Genderen, Dylan van,

Counterintelligence for corporate environments. Volume I, How to protect information and business integrity in the modern world / How to protect information and business integrity in the modern world Dylan van Genderen. - First edition. - 1 online resource (xv, 111 pages) - Business law and corporate risk management collection, 2333-6730 . - Business law and corporate risk management collection. .

Includes index.

1. The definition and history of counterintelligence -- 2. The modern intelligence threat landscape -- 3. The benefits of counterintelligence for corporate environments -- 4. Counterintelligence screening and interviewing -- 5. Security awareness and employee resilience -- About the author -- Index.

Access restricted to authorized users and institutions.

Volume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume II discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that have been used by intelligence communities and specialized military forces for decades, this book aims to improve and safeguard every component of a corporate environment through the adaptation and modification of the same strategies employed by these specialized entities. Through this book, managers, security officers, consultants, and entire corporate environments will have the knowledge and skills necessary in order to change the entire dynamic of security applications in the present day and will be able to integrate advanced and highly efficient counterintelligence models in order to combat the extensive modern threat landscape.




Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.

9781947441668


Business intelligence.
Corporations--Security measures.

business integrity corporate environments counterintelligence cybersecurity information protection intelligence IT operations planning risk management security


[genre]

HD38.7