The digitization of almost every aspect of business, combined with the increased connectivity of people, devices, and organizations, has created a complex security landscape, leaving enterprises vulnerable to cyber risk.
Whether you’re researching a new market or optimizing your systems to comply with complex regulation, collecting and analyzing data is mission critical. In our digital and increasingly borderless world, companies also need sophisticated strategies and tools to find information, detect violations, uncover evidence, and comply with regulations.
Safeguarding computer related intellectual property (IP)—patents, trade secrets and copyrights—is a strategic priority for businesses that depend on the development and monetization of information. But in a digital and connected world, IP misappropriation is rampant.
In our digital and increasingly borderless world, companies need sophisticated strategies and tools to cost-effectively uncover evidence and comply with litigation-related discovery and disclosure requirements. In this environment, the risks of a breakdown are ever-present and come with major implications.
Cyber risks come not only from threat actors external to your company but also from those within your environment. Organizations face increasingly complex insider threat from employees, former employees, and authorized third parties who have the advantage of operating within the company’s perimeter. Whether senior or junior, malicious or inadvertent, insiders can compromise confidential data, trade secrets and even employee safety. These risks must be approached with constant vigilance, attention, and preparedness to limit exposure.
Our teams have the expertise and proprietary tools to assess risk from within an organization and help design a comprehensive insider risk program that goes beyond traditional data loss prevention tactics. Our approach is anchored in a unique ability to identify and defuse a range of at-risk insiders before they act.
The Stroz Friedberg insider threat program empowers a multi-disciplinary team of individuals to detect, respond to, and recover from insider risk. Stroz Friedberg works with company leadership to:
Identify executives and staff members who should be on the Insider Threat Review Team;
Establish a process to regularly review technical and nontechnical threat indicators, and determine when a threat requires team attention;
Educate the team to understand the signs of risk; evaluate the progression of these indicators; and respond in ways that do not inadvertently inflame the situation;
Fine-tune policies to set the stage for a healthy workplace.
Rocco Grillo is an Executive Managing Director that serves on Stroz Friedberg’s executive management team. He is also in charge of the firm’s Cyber Resilience business which includes the company’s incident responders and security scientists who deliver the firm’s proactive and reactive cybersecurity capabilities, Mr. Grillo regularly advises clients, including boards and executive management on a range of cybersecurity issues across all industries
In this role, Mr. Grillo is responsible ...
Elizabeth Miller serves as the Director for the SCOUT Business Unit at Stroz Friedberg. She is a value-based communicator with particular strengths in strategic thinking, program designs and international business growth. Before joining Stroz Friedberg, Beth worked for ViaGlobal Group and the Department of Defense. Beth managed multiple contracts, prepared complex written responses to time sensitive inquiries from Department of Defense to the U.S Congress, and conducted research and ...
Eric Shaw, Ph.D. is a Clinical Psychologist and former intelligence officer who has spent the last 20 years applying behavioral science methods to forensic and security challenges. As the Company’s profiling consultant, Dr. Shaw has supported Stroz Friedberg investigations and services for a broad array of clients. He has helped the firm discover and manage the identity of insiders and outsiders making anonymous threats. He has also helped the company conduct vulnerability analyses related ...