SenSage CEO Joe Gottlieb explains how WikiLeaks was just the beginning of a larger challenge to come, in terms of compliance efforts and a future full of WikiLeaks-inspired content leakers. Headlines about WikiLeaks have died down in recent weeks. But the challenges public and private organizations face because of it will be major, according to the CEO of one security intelligence firm. Compliance efforts have already become more complicated in the aftermath. Then there are copycats who will inevitably try to build on what WikiLeaks started.For the full background and timeline on the WikiLeaks drama, CLICK HERE“WikiLeaks added a broad range of data types you now have to worry about with regards to compliance,” SenSage CEO Joe Gottlieb said as he clutched a cup of Starbucks during a face-to-face meeting with a CSO reporter Tuesday morning. “Now we have to protect all our inside chatter, beyond the e-mail monitoring that we’ve been used to.”Gottlieb acknowledged that this isn’t an entirely new situation. Pharmaceutical companies, for example, have long been terrified of the prospect of intellectual property leaking to the public or a competing company. Wikileaks simply put the problem into sharper focus for a wider range of industries. Meanwhile, he said, other entities are no doubt watching the WikiLeaks drama and looking for copycat opportunities.“A very secondary market for leaked information could emerge from WikiLeaks,” he said. “It gets more people thinking about how more intellectual property can be moved to eager consumers. It all comes down to where the money can be made.” More about WikileaksA Wikileaks timeline12/8/2010: MasterCard, PayPal see Wikileaks revenge attacks12/7/2010: Assange arrested in LondonHe’s definitely getting an earful from concerned clients about these challenges, especially those in the government sector. SenSage’s customers include defense and intelligence agencies in the U.S. and elsewhere, and such agencies as the U.S. Census, Department of Treasury and Veterans Affairs.“They’re increasingly concerned about the fallout from WikiLeaks,” he said.The best thing organizations can do is monitor internal communications and data collection carefully.“If you look at what precipitates a Wikileaks breach — if you want to call it that — is that a determined person downloads as much data as possible onto portable devices. One customer has us looking at all user accounts for download activity and large batches of content being assembled,” Gottlieb said.“WikiLeaks as a phenomenon won’t stop, just like the more conventional data breaches, because the people behind them are too diligent and motivated,” he added. “Monitoring is an important countermeasure.” Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe