Counterintelligence Conference - South Africa - Competitive Intelligence2024-03-29T13:07:14Zhttp://competitiveintelligence.ning.com/forum/topics/counterintelligence-conference-south-africa?commentId=2036441%3AComment%3A75441&feed=yes&xn_auth=noAnother viewpoint of the conf…tag:competitiveintelligence.ning.com,2012-10-03:2036441:Comment:762862012-10-03T19:55:54.353ZSteve Whiteheadhttp://competitiveintelligence.ning.com/profile/SteveWhitehead
<p>Another viewpoint of the conference posted here</p>
<p><a href="http://comsecllc.blogspot.com/">http://comsecllc.blogspot.com</a></p>
<p> </p>
<p>Another viewpoint of the conference posted here</p>
<p><a href="http://comsecllc.blogspot.com/">http://comsecllc.blogspot.com</a></p>
<p> </p> Craig - Thank you for your co…tag:competitiveintelligence.ning.com,2012-09-23:2036441:Comment:761642012-09-23T16:12:39.783ZSteve Whiteheadhttp://competitiveintelligence.ning.com/profile/SteveWhitehead
<p>Craig - Thank you for your comments. We had a succesful conference with 64 people attending. Our main foreign keynote speaker was David G. Major, a retired senior FBI official, now the President of the Centre for Counterintelligence and Security Studies (CI Centre) in Washington D.C. (See <a href="http://www.cicentre.com/">www.cicentre.com</a>) You should seriously consider him in the future to talk at one of your SCIP conferences. He is an excellent speaker and a walking encyclopedia on…</p>
<p>Craig - Thank you for your comments. We had a succesful conference with 64 people attending. Our main foreign keynote speaker was David G. Major, a retired senior FBI official, now the President of the Centre for Counterintelligence and Security Studies (CI Centre) in Washington D.C. (See <a href="http://www.cicentre.com/">www.cicentre.com</a>) You should seriously consider him in the future to talk at one of your SCIP conferences. He is an excellent speaker and a walking encyclopedia on World events and the role that counterintelligence can play in the modern business environment.</p>
<p>Major was supported by three other American subject matter experts and eight South African speakers.</p>
<p>The conference was held over three days with everybody checking in on the Sunday afternoon at the game lodge. This was followed by a welcome reception and dinner. Some people arriving at the lodge on the Sunday afternoon were lucky to see a huge lion right at the entrance gate!</p>
<p>The conference programme started on the Monday morning and various speakers (including myself) explained to the attendees the concept of business counterintelligence and how it differs from traditional security and IT security practices and how business can benefit. Major gave a strategic overview of what is happening in the World, supporting it with case studies, facts and figures that are compiled by the CI Centre.</p>
<p>Others spoke about the scope of the threat, human vulnerabilities, the insider threat, motivational factors such as M.I.C.E., how to counter elicitation and social engineering attacks, the dark side of social media, the importance of having a robust technical surveillance countermeasures (TSCM) programme, vetting, testing the robustness of your own security programmes, countering competitive intelligence, etc.</p>
<p>There were also a few technical demonstrations highlighting telephone insecurities, the vulnerabilities of cellular telephones and other modern communication devices.</p>
<p>In between the presentations there were a number of networking opportunies, a game drive into the Pilanesberg natioanal park and on the final evening an African bush boma "braai" (barbeque) in the park.</p>
<p>We had attendees from five different countries and we have been requested to repeat the conference next year.</p>
<p>My recommendation is that businesses should seriously consider understanding how this discipline can help to safeguard their crown jewels. If you do not "pay now you will pay later" which could be far worse.</p>
<p>Please let me know if anybody requires additional information. I will post some of the photos in the next few days.</p>
<p>We have also formally launched BECSA, our new counterespionage assiciation during the conference. To read more about Business Espionage Countermeasures South Africa go to <a href="http://www.becsa.co.za/">www.becsa.co.za</a></p> Hey Steve: Your conference ad…tag:competitiveintelligence.ning.com,2012-09-20:2036441:Comment:761412012-09-20T13:55:42.500ZCraig S. Fleisherhttp://competitiveintelligence.ning.com/profile/CraigSFleisher
<p>Hey Steve: Your conference addresses a key and persistently important topic and looks to be another excellent event. Please do share with the community here your observations of how things went, and whether you think this is a topic that might lend itself to more regular events such as the one you hosted at one of my favorite places around... Kwa Maritane Bush Lodge!</p>
<p>Hey Steve: Your conference addresses a key and persistently important topic and looks to be another excellent event. Please do share with the community here your observations of how things went, and whether you think this is a topic that might lend itself to more regular events such as the one you hosted at one of my favorite places around... Kwa Maritane Bush Lodge!</p> Another keynote speaker is J.…tag:competitiveintelligence.ning.com,2012-08-12:2036441:Comment:754412012-08-12T05:34:40.087ZSteve Whiteheadhttp://competitiveintelligence.ning.com/profile/SteveWhitehead
<p>Another keynote speaker is J. D. LeaSure, Director of the Espionage Research iInstitute International (ERII) from Washington DC, USA.</p>
<p>Another keynote speaker is J. D. LeaSure, Director of the Espionage Research iInstitute International (ERII) from Washington DC, USA.</p>