Nearly one in six American organizations suffered from fraud in the last two years, according to the 13th Global Fraud Survey from EY – nearly double the rate measured in 2012. While mitigating external risks is all well and good, ensure that you look inside your enterprise as well – all the way to the cubicle.
The International Hologram Manufacturers Association(IHMA) says reports from the EU, the Japan Patent Office and the U.S. Department of Homeland Security are reminders of the “huge” threat posed to consumer safety – China is a leading supplier of goods to the world’s markets, and it is also the primary source for counterfeit items.
China will investigate providers of IT products and services to protect “national security” and “economic and social development,” according to the official Xinhua news agency. This move follows the U.S. government charged five Chinese military officers with hacking U.S. companies to steal trade secrets.
U.S. Representative Mike Rogers (R-MI) is hard at work in Washington D.C., despite Congressional recess, when other lawmakers have returned to their respective districts and even the President and his family escape the heat to a vacation destination.
While some have condemned U.S. National Security Agency monitoring activity, as described by fugitive Edward Snowdon, a bigger, real threat centers on intellectual property theft with America and its corporations most often the target.
Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!