1 / 5

IT Saboteurs

IT Saboteurs. Saboteurs have used IT channels of communication to threaten and target our personal, corporate and national security.

melody
Download Presentation

IT Saboteurs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Saboteurs • Saboteurs have used IT channels of communication to threaten and target our personal, corporate and national security. • That the services of those in occupational psychiatry, and other related areas of mental and behavioral health are essential for us in corporate security to better understand and manage the growing number of incidents. • My “first” appreciation of the importance of having access to the services of professionals as yourselves to compliment security related challenges

  2. Leveraging your expertise • As we have to evaluate the seriousness of the threat, -- we often turn to you for your professional input (as Dr. Post) to help us understand the severity of the threat and best determine what measures if any should be taken to manage and/or mitigate the threat based on what has already occurred and/or what is being threatened to take place.

  3. Case Examples of “Saboteurs” Using IT Channels of Communication & When We have solicited Your Professional Services & Advice • By Terrorists • Negotiating via email for Danny Pearl • By Mexican Drug Cartels • Threatening by emails & text to kill if extortion payments are not made • By Kidnappers • Used Twitter & Face Book • Client provided mental health counseling for team • By those that present a national security threat • Stealing IP from “unwitting” Americans • By ordinary people with mental health issues • CFO threatening via email to shoot employees with machine gun • By Somali Pirates • Conducting negotiations via email & texting

  4. Concluding Remarks How a closer working relationship between corporate security and professionals of such organizations as the A.O.O.P. can more adequately enable both "you and us" to more effectively mitigate the threat of those Saboteurs who now utilize the IT gateway. That we heighten our mutual appreciation of the "Gifts" that we each bring to the table that allows both of us as professionals to jointly respond to the growing number of Saboteurs who will use the IT gateway with ever increasing frequency to challenge our personal, corporate and national security During the panel session, I would appreciate your input and comments as to how law enforcement and corporate security may better enhance our existing symbiotic relationship in order to better address the new complexities and stresses of the modern workplace that the IT evolution has brought us. .

  5. Questions

More Related