Lessons in Innovation from the Criminal Underground
The topic of a Harvard Business Review feature article, this presentation draws surprising parallels as to what legitimate businesses can learn about innovation from international organized crime–a two trillion dollar a year industry. Global criminals have become sophisticated managers of technology and talent and there are lessons to be learned in innovation and operations management for legitimate enterprises. For example, while businesses around the world are struggling to keep up in the era of big data, international organized crime is masterfully exploiting these opportunities.
Criminal groups have become experts in using the breaking news to create opportunities. Moments after a devastating earthquake or the death of a noted celebrity, the digital underground springs into action, releasing new scams and plots to leverage the news to their advantage. Major crime groups have also developed great expertise in outsourcing much of their business to specialists—money launderers, hit men or hackers. Cartels, triads and gangs know that cash is not the only incentive for their workforces and have developed elaborate mechanisms to keep their employees excited and challenged. Moreover, crime groups have become experts in “exploiting the long tail” in their business. Rather than seeking out the million dollar heist, bad guys have learned that it is much easier and sustainable to commit tens of thousands of much smaller digital crimes to keep profits flowing. The illicit transnational networks established for criminal collaboration across borders provides useful lessons for legitimate enterprise in how to thrive and survive in a networked world.
The Need for Cyber Executive Protection
What is your cyber risk profile? What do you look like to the outside world? As a twenty-first century security Sherpa, Marc will lead you on an eye-opening journey of the realities and risks in our cyber-connected, technologically laden world.
Technology pervades our life. Most of us would be lost without our smartphones, iPads, laptops, Tivos, digital cameras, GPS navigation devices, Facebook, Twitter, and Skype. While these tools can be of great utility, they also harbor an often ignored risk: the capability to threaten one’s business, finances, and family. All technologies can be hacked to provide a stealth window and an open door direct into an unsuspecting user’s home, office, family, or social life. As executives travel the world with their business plans, intellectual property, latest board minutes, and acquisition strategies stored on a panoply of electronic devices, sophisticated adversaries pose a persistent threat ready to steal the data of their choosing.
It is possible for an adversary to remotely turn on your laptop or smartphone’s microphone, and video camera, while simultaneously disabling the green “on” light. Your mobile phone leaks out your location 24 hours a day, and from this information a sophisticated pattern of your activities and associates can be aggregated and profiled. Your spouse or children could be readily targeted in social networking sites, and even extorted, as a means of getting to you and your business activities.
Perpetrators are no longer simply teenage hackers, but also sophisticated transnational organized crime groups, highly-effective nation states, and corporate competitors—each seeking to gather as much cyber intelligence on you as you will unwittingly allow. In this fascinating talk, Marc provides both strategy and tactics for executives to manage and mitigate risk in our interconnected world.
The Future of Financial Crime
Financial fraud is on the rise and transnational criminal networks are innovating more quickly than business and government can keep up. The result: fraud on a mass scale across the enterprise in all sectors. In this riveting presentation, Marc Goodman explains how technologies, such as artificial intelligence are being leveraged to create vast networks of fraudulent identities and shell accounts. Discover how new and emerging forms of money, such as virtual encrypted currencies, are being incorporated into the latest criminal modus operandi to circumvent AML and BSA compliance. Hear how algorithmic-based transactions may place firms at risk—especially when the underlying algorithms are poorly understood or easily circumvented by trusted insiders. There is hope, however, including opportunities to proactively leverage emerging forms of open source intelligence (OSINT) to uncover and prevent fraud before it arises. Marc will share the latest intelligence on criminal tradecraft in the world of financial crime, including a thought-provoking analysis of what industry must do to prevent mass disruption to their business models moving forward.
Emerging Security & Privacy Threats in Medicine and Healthcare
Increasingly technology is being integrated into every aspect of medicine and healthcare, with radical—and often poorly understood—implications for both privacy and security. Medical records are being digitized at an astounding rate, but are rarely protected adequately. Moreover, implanted medical devices, ranging from cardiac defibrillators to insulin pumps, have recently been successfully targeted by hackers with potentially deadly results. When these devices fail or are compromised, how will care be effectively rendered? Organized crime groups are committing tens of billions of dollars of healthcare fraud globally, to include holding tens of thousands of patient records ransom, unless blackmail demands are met. Counterfeit medicines pose a threat not just to the intellectual property rights of their developers, but also to an unwitting public at large. Even DNA itself—the world’s original computer operating system—is being hacked through a vibrant network of garage synthetic biologists. While these fast-paced advances in science hold phenomenal opportunities to cure disease and diminish human suffering, they also are opening the door for criminals, fraudsters and even terrorists to target the world of medicine and healthcare in ways never previously thought imaginable. In the fascinating discussion, Marc will present a compelling overview on the latest criminal tradecraft affecting the healthcare industry and will reveal which emerging threats to medicine loom on the horizon. Marc will offer his analysis and thoughts on how to detect, prevent and prepare for these threats before they occur.
The Unwitting Sharing Economy
Everyday, we connect more and more devices to the Internet. It started with desktops, laptops, mobile phones and now tablets. We’ve attached our critical infrastructures, financial systems, and electrical grids to the Net, along with elevators, street lights, fire alarms and pacemakers. Soon, we will be living in increasingly instrumented and interconnected smart cities replete with ubiquitous sensors.
While the positive aspects of the Internet are manifest, its network vulnerabilities have been proven time and time again. Nevertheless, we continue to steamroll ahead, putting all our systems online without much serious regard for either the inherent risks or system complexities. Should we be marching blindly forward without serious consideration of the implications for business and government? How will we respond when it all comes crashing down? How can we prepare for that eventual day? In this captivating presentation, Marc will discuss the unintended consequences that do, and will, arise from our growing dependence on technology as well as provide unconventional insights and preventative measures that can be applied to avoid potential pitfalls.
In Screen We Trust
We are increasingly living in an intermediated world—one in which the majority of our information no longer comes from our direct observations in the “real world,” but rather through a multitude of computer screens. Computers and other electronic gadgets provide us with a constant flow of information. Caller ID tells us who is phoning. The return address of the email lets us know who has written. A check of the store’s inventory system tells how many products are left in stock. Electronic hospital records tell us the patient’s blood type, which arm is to be operated upon, and list known allergic reactions.
The friend request from your co-worker had his picture in the profile, so mustn’t it be legitimate? The voice on our answering machine seems to be from our spouse, but is it? In the information age, we rely on digital technologies to serve as the modern day oracle, providing answers to our never-ending questions. Digital information, however, is infinitely malleable. Caller ID, emails, and even GPS locations are easily spoofed. Exact voice replicas can be synthesized to say anything we want them to, and dead celebrities can be brought back to life to appear in commercials via virtual and holographic technologies.
So, why do we believe anything? How can we tell what is fake and what is not? How might these advances in technology be used against us? This talk will provide the audience with a healthy appreciation for what is possible, what can be spoofed, how to approach digital data with a skeptical eye, and how to survive and thrive in our increasingly intermediated digital world.