Theory to Practice: Insider Threat Lessons from Waymo vs. Uber
Well-placed insiders, covert meetings, secret world-changing technology, and huge sums of money changing hands—sounds like the latest spy novel, right? But it’s not; this is a true story, where data is the main character in the Waymo vs Uber case.
Data is an organization's most valuable asset. Just ask your most determined adversary, keen on stealing your intellectual property for financial gain. Do you have the right strategy in place to protect your critical value assets?
If that plan doesn’t include a system and process that gives you 360-degree visibility into users’ behavior, and links those behaviors with network data, emails, texts, digital, social media, and mobile forensic artifacts, you aren’t as protected as you think. The Waymo vs Uber case offers us a valuable, real-world situation to learn from and guide our own practices.
Join our CTO, Stephen Stewart, and SVP and former naval intelligence officer Keith Lowry, to learn how organizations are combining traditional investigations, eDiscovery, and cybersecurity tactics to defend their organizations from insider threats.
- The latest twists and turns of the Waymo vs Uber case
- How you can apply counterintelligence techniques to combat industrial espionage
- How organizations can gain a 360-degree investigative view of their environment, and be ready for their next digital threat.