npies

CORPORATE ESPIONAGE

Regardless of whether or not your organization deals with classified systems, your trade secrets are actively pursued by foreign intelligence agents and competitors. Using the strategies that protect sensitive information is an effective means of recognizing and preventing both. Take a look at the tactics applied by foreign actors and provide your team with the information to identify when they are being targeted or recruited. Implement the processes and procedures will help you identify, protect and monitor at risk information!

CORPORATE ESPIONAGE WORKSHOP

  • Foreign Government Threats
  • Non-State Actors
  • Case Study: The Chocolate Wars
  • Technology Exploitation and Protective Measures
  • Case Study: Edward Snowden
  • Recognizing Elicitation
    • Elicitation Practical Application
  • Identification and Reporting
  • Investigation of Information Theft

CORPORATE ESPIONAGE LECTURE

  • Foreign Government Threats
  • Non-State Actors
  • Technology Exploitation and Protective Measures
  • Recognizing Elicitation
  • Identification and Reporting
  • Investigation of Information Theft

PROGRAM AND POLICY DEVELOPMENT

We can provide organizational policies, programs, and processes help your team make decisions and ensure you are in compliance with applicable regulations. We are here to assist your security department with the development of an effective and user friendly program that protects sensitive information and engages your team in the process keeping trade secrets secret!

The resources applied to the collection of trade secrets and classified information is staggering. Professionally trained intelligence officers from a  number of nations including our own are selling their services to the highest bidder. Regardless of the means by which they collect, collecting on a wary adversary is significantly more challenging. Raising awareness of the problem and providing personal experience recognizing the signs of a potential problem arms your team with the information they need to keep your trade secrets secret. There is no one size fits all program and we are happy to customize workshops, lectures and programs to meet your requirements. Start the process of ensuring your organization is capable and ready to identify and protect the information that makes it successful!

testimonial author
Patrick Henry
President Aegis Academy
Getting someone talking is easy. People complain about work like there being paid by the minute. The real trick is identifying those key players who have access to sensitive information, but lack the moral character and loyalty to protect it...

START TAKING CONTROL OF YOUR SAFETY AND SECURITY TODAY!

testimonial author
Your Name Here
Client
Be the first to review this course!