Foreign influence activities have been targeting research programs worldwide to steal Intellectual Property (IP) assets by compromising trusted employees, contractors, and external partners. The session will review some of the tactics, techniques, and procedures used by foreign influence threat actors to target research organizations and will share some best practices to defend research programs.
Human Element Protecting Data & the Supply Chain Ecosystem Technology Infrastructure & Operations
critical infrastructure data loss prevention insider threats threat intelligence compliance management
Share With Your Community