ILMA Compoundings - July 2019 - 33

With that being said, there is a
risk of an employee with malicious
intent breaching your sensitive data,
whether it be to share sensitive details
to a competitor, profit from your
data or carry out revenge against your
company. If your company falls victim
of a malicious-intentioned employee,
finding out what happened is even
more difficult, because they often have
high-level system privileges that allow
them to erase their tracks.
If your company is one of the
unlucky ones where an insider deliberately caused a security breach, then
you are automatically in the highest
risk category of those susceptible to
cybercrime. The keys to mitigate this
risk are simple:
EDUCATE YOUR EMPLOYEES
* Establish a strong, mandatory
and frequent cybersecurity awareness training program for your
employees that clearly lays out
the policy for cybersecurity and
the consequences of violating
the policy.
* Don't allow employees to take
home devices that contain sensitive
files due to the risk of the device
being stolen or sensitive data being
transmitted over insecure networks
at their home or other locations.
* Instruct your employees to never
share their passwords.

KNOW YOUR PEOPLE
* Perform background checks
on your employees to assist in
identifying those who may take
deliberate actions that would
harm your company.
* Know which people have access
to the most sensitive data.
GUARD YOUR MOST
SENSITIVE DATA
* Limit your employees' ability
to obtain access (intentional
or unintentional) to sensitive
information via a least-privileged
approach to your data.
* Identify your most sensitive and
valuable data. Then assign that
data the highest safeguarding and
most persistent monitoring.
* Remove "local administrator privileges" from your users to their
company-provided laptops or
desktops. A "local administrator"
is someone who can do anything
he or she chooses to with a computer, such as install programs,
delete files, change sensitive
security settings and so on.
* Turning on "egress filtering" on
your network and limiting the use
of USB "thumb drives" will make
it harder for anyone to make copies of it and move them outside of
your organization.

ENSURE THAT YOU HAVE
FORENSICS AVAILABLE TO YOU
* Tracking down an internal cybercriminal requires logging of
network activity, especially for any
access to sensitive information.
* Any logs need to be stored in an
area that is limited to the fewest
number of employees as possible.
In short, your employees are your
most valuable asset but can also be
your greatest liability. They need to
be trained on best practices to keep
your data safe, and they also need to
understand that you have forensic
systems in place that will likely catch
them if they attempt to access data
they should not. A "trust but verify"
approach regarding employee access
to your critical intellectual property is
an important part of your company's
cybersecurity program.
Austin is the CEO of TCE
Strategy, an internationally
recognized speaker on emerging
technology and cybersecurity
issues, and author of Secure Enough? 20
Questions on Cybersecurity for Business Owners
and Executives. With over 10 years of experience
as a chief information officer and chief information
security officer, Austin actively advises companies
across a wide variety of industries on effective
methods to mitigate cyberthreats. For more
information, visit www.tcestrategy.com.

33


http://www.tcestrategy.com

ILMA Compoundings - July 2019

Table of Contents for the Digital Edition of ILMA Compoundings - July 2019

LETTER FROM THE CEO
INSIDE ILMA
WHAT’S COMING UP
NEW MEMBERS
INDUSTRY RUNDOWN
In the Know
International Insight
Market Report
PROTECTING AND ENFORCING PRODUCT PATENTS
GOING GLOBAL
LESSONS LEARNED ON THE ROAD TO ILSAC GF-6
BUSINESS HUB
COUNSEL COMPOUND
WASHINGTON LANDSCAPE
IN NETWORK
Member Connections
PORTRAIT
ILMA Compoundings - July 2019 - Cover1
ILMA Compoundings - July 2019 - Cover2
ILMA Compoundings - July 2019 - 1
ILMA Compoundings - July 2019 - 2
ILMA Compoundings - July 2019 - LETTER FROM THE CEO
ILMA Compoundings - July 2019 - INSIDE ILMA
ILMA Compoundings - July 2019 - 5
ILMA Compoundings - July 2019 - 6
ILMA Compoundings - July 2019 - 7
ILMA Compoundings - July 2019 - WHAT’S COMING UP
ILMA Compoundings - July 2019 - 9
ILMA Compoundings - July 2019 - 10
ILMA Compoundings - July 2019 - NEW MEMBERS
ILMA Compoundings - July 2019 - INDUSTRY RUNDOWN
ILMA Compoundings - July 2019 - In the Know
ILMA Compoundings - July 2019 - International Insight
ILMA Compoundings - July 2019 - 15
ILMA Compoundings - July 2019 - Market Report
ILMA Compoundings - July 2019 - 17
ILMA Compoundings - July 2019 - PROTECTING AND ENFORCING PRODUCT PATENTS
ILMA Compoundings - July 2019 - 19
ILMA Compoundings - July 2019 - 20
ILMA Compoundings - July 2019 - 21
ILMA Compoundings - July 2019 - 22
ILMA Compoundings - July 2019 - 23
ILMA Compoundings - July 2019 - GOING GLOBAL
ILMA Compoundings - July 2019 - 25
ILMA Compoundings - July 2019 - 26
ILMA Compoundings - July 2019 - 27
ILMA Compoundings - July 2019 - LESSONS LEARNED ON THE ROAD TO ILSAC GF-6
ILMA Compoundings - July 2019 - 29
ILMA Compoundings - July 2019 - 30
ILMA Compoundings - July 2019 - 31
ILMA Compoundings - July 2019 - BUSINESS HUB
ILMA Compoundings - July 2019 - 33
ILMA Compoundings - July 2019 - COUNSEL COMPOUND
ILMA Compoundings - July 2019 - 35
ILMA Compoundings - July 2019 - WASHINGTON LANDSCAPE
ILMA Compoundings - July 2019 - 37
ILMA Compoundings - July 2019 - Member Connections
ILMA Compoundings - July 2019 - 39
ILMA Compoundings - July 2019 - PORTRAIT
ILMA Compoundings - July 2019 - Cover3
ILMA Compoundings - July 2019 - Cover4
https://www.nxtbook.com/ygsreprints/ILMA/G127535ILMA_vol71_no7
https://www.nxtbook.com/ygsreprints/ILMA/G126213ILMA_vol71_no6
https://www.nxtbook.com/ygsreprints/ILMA/G125546_ILMA_vol71_no5
https://www.nxtbook.com/ygsreprints/ILMA/G124996_ILMA_vol71_no4
https://www.nxtbook.com/ygsreprints/ILMA/G123886_ILMA_vol71_no3
https://www.nxtbook.com/ygsreprints/ILMA/G123315_ILMA_vol71_no2
https://www.nxtbook.com/ygsreprints/ILMA/G122980_ILMA_vol71_no1
https://www.nxtbook.com/ygsreprints/ILMA/G121540_ILMA_vol70_no11
https://www.nxtbook.com/ygsreprints/ILMA/G120882_ILMA_vol70_no10
https://www.nxtbook.com/ygsreprints/ILMA/G120035_ILMA_vol70_no9
https://www.nxtbook.com/ygsreprints/ILMA/G121XXX_ILMA_vol70_no8
https://www.nxtbook.com/ygsreprints/ILMA/G120XXX_ILMA_vol70_no7
https://www.nxtbook.com/ygsreprints/ILMA/G119XXX_ILMA_vol70_no6
https://www.nxtbook.com/ygsreprints/ILMA/G118112_ILMA_vol70_no5
https://www.nxtbook.com/ygsreprints/ILMA/G117382_ILMA_vol70_no4
https://www.nxtbook.com/ygsreprints/ILMA/G116888_ILMA_vol70_no3
https://www.nxtbook.com/ygsreprints/ILMA/G115555_ILMA_vol70_no2
https://www.nxtbook.com/ygsreprints/ILMA/G114774_ILMA_vol70_no1
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no12
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no11
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no10
https://www.nxtbook.com/ygsreprints/ILMA/g109884_ILMA_vol69_no9
https://www.nxtbook.com/ygsreprints/ILMA/g109284_ILMA_vol69_no8
https://www.nxtbook.com/ygsreprints/ILMA/g108494_ILMA_vol69_no7
https://www.nxtbook.com/ygsreprints/ILMA/g107507_ILMA_vol69_no6
https://www.nxtbook.com/ygsreprints/ILMA/g106483_ILMA_vol69_no5
https://www.nxtbook.com/ygsreprints/ILMA/g105803_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/g104743_ILMA_vol69_no3
https://www.nxtbook.com/ygsreprints/ILMA/g103647_ILMA_vol69_no2
https://www.nxtbook.com/ygsreprints/ILMA/g102869_ILMA_vol69_no1
https://www.nxtbook.com/ygsreprints/ILMA/g101930_ILMA_vol68_no12
https://www.nxtbook.com/ygsreprints/ILMA/g100836_ILMA_vol68_no11
https://www.nxtbook.com/ygsreprints/ILMA/g99200_ILMA_vol68_no10
https://www.nxtbook.com/ygsreprints/ILMA/g98468_ILMA_vol68_no9
https://www.nxtbook.com/ygsreprints/ILMA/g97711_ILMA_vol68_no8
https://www.nxtbook.com/ygsreprints/ILMA/G96767ILMA_vol68_no7
https://www.nxtbook.com/ygsreprints/ILMA/G95397ILMA_vol65_no6
https://www.nxtbook.com/ygsreprints/ILMA/G94323ILMA_vol68_no5
https://www.nxtbook.com/ygsreprints/ILMA/G93127_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/G91785_ILMA_vol68_no3
https://www.nxtbook.com/ygsreprints/ILMA/G90956_ILMA_vol68_no2
https://www.nxtbook.com/ygsreprints/ILMA/G89146_ILMA_vol68_no1
https://www.nxtbook.com/ygsreprints/ILMA/G87981_ILMA_vol67_no12
https://www.nxtbook.com/ygsreprints/ILMA/G85409_ILMA_vol67_no11
https://www.nxtbook.com/ygsreprints/ILMA/G83595_ILMA_vol67_no10
https://www.nxtbook.com/ygsreprints/ILMA/G81672_ILMA_vol67_no9
https://www.nxtbook.com/ygsreprints/ILMA/G80238_ILMA_vol7_no8
https://www.nxtbook.com/ygsreprints/ILMA/G79388_ILMA_vol7_no7
https://www.nxtbook.com/ygsreprints/ILMA/G78361_ILMA_vol7_no6
https://www.nxtbook.com/ygsreprints/ILMA/G77448_ILMA_vol7_no5
https://www.nxtbook.com/ygsreprints/ILMA/G75899_ILMA_vol67_no4
https://www.nxtbook.com/ygsreprints/ILMA/G75036_ILMA_vol67_no3
https://www.nxtbook.com/ygsreprints/ILMA/G72720_ILMA_vol67_no2
https://www.nxtbook.com/ygsreprints/ILMA/G72220_ILMA_vol67_no1
https://www.nxtbook.com/ygsreprints/ILMA/G70970_ILMA_vol66_no12
https://www.nxtbook.com/ygsreprints/ILMA/G69813_ILMA_vol66_no11
https://www.nxtbook.com/ygsreprints/ILMA/G67522_ILMA_vol66_no10
https://www.nxtbook.com/ygsreprints/ILMA/G66343_ILMA_vol66_no9
https://www.nxtbook.com/ygsreprints/ILMA/G64859_ILMA_vol66_no8
https://www.nxtbookmedia.com