Wild Dog AI Podcast

AI and Counterintelligence: Protecting National Interests with Smart Solutions

Indago Technologies Season 1 Episode 9

Summary

Jeremy Clark and Scott Sparks, co-founders of IXN Solutions, discuss the importance of counterintelligence (CI) and insider threat programs in protecting businesses and national security. They highlight the case of Lin Wai Ding, a former Google employee who sold proprietary information to China, as an example of the serious threats faced by technology companies. The conversation emphasizes the need for coordination between government and corporate entities to address these threats. Jeremy and Scott also stress the importance of building a comprehensive insider threat program that includes both technological solutions and employee engagement and education. In this conversation, Jeremy Clark and Scott Sparks discuss the importance of building an insider threat program for small and medium-sized technology companies. They provide six steps to building such a program, including understanding your supply chain, outsourcing research, and implementing a training program. They also emphasize the need for small businesses to protect against hiring foreign nationals and the importance of leveraging AI and generative AI in supply chain security and counterintelligence efforts.

Takeaways

  • Counterintelligence and insider threat programs are crucial for protecting businesses and national security.
  • Coordination between government and corporate entities is essential in addressing insider threats.
  • Technology companies, especially those working with the government, need to prioritize the protection of their proprietary information.
  • Building a comprehensive insider threat program involves both technological solutions and employee engagement and education.
  • Considering the supply chain and ensuring the security of materials and components is vital in developing secure technologies. Small and medium-sized technology companies should prioritize building an insider threat program to protect against potential security breaches.
  • Six steps to building an insider threat program include understanding your supply chain, outsourcing research, and implementing a training program.
  • Small businesses should be cautious when hiring foreign nationals and conduct due diligence to ensure their security.
  • AI and generative AI can greatly enhance supply chain security and counterintelligence efforts by quickly categorizing and analyzing large volumes of data.
  • Technologies like Logically AI, Flashpoint, and LexisNexis can be leveraged to aid in building insider threat programs.
  • The cost of building these programs is decreasing, making it more accessible for small businesses to implement effective security measures.





Thank you for tuning into the Wild Dog AI podcast. Stay connected with the frontier of intelligence and security by subscribing to our podcast on your favorite platform. Engage with us on LinkedIn HERE, and join the conversation by sharing your thoughts and questions. Together, let's lead the pack in understanding and leveraging the power of generative AI.

For more insights and episodes, visit us at Wild Dog AI Podcast. Continue the journey of innovation with us-because in the race against adversarial technologies, every insight counts.

Interested in seeing Indago in action? Visit us at indagotech.com and sign up for a free demo today. Discover how our platform can transform your intelligence report process.

Don't forget to follow us, rate us, and leave a review. Your feedback helps us grow and improve, bringing you more of the content you need to stay ahead.

People on this episode