Padgett-Beale’s Corporate Security Office
Padgett-Beale’s Corporate Security Office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information.
In your opinion, what processes and procedures should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company’s intellectual property (consider data classification and marking, separation of duties, and least privilege).
Sample Answer
Following the suspected Advanced Persistent Threat (APT) incident involving stolen architectural drawings, Padgett-Beale’s Corporate Security Office should implement a multi-layered approach to secure its intellectual property (IP). Here are some key processes and procedures to consider:
1. Data Classification and Marking:
- Classify Information: Implement a data classification system that categorizes information based on sensitivity. (e.g., Public, Confidential, Highly Confidential)
- Marking System: Clearly mark documents and emails with their classification level to raise awareness of sensitivity.