Industrial Espionage - Humint - Sigint - Opsint - Osint
Last updated 10/2021
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.10 GB | Duration: 2h 18m
Last updated 10/2021
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.10 GB | Duration: 2h 18m
Company and Individual knowledge protection
What you'll learn
Understand the human and psychological approach used to obtain information
Understand the different phases of a successful industrial espionage operation
Understand who can be the object of an industrial espionage operation and why
Identify countermeasures to protect company personnel
Understand MICE concept
Understand what industrial espionage is, the origin of the threat and attackers' modus operandi
Identify the risks specific to your organization according to its strategic interests and quantify them
Adopt good practices to protect your organisation and your data against industrial espionage
Learn how to train employees
Discover HUMINT - SIGINT - OPSINT - OSINT
Requirements
None
Description
This second module is intended for everyone, employees, managers, security managers, DPOs or simply anyone who wants to understand in detail how an industrial espionage operation works and better understand the risks associated with industrial espionage and good practices to protect their organization, employees and data.This training, based on a wide experience in the public (military, foreign affairs) and private (banking, cybersecurity) sectors, gives a high level overview of the risks mentioned illustrated by concrete examples, the definition and examples of risks and threats, the different sensors (including psychological aspects and prejudices) used to collect sensitive information (legal and illegal) as well as the way an attacker thinks when defining his plan to access confidential information about a targeted company.It takes up one by one the different sensors studied in the first part of the training module with the help of videos, notably from the film "Les Patriotes" by Eric Rochant for a more interactive training. Each step of the psychological and human manipulation, each technical and operational method of information retrieval are precisely detailed.The second part takes up these different means of acquisition, this time associating the methods and tools to detect these operations and to protect oneself against them.This module can be used as a training and awareness supplement within the framework of a company program.HUMINT - SIGINT
Overview
Section 1: Protect the company - Introduction & Concepts
Lecture 1 Introduction
Lecture 2 Industrial espionage in real world
Lecture 3 Risks & Threats
Lecture 4 Sensors
Lecture 5 The attacker's perspective
Section 2: Individual knowledge protection - Individual exposure
Lecture 6 Introduction
Lecture 7 HUMINT
Lecture 8 SIGINT
Lecture 9 OSINT
Lecture 10 OPSINT
Section 3: Individual knowledge protection - Countermeasures
Lecture 11 HUMINT
Lecture 12 SIGINT
Lecture 13 OSINT
Lecture 14 OPSINT
Employees,Security/safety managers,CEO,HR