Years with Nisos Research Principal Vincas Ciziunas
08/02/2023
The Vital Role of Customer Success in Intel Programs with Senior Director of Nisos Brandon Kappus
24/01/2023
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.