
To maintain data and IT security, risk managers must recruit a different type of employee and search for talent in 'dark pools'
Picture the scene. A UK-based engineering group finds that its markets in Asia have suddenly been flooded with counterfeit versions of its products. What’s worse, they’re very good counterfeits.
In fact, a little too good. When the company gets hold of these products and examines them, it can see that they are based on its own genuine designs. The truth dawns: organised criminals have penetrated its core corporate systems, and stolen the intellectual property that underpins its business.
See full Article.
