Episode 34 of the podcast covers how enterprise can defend against Chinese state-sponsored espionage efforts to steal intellectual property.
Q1 (01:00) What are the computer network exploitation and insider threat TTPs you've seen throughout your career to steal intellectual property on the part of the Chinese government?Q2 (04:09) What are some investigative examples of each?
Q3 (09:35) What can companies do to protect themselves? What are the critical monitoring mechanisms that are critical to detecting a breach?
Q4 (13:51) What are the critical monitoring mechanisms to put in place on insider threat?
Q5 (16:15) If you were advising a CISO with limited budget, and this was your biggest threat, what would you prioritize?