SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Intellectual Property Society presenting  Bridging the Gap: Securing IP Curtis Coleman, CISSP, CISM Director, Electronic Security Seagate Technology
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Senior Computer Security Officer  for the B-2 Stealth Bomber ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Commander of a team of  Information Warfare Specialists (CyberKnights)
The CyberKnight  Mission
IBM Executive Computer Security Specialist  “Ethical Hacker” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Relates to E-Commerce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Small or Middle Sized Businesses Have Need to Protect Their IP ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP Audit – Take Inventory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Purpose of IP Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Is Snooping Really A Threat? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Training Material – Easy to Obtain ,[object Object],[object Object],[object Object],[object Object]
Five Step Primer: How Snoops Operate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Five Step Primer: How Snoops Operate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Five Step Primer: How Snoops Operate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Five Step Primer: How Snoops Operate ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Five Step Primer: How Snoops Operate ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Growing Concern  IP Rights vs. Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
High Technology & Non-Technology Solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challengesSilvia Afrima Chandra
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technologyjvonschilling
 
Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag ConferenceJonathan Yarmis
 
Limitations E - Commerce Security measures
Limitations E - Commerce Security measuresLimitations E - Commerce Security measures
Limitations E - Commerce Security measuresJeril Peter
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practiceJonathan Ezor
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)Malik Afzaal
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerceHimanshu Pathak
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Sigilo - Cellular Transmitter For Property Security
Sigilo - Cellular Transmitter For Property SecuritySigilo - Cellular Transmitter For Property Security
Sigilo - Cellular Transmitter For Property SecurityChief Innovation
 
Protecting your business ideas including crowdfunding
Protecting your business ideas including crowdfundingProtecting your business ideas including crowdfunding
Protecting your business ideas including crowdfundingTraklight.com
 

Was ist angesagt? (20)

Psi 10 security and ethical challenges
Psi 10 security and ethical challengesPsi 10 security and ethical challenges
Psi 10 security and ethical challenges
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Mobile Practice Management
Mobile Practice ManagementMobile Practice Management
Mobile Practice Management
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Ethics In Information Technology
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
04 privacy
04 privacy04 privacy
04 privacy
 
Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag Conference
 
Limitations E - Commerce Security measures
Limitations E - Commerce Security measuresLimitations E - Commerce Security measures
Limitations E - Commerce Security measures
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Sigilo - Cellular Transmitter For Property Security
Sigilo - Cellular Transmitter For Property SecuritySigilo - Cellular Transmitter For Property Security
Sigilo - Cellular Transmitter For Property Security
 
Protecting your business ideas including crowdfunding
Protecting your business ideas including crowdfundingProtecting your business ideas including crowdfunding
Protecting your business ideas including crowdfunding
 

Andere mochten auch

Can%20on%20the%20 Avr[1]
Can%20on%20the%20 Avr[1]Can%20on%20the%20 Avr[1]
Can%20on%20the%20 Avr[1]guest00c5043b
 
Unitat 4 el meu nom
Unitat 4  el meu nomUnitat 4  el meu nom
Unitat 4 el meu nomgemmacabe
 
Unitat 6 numeració i càlcul
Unitat 6 numeració i càlculUnitat 6 numeració i càlcul
Unitat 6 numeració i càlculgemmacabe
 
Developing a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP ConsiderationsDeveloping a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP Considerationsipspat
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issuesipspat
 
Social Media in 140 Characters
Social Media in 140 CharactersSocial Media in 140 Characters
Social Media in 140 CharactersHumza Ijaz
 
Unitat 9 els animals de la granja
Unitat 9  els animals de la granjaUnitat 9  els animals de la granja
Unitat 9 els animals de la granjagemmacabe
 
Convegno riforma costituzionale
Convegno riforma costituzionaleConvegno riforma costituzionale
Convegno riforma costituzionaleoprefessor
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Unitat 7 . els colors
Unitat 7 . els colorsUnitat 7 . els colors
Unitat 7 . els colorsgemmacabe
 
Unitat 2 cauen les fulles
Unitat 2 cauen les fullesUnitat 2 cauen les fulles
Unitat 2 cauen les fullesgemmacabe
 
Unitat 5 el protagonista de la setmana
Unitat 5  el protagonista de la setmanaUnitat 5  el protagonista de la setmana
Unitat 5 el protagonista de la setmanagemmacabe
 
Current Issues in International Cross-Border I.P. Strategies
Current Issues in International Cross-Border I.P. StrategiesCurrent Issues in International Cross-Border I.P. Strategies
Current Issues in International Cross-Border I.P. Strategiesipspat
 

Andere mochten auch (16)

Timeout Timer
Timeout TimerTimeout Timer
Timeout Timer
 
Can%20on%20the%20 Avr[1]
Can%20on%20the%20 Avr[1]Can%20on%20the%20 Avr[1]
Can%20on%20the%20 Avr[1]
 
Unitat 4 el meu nom
Unitat 4  el meu nomUnitat 4  el meu nom
Unitat 4 el meu nom
 
Unitat 6 numeració i càlcul
Unitat 6 numeració i càlculUnitat 6 numeració i càlcul
Unitat 6 numeració i càlcul
 
Timeout Timer
Timeout TimerTimeout Timer
Timeout Timer
 
Developing a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP ConsiderationsDeveloping a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP Considerations
 
qqqq
qqqqqqqq
qqqq
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
Social Media in 140 Characters
Social Media in 140 CharactersSocial Media in 140 Characters
Social Media in 140 Characters
 
Unitat 9 els animals de la granja
Unitat 9  els animals de la granjaUnitat 9  els animals de la granja
Unitat 9 els animals de la granja
 
Convegno riforma costituzionale
Convegno riforma costituzionaleConvegno riforma costituzionale
Convegno riforma costituzionale
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Unitat 7 . els colors
Unitat 7 . els colorsUnitat 7 . els colors
Unitat 7 . els colors
 
Unitat 2 cauen les fulles
Unitat 2 cauen les fullesUnitat 2 cauen les fulles
Unitat 2 cauen les fulles
 
Unitat 5 el protagonista de la setmana
Unitat 5  el protagonista de la setmanaUnitat 5  el protagonista de la setmana
Unitat 5 el protagonista de la setmana
 
Current Issues in International Cross-Border I.P. Strategies
Current Issues in International Cross-Border I.P. StrategiesCurrent Issues in International Cross-Border I.P. Strategies
Current Issues in International Cross-Border I.P. Strategies
 

Ähnlich wie Bridging the Gap: Securing IP

Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenUnderstanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenWerksmans Attorneys
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperSue Hallen
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
Intellectual Property & Software
Intellectual Property & SoftwareIntellectual Property & Software
Intellectual Property & SoftwareAmit Goyal
 
Evolution of IT, AI, and Automation in Intellectual Property Industry
Evolution of IT, AI, and Automation in Intellectual Property IndustryEvolution of IT, AI, and Automation in Intellectual Property Industry
Evolution of IT, AI, and Automation in Intellectual Property IndustrySagacious IP
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Ecom present
Ecom presentEcom present
Ecom presentDamo Ward
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
ICT in Business Mangement (VCE Unit 1)
ICT in Business Mangement (VCE Unit 1)ICT in Business Mangement (VCE Unit 1)
ICT in Business Mangement (VCE Unit 1)bpmcg2
 

Ähnlich wie Bridging the Gap: Securing IP (20)

Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine HollesenUnderstanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
Understanding Cybercrime: Theft of Intellectual Property - Janine Hollesen
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 
Drm
DrmDrm
Drm
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Intellectual Property & Software
Intellectual Property & SoftwareIntellectual Property & Software
Intellectual Property & Software
 
Evolution of IT, AI, and Automation in Intellectual Property Industry
Evolution of IT, AI, and Automation in Intellectual Property IndustryEvolution of IT, AI, and Automation in Intellectual Property Industry
Evolution of IT, AI, and Automation in Intellectual Property Industry
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Ecom present
Ecom presentEcom present
Ecom present
 
Intellectual Property Management
Intellectual Property ManagementIntellectual Property Management
Intellectual Property Management
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
ICT in Business Mangement (VCE Unit 1)
ICT in Business Mangement (VCE Unit 1)ICT in Business Mangement (VCE Unit 1)
ICT in Business Mangement (VCE Unit 1)
 

Mehr von ipspat

The Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent ValuationThe Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent Valuationipspat
 
Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internetipspat
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protectionsipspat
 
Outsourcing Lessons as Learned and Applied by Agilent
Outsourcing Lessons as Learned and Applied by AgilentOutsourcing Lessons as Learned and Applied by Agilent
Outsourcing Lessons as Learned and Applied by Agilentipspat
 
The Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent ValuationThe Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent Valuationipspat
 
Social Networking Software
Social Networking SoftwareSocial Networking Software
Social Networking Softwareipspat
 
Overview of Legal Structures for Outsourcing
Overview of Legal Structures for OutsourcingOverview of Legal Structures for Outsourcing
Overview of Legal Structures for Outsourcingipspat
 
Licensing & IP Valutation
Licensing & IP ValutationLicensing & IP Valutation
Licensing & IP Valutationipspat
 
Intellectual Property Rights in Nanotechnology
Intellectual Property Rights in NanotechnologyIntellectual Property Rights in Nanotechnology
Intellectual Property Rights in Nanotechnologyipspat
 
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...ipspat
 

Mehr von ipspat (10)

The Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent ValuationThe Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent Valuation
 
Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internet
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
 
Outsourcing Lessons as Learned and Applied by Agilent
Outsourcing Lessons as Learned and Applied by AgilentOutsourcing Lessons as Learned and Applied by Agilent
Outsourcing Lessons as Learned and Applied by Agilent
 
The Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent ValuationThe Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent Valuation
 
Social Networking Software
Social Networking SoftwareSocial Networking Software
Social Networking Software
 
Overview of Legal Structures for Outsourcing
Overview of Legal Structures for OutsourcingOverview of Legal Structures for Outsourcing
Overview of Legal Structures for Outsourcing
 
Licensing & IP Valutation
Licensing & IP ValutationLicensing & IP Valutation
Licensing & IP Valutation
 
Intellectual Property Rights in Nanotechnology
Intellectual Property Rights in NanotechnologyIntellectual Property Rights in Nanotechnology
Intellectual Property Rights in Nanotechnology
 
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Bridging the Gap: Securing IP

  • 1. Intellectual Property Society presenting Bridging the Gap: Securing IP Curtis Coleman, CISSP, CISM Director, Electronic Security Seagate Technology
  • 2.
  • 3.
  • 4. Commander of a team of Information Warfare Specialists (CyberKnights)
  • 5. The CyberKnight Mission
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.