BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

How Much is Goldman’s Code Worth?

Posted December 6, 2010    Peter McCalister

The trial of a former Goldman Sachs programmer accused of stealing source code to take to a competitor has begun in somewhat of a public spectacle. The Wall Street Journal unveiled some particularly interesting details. For example, the programmer was one of the highest paid in the company with a $400,000 annual salary, but competitor Teza Technologies offered him over $1 million in total pay including a $700,000 bonus.

Greedy much?

So how does the highest paid programmer of one of the largest investment banks in the world get a nearly three-fold salary hike by a much smaller competitor? Ok, ok, he’s innocent until proven guilty, but if he is guilty, I would bet a good chunk of cash that the $1 million paycheck was the price the company was paying for Goldman’s code.

Here’s the breakdown. He was offered $300,000 in salary, $700,000 in bonus and $150,000 in profit sharing. Here’s my question to you – which portion of his pay do you think was (could be) the bribe and could the programmer have gotten more? How much is Goldman’s source code worth?

Personally I think he was drastically underpaid for the value of the code, but a clean million is plenty to motivate someone to steal data despite the actual value of the stolen property being much higher.  Unfortunately this could be construed as a case of dealing with the symptom instead of the disease.  Had a least privilege solution been instituted then he wouldn’t have had the ability to misuse privilege and accomplish the theft at any price.

Leave a Reply

Additional articles

skeletonkey3_713678_713680

Stopping the Skeleton Key Trojan

Posted June 29, 2015    Robert Auch

Earlier this year Dell’s SecureWorks published an analysis of a malware they named “Skeleton Key”. This malware bypasses authentication for Active Directory users who have single-factor (password only) authentication. The “Skeleton Key” attack as documented by the SecureWorks CTU relies on several critical parts.

Tags:
, , , , ,
webinar 2

On Demand Webinar: 10 Steps to Building an Effective Vulnerability Management Program

Posted June 26, 2015    BeyondTrust Software

In this on demand webinar, Cybersecurity Expert, Derek A.Smith will take you through his 10 steps for a successful vulnerability management program and how to get started now.

Tags:
, ,
AHHA_PRO.LOGO

Privileged Account Management – Another AH-HA in Cyber Security

Posted June 25, 2015    Nigel Hedges

I strongly believe that the Top 4 mitigation strategies don’t just simply apply to Australian organizations, it should be a global realization, a worldwide “ah ha!” for those still not quite understanding the importance here. Here’s a refresher (or intro) on the Top 4 mitigation strategies. Read on…

Tags:
, ,