Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Leadership & ManagementSecurity Leadership and Management

How to Safeguard Your Information Assets

How are lapses in cyber security leading to the loss of billions of dollars worth of intellectual property?

By Lynn Mattice
September 1, 2013
sec body
 

 

In today’s “Internet of Everything,” most enterprises dramatically underestimate the extent and scope of cyber-based attacks. The U.S. Office of the National Counterintelligence Executive has indicated that no fewer than 140 countries, both “Friend and Foe,” are actively and aggressively stealing data from American companies and the government. The “60-Day Cyber Review” issued in February 2009 by the Obama administration estimated that in 2008 alone the United States lost intellectual property valued in excess of $1 trillion dollars just to cyber hacking.  The non-partisan and non-profit National Economic Security Grid has frequently highlighted what they have coined as the “Advanced Persistent Asymmetrical Threat.” This asymmetrical threat includes not only cyber-based attacks, but also addresses the full scope of intelligence trade craft deployed to steal intellectual property from the U.S. private sector and intelligence from the government.

China is by far the most aggressive of the nation-state players when it comes to stealing technology. Unfortunately, in their drive to cash in on what were viewed as huge opportunities in China, most western companies implemented minimal information safeguards in their Chinese joint ventures.

One only has to look at the seven major sectors and 27 key technologies listed in the latest Chinese Five-Year Plan to see which industries the Chinese are currently intending to dominate. Of course, the estimated 200,000 plus Chinese PLA troops dedicated 24/7 to exploiting the Internet and hacking into every computer system and network they possibly can, do not in any manner limit tier exploits to just the seven sectors or 27 key technologies listed in the current Five-Year Plan.

On top of the aforementioned risks, we would be remiss if we did not address the “Insider Threat.” The Ponemon Institute conducted a study in 2007 of individuals that were being laid off from their companies due to the economic downturn. Fifty-nine percent of those surveyed admitted taking proprietary information as they were being laid off and, of those, 75 percent stated that they knew that their actions were in direct violation of company policy and did it anyway. The data taken in these thefts included such things as customer lists, pricing, new product designs, product roll-out schedules, strategic plans and trade secrets.

With the Edward Snowden affair, the NSA recently learned the hard way about what happens when rouge individuals with too much access and who can manipulate network systems steal highly sensitive information. IT systems administrators are given incredible levels of “Administrative Rights,” which allows them virtually unfettered access to manipulate systems and data. Ironically, most of these issues can be resolved through the deployment of “Digital Rights Management” (DRM) programs. DRM programs provide the ability to categorize data based on its level of importance, sensitivity and value to the enterprise.  DRM programs also establish rules as to what each individual allowed access can do with the data. This is a huge advantage when sending sensitive data to a supply chain or joint venture partner, since the DRM program can not only prevent the loss of the data, but access can be denied at anytime that the originator deems appropriate. These programs can also prevent printing, copying, downloading, forwarding and altering the data.

The Securities and Exchange Commission has recently begun requiring publically held companies to report computer breaches in an attempt to assist investors in assessing the impact these losses have on the valuation of corporations. However, if you have ever read any of these disclosures, it is clear that their legal staffs have been working overtime and have crafted reports that are nearly impossible to decipher.

The only real question that remains is how many U.S. companies will have to evaporate before CEOs begin to take protection of information assets seriously and the government pulls its head out of the sand and begins to take these nation-state bad actors head on!  

 

About the Authors:

 Jerry J. Brennan is the founder and Chief Operating Officer of Security Management Resources (SMR Group), the world’s leading executive search firm exclusively focused in corporate security. Prior to founding SMR in 1997, Brennan enjoyed a 26-year career in domestic and international enterprise risk and security roles. Lynn Mattice is Managing Director of Mattice and Associates, a management consultancy focused at the development and alignment of Enterprise Risk Management and Business Intelligence Programs, as well as Intellectual Property Protection and Cybersecurity. He has more than 35 years of experience heading these programs at the executive level of three major multinational corporations and one mid-cap company in diverse industries. 

KEYWORDS: cyber risk mitigation Intellectual Property proprietary information Travel Risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mattice 2016 200px

Lynn Mattice is Managing Director of Mattice & Associates, a top-tier management consulting firm focused primarily at assisting enterprises with ERM, cyber, intelligence, security and information asset protection programs. He can be reached at: matticeandassociates@gmail.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Add Resiliency to Your Risk Management Strategy

    See More
  • AI public safety freepik

    How to safeguard and optimize your assets through IoT and AI

    See More
  • How to Research Your Enterprise's Unique Risks - Security Magazine

    How to Research Your Enterprise's Unique Risks

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing