Sensitive Information Protection Community

 View Only
01 Apr, 2026 04:49 PM

Exploring Business Espionage - with Kevin D. Murray, CPP, CFE, CISM, CDPSE - 1 April 2026

Access the Replay 
Passcode: i!z%=A3r

Business espionage continues to evolve as new technologies make it easier than ever to capture and exploit sensitive information. In this webinar, the ASIS Sensitive Information Protection Community will explore the current landscape of business espionage, including how organizations are being targeted and the growing role of easily accessible surveillance technologies. Participants will discuss the challenges security directors face when identifying and confronting espionage threats, as well as the rise of “amateur spies” and the global proliferation of covert spy cameras. The session will also look ahead to emerging espionage technologies and what security professionals can do today to better protect sensitive information in the future.

Presenter: Kevin D. Murray, CPP, CFE, CISM, CDPSE, is a specialist in counterespionage, privacy protection, and Technical Surveillance Countermeasures (TSCM). For decades, he has worked at the intersection of corporate security, investigative technology, and electronic surveillance detection, helping organizations and individuals protect sensitive information from espionage, eavesdropping, and covert monitoring.  He is the founder of a professional consulting practice (Murray Associates - counterespionage.com) focused on identifying and defeating electronic surveillance threats in corporate, legal, and private environments. His expertise centers on Technical Surveillance Countermeasures (TSCM)—the discipline dedicated to detecting and neutralizing clandestine surveillance devices and electronic interception techniques. His book Is My Cell Phone Bugged? examines common misconceptions about mobile phone surveillance and explains the real risks associated with electronic monitoring. In his latest book, Corporate Espionage 101, he provides readers with an inside look at how espionage actually occurs in the business world and the steps that can be taken to protect valuable information.

Statistics
0 Favorited
27 Views
0 Files
0 Shares
0 Downloads

Related Entries and Links

No Related Resource entered.