by Joey Alonso | Oct 19, 2019 | Assessments, In-depth Vulnerability Assessments, Insider Threat Program Management, Insider Threats, Intellectual Property Theft Prevention, Privacy, Uncategorized, Vulnerability Assessments
With the number of incidents happening every month of not only highly-trusted but entry-level employees stealing information from their employers, I’m in awe of the lack of “give a dang” decision-makers have when we chat. It’s happening folks, in every industry...
by Joey Alonso | Dec 21, 2016 | Blog, Human Resources, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Physical Security, Privacy, Security Awareness, Threats
Quortum HQ is in a wonderful Business Incubator in beautiful downtown Leesburg, Virginia. As part of George Mason University’s “Mason Enterprise Center” (MEC), we have individual offices with very high-speed internet, printing/scanning, BD/Coaching support and shared...
by Joey Alonso | Nov 17, 2016 | Assessments, Assessments, Behavioral and Psychological Analysis, Blog, Cyber Forensics, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
I enjoyed this linked article from our friends at Digital Journal, across the pond, and thought I’d share my thoughts on the 3 Organizational Insiders they addressed so well. I spend many days talking about Insider Threats and Economic Espionage with small and...
by Joey Alonso | Nov 10, 2016 | Assessments, Blog, Foreign Threats, Human Resources, In-depth Vulnerability Assessments, Information Technology, Infrastructure, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, Physical Security, Privacy, Security Awareness, Threats, Trusted Business Partners
It goes without saying that any company wanting to become a leader in anything that involves the term “Global” must do business with Chinese companies. I’ve heard the actual business discussions and agreements normally go quite well but my comments here are simply to...
by Joey Alonso | Oct 24, 2016 | Blog, Cyber Forensics, Foreign Threats, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Mobile Security, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Threats, Trusted Business Partners
I have a little bit of previous insight into the threats posed using foreign designed and built equipment, most of which can’t be shared with the general public. A few months ago, I was interviewed by the Editor of Supply Chain and Demand Executive Magazine, where I...
by Joey Alonso | Oct 21, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments
At the end of this post is a link to a really good article on the practicality of the requirements imposed on Cleared Defense Contractors to have an Insider Threat Program in-place by November 30, 2016. As the folks in article said, having a program that meets DSS’...