by Joey Alonso | Nov 17, 2016 | Assessments, Assessments, Behavioral and Psychological Analysis, Blog, Cyber Forensics, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
I enjoyed this linked article from our friends at Digital Journal, across the pond, and thought I’d share my thoughts on the 3 Organizational Insiders they addressed so well. I spend many days talking about Insider Threats and Economic Espionage with small and...
by Joey Alonso | Nov 2, 2016 | Assessments, Behavioral and Psychological Analysis, Blog, Cyber Forensics, Foreign Threats, Human Resources, In-depth Vulnerability Assessments, Information Technology, Infrastructure, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Physical Security, Security Awareness, Services, Threats, Trusted Business Partners
I read the below article while enjoying a cup of morning Joe, remembering a conversation I had just a week ago. So, I thought, before the house gets crazy with kids getting ready for school, I could pass along my thoughts on energy infrastructure and SCADA. For many...
by Joey Alonso | Oct 24, 2016 | Blog, Cyber Forensics, Foreign Threats, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Mobile Security, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Threats, Trusted Business Partners
I have a little bit of previous insight into the threats posed using foreign designed and built equipment, most of which can’t be shared with the general public. A few months ago, I was interviewed by the Editor of Supply Chain and Demand Executive Magazine, where I...
by Joey Alonso | Oct 13, 2016 | Blog, Cyber Forensics, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Mobile Security, Physical Security, Privacy, Security Awareness, Services, Threats
Earlier this year, the CTO over at ObserveIT held a Webinar with an experienced Insider Threat prosecutor who provided a very thorough overview of employee monitoring and privacy concerns. If you are considering adding or upgrading your employee monitoring...