Lockheed Martin Challenge
Theft of intellectual property is an increasing threat to organizations, and can go unnoticed for months or even years. Additionally, there are increased incidents of employees taking proprietary information when they believe they will be, or are, searching for a new job.
Congress has continually expanded and strengthened criminal penalties for violations of intellectual property rights to protect innovation and ensure that egregious or persistent intellectual property violations do not merely become a standard cost of doing business.
A domestic or foreign business competitor or foreign government intent on illegally acquiring a company’s proprietary information and trade secrets may wish to place a spy into a company in order to gain access to non-public information. Alternatively, they may try to recruit an existing employee.
Your challenge is to visualize the risk posture of the employee base and identify top potential insider threats based on predictive analysis of data sets and the use of publicly available risk indicators:
- Patterns and/or inconsistencies in travel & phone records
- Inconsistencies regarding actual versus planned physical location
- Personal stressors such as poor performance reviews or demotion
- Birth country and/or citizenship in high risk countries
Additionally, the presence of abnormalities or the absence of normality should weigh into your analysis.
Data and Additional Resources
The data sets you have been provided have been generated for the purposes of this competition and do not represent actual Lockheed Martin data or employee personal records. They are as follows:
- Employee personal and contact information
- Employee travel records
- Employee phone records
- Employee performance records
- Employee citizenship records
- Server access logs
Data Set (single Excel workbook with multiple tabs) [Lockheed Martin-provided file]
The following resources can also inform your analysis
Software Engineering Institute Publication: Common Sense Guide to Mitigating Insider Threats 4th Edition
Want more data related to this challenge? Check out the Temple Library Analytics Challenge guide.