AMD Suit Offers Lessons On Punishing Insider Thieves

  /     /     /  
Publicated : 22/11/2024   Category : security


AMD Suit Offers Lessons On Punishing Insider Thieves


Theft of 150,000 documents by AMD employees defecting to nVidia and subsequent lawsuit shows value of monitoring and forensics spend



A long-waged a turf war in the CPU and GPU arena was tinged with allegations of dirty fighting this month when chipmaker
AMD brought suit against former employees it accused of stealing sensitive information during their defection to competitor nVidia
. Security industry veterans call it a classic case of insider theft. They say it provides a good opportunity for CISOs to educate line-of-business leaders about the importance of security controls designed not just for prevention but also for forensics that enable organizations to sic the legal dogs on thieves who still find a way to steal.
Its a classic case that weve seen play itself out a lot over the last ten years, says Eddie Schwartz, CISO at RSA. We are seeing more and more intensity from both security teams and legal teams who are trying to get visibility into insider threat issues and then taking that visibility to specific actions.
[How can cloud activity increase insider risks? See
Clouds Privileged Identity Gap Intensifies Insider Threats
.]
Insider risks may not necessarily be as pervasive as outside risks pummeling IT each day or even as prevalent as some security marketers make the insider threat scenario out to be, but when not properly addressed it can be devastating, Schwartz says.
Its certainly easy enough for people on the inside to intentionally or unintentionally collaborate with people on the outside to transfer intellectual property or to intentionally take inventions and secrets with them on their way out the door, he says.
In AMDs case, the company alleges that after a key manager moved over to nVidia, he broke non-solicitation agreements to recruit three other employees. Between the four of them, AMD lawyers claimed they stole more than 150,000 files. Among the files that AMD claims to have forensic evidence to show the former employees stole, data included licensing agreements, strategic business plans and a 200-file database containing product and chip manufacturing details. According to Schwartz, the forensic work that AMDs security team did to help its legal team offers a valuable point of reference for CISOs around the industry wishing to justify security spend.
I think what security people should take away from this is, heres an example where clearly the use of security technology and a security teams close work with other functions of the business demonstrates the value to the organization of what they provide, he says. Through a combination of good information about their network and by good collaboration with legal, HR and so-on, they were able to make some agile decisions to take action to potentially protect their intellectual property.
He believes that security organizations need to do a better job balancing security spend between preventative technology and other technology like monitoring and analytics that can help with forensics when threats sneak through prophylactic measures. This may be a sea change for some organizations that in the past have heavily favored preventative measures in the hopes of a cure-all fix.
I think a lot of organizations have now said, We cant do that anymore. We have to try to move more toward a detective and forensics-based approach approach where we use concepts like big-data analytics to try to predict the unknown, he says. Inevitably, when things do happen, they can also help with the aftermath of some incident.
Of course, theres often overlap between the two domains, particularly when it comes to identity and access management tools. Access management plays a pivotal role in prevention, but even when operational constraints dont block a thief from resources it lies at the foundation of monitoring technology that leaves the evidentiary data necessary to take legal action like the case AMD is pursuing.
Access management is key because theres an entire set of processes around access to certain applications and data, says Chris Radkowski, director of solution management for GRC at SAP. So we definitely feel that having process in place where theres approvals that can track who got access to something, how they were approved, how long was it valid for and that kind of thing is critical. Especially when youre confronted with having to deal with (the crises of), Oh my gosh, someone has stolen 100,000 documents. How and when did they do it?
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security

▸ Homeland Security Background Checks Breach Raises Concerns. ◂
Discovered: 23/12/2024
Category: security

▸ Fully committed to the future world of technology. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
AMD Suit Offers Lessons On Punishing Insider Thieves