Padgett-Beale’s Corporate Security Office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information.
In your opinion, what processes and procedures should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company’s intellectual property (consider data classification and marking, separation of duties, and least privilege).
Following the suspected theft of confidential architectural drawings, Padgett-Beale’s Corporate Security Office needs to implement a robust strategy to safeguard intellectual property (IP). Here’s a multi-pronged approach that addresses data classification, separation of duties, and least privilege principles:
Additional Measures:
By implementing a combination of these measures, Padgett-Beale can create a layered defense to protect its intellectual property. Continuous monitoring and improvement of security protocols are crucial to stay ahead of evolving threats.
Addressing Advanced Persistent Threats (APT):
While focusing on internal controls is important, acknowledging the suspected APT use suggests a more sophisticated attack. Therefore, consider:
By adopting a comprehensive approach that addresses both internal procedures and external threats, Padgett-Beale can significantly reduce the risk of future intellectual property theft.