the CYBER5

Defending Against Chinese State-Sponsored Espionage Efforts


Listen Later

Episode 34 of the podcast covers how enterprise can defend against Chinese state-sponsored espionage efforts to steal intellectual property. 

  • Q1 (01:00) What are the computer network exploitation and insider threat TTPs you've seen throughout your career to steal intellectual property on the part of the Chinese government? 

 

  • Q2 (04:09) What are some investigative examples of each?

 

  • Q3 (09:35) What can companies do to protect themselves? What are the critical monitoring mechanisms that are critical to detecting a breach?

 

  • Q4 (13:51) What are the critical monitoring mechanisms to put in place on insider threat?

 

  • Q5 (16:15) If you were advising a CISO with limited budget, and this was your biggest threat, what would you prioritize?
...more
View all episodesView all episodes
Download on the App Store

the CYBER5By Nisos, Inc.

  • 5
  • 5
  • 5
  • 5
  • 5

5

23 ratings