Recent employees steal valuable assets within organizations, e.g. source code, to gain huge profits. Researches and development results become profitable to other competitors.
However, few people with some techniques and skills to steal data often hard to discover.
Organizations need to equip themselves with the right knowledge and tools to defend against this growing threat type.
This session will show four techniques to avoid security system control:
Introduce how to hide the original confidential information by coding or encryption technology to avoid audit and surveillance analysis.
Live Demo (a) Text (b) Picture (c) Image (d) Sound (e) ADS steganography and tool.
3. Stealth Device
Use special devices as a Carrier to steal data, such as Raspberry Pi W Simulated NIC, Teensy Simulated keyboard execute scripts, screen captures Spy device...etc.
Use Obfuscated command of CMD & PowerShell. Penetrating hidden intentions and Avoid the regulatory environment within the company
FineArt focus on the avoidance behavior of Insider threat. Remind your organization to pay more attention to insider data theft risk.
Taiwan AI Academy Certificate of Study (2018), CISSP, CEH, ISO 27001:2005 LA, ISO 27001:2013 LA, TÜViT Privacy Protection Consultant,…etc.