Protecting Your Enterprise's Intellectual Property

Cyber attackers can scrape by stealing personal information and credentials, but the “big score” is intellectual property theft. Attacks on IP require a level of sophistication that most enterprises have never encountered before – is your cybersecurity team ready to face them? In this webinar, you’ll learn about the techniques and tactics that cybercriminals use to crack IP, and how your organization can detect and defend itself against these sophisticated, targeted attacks. 

On Demand
1h 00min

Attend this webinar and you'll learn:

  • How attackers who target intellectual property operate
  • Tips to protect IP from malicious insiders who know where the crown jewels are kept
  • What behaviors to look for that indicate an attacker is angling towards your most precious IP
  • Ways to respond to an IP theft incident, and how it differs from other data breach incident response

Featured Speakers

  • Corey T. Jackson, MBA, CISSP
    Corey T. Jackson, MBA, CISSP

    Founder/President of SACRO, LLC a Cybersecurity Advisory Firm – former Fortune 150 Chief Information Security Officer (CISO), is a technology executive with a proven track record and business acumen in defining global cybersecurity and risk strategies. Mr. Jackson’s career, highlighted by stellar credentials, accolades, and partnerships serves as a trusted advisor positively influencing corporations, academia, and elected officials, providing value-added guidance and results-oriented execution. As a visionary leader, Corey brings more than 25 years of corporate and government experience. Corey has advanced the awareness of cybersecurity accountability amongst C- Suite and Board level leaders within several Fortune 500 companies. Former VP Technology Risk and Deputy CISO of The Travelers Companies, he has also served as VP & Global CISO of HollyFrontier Corporation, Interim CISO and Deputy CISO at Kimberly-Clark, CISO for GE Current & Lighting, and held multiple cybersecurity and risk-related roles within the Federal Bureau of Investigation (FBI), Internal Revenue Service (IRS), and US Department of State – Bureau of Diplomatic Security. His experiences as a practitioner, past gubernatorial appointment (Commonwealth of Virginia), and his proven results provide astute knowledge in global, regulatory, and strategic imperatives to enhance IT and OT cyber-alliances. Mr. Jackson, currently a PhD candidate, holds several degrees and certifications which include the CISSP, MBA from Keller Graduate School of Management, and post-degree Information Security Certificates from Georgetown University and Carnegie Mellon University.

  • Tommy Todd, CISSP
    Tommy Todd, CISSP
    Vice President of Security

    Tommy Todd, CISSP, is the Vice President of Security at Code42. Tommy has been in the cybersecurity industry for over 20 years. During this time, Tommy has focused on data privacy and data protection with a special interest in topics on Data Privacy Rights and protecting organizations against their insider risk.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By