The Cyber5 Podcast

Defending Against Chinese State-Sponsored Espionage

Episode 34 of the podcast covers how enterprise can defend against Chinese state-sponsored espionage efforts to steal intellectual property.


  • Question 1 (01:00): What are the computer network exploitation and insider threat TTPs you’ve seen throughout your career to steal intellectual property on the part of the Chinese government?
  • Question 2 (04:09): What are some investigative examples of each?
  • Question 3 (09:35): What can companies do to protect themselves? What are the critical monitoring mechanisms that are critical to detecting a breach?
  • Question 4 (13:51): What are the critical monitoring mechanisms to put in place on insider threat?
  • Question 5 (16:15): If you were advising a CISO with limited budget, and this was your biggest threat, what would you prioritize?

Episode 34 | December 3, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks