Jarrett Kolthoff, Advisor - Corporate Legal Counsels.

Slides:



Advertisements
Similar presentations
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Advertisements

Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
Association of Corporate Counsel Houston Chapter Meeting of June 8, 2010 What to Do When the Feds Come Knocking In-House Responsibilities for Criminal.
The WHO WHAT WHY and HOW of Using Paralegals: Leveraging Paralegals in your Law Department  Toni Marsh, Esquire The George Washington University  You.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Business Crisis and Continuity Management (BCCM) Class Session
Viewpoint Consulting – Committed to your success.
OHIO OFFICE OF INFORMATION TECHNOLOGY. Even the agents are suffering…
Human and Technology Capital Advisors, LLC “Where Financial Accretion Intersect with People and Technology” April 3, 2008.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Corporate Ethics Compliance *
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
ISA 220 – Quality Control for Audits of Historical Financial Information
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Chapter 4 Risk Assessment.
Internal Auditing and Outsourcing
Sapient Insurance Partners. Overview & Services We have almost four decades of combined experience in the property & casualty insurance and reinsurance.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Due Diligence - The Regulator’s Perspective ABA Telephone/Webcast Briefing August 14, 2001 Cynthia Bonnette, Assistant Director FDIC Bank Technology Group.
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
1-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
HIPAA PRIVACY AND SECURITY AWARENESS.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
CORPORATE COMPLIANCE Tim Timmons Vice President Compliance and Regulatory Services Health Future, LLC.
Chapter 01 The Role of the Public Accountant in the American Economy McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
©2008, Promega Corporation. All rights reserved. ©2007, Promega Corporation. All rights reserved. Global Financial Crisis -- Practical Implications for.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Marco Nasca Senior Director, Client Solutions TRANSFORMING DISCOVERY THROUGH DATA MANAGEMENT.
Why the Office of Compliance and Ethics was Created
Maximizing Captive Value Through Teamwork. Speakers: Irena Kaler, Executive Director/CAO, RWJ Health Network Insurance Services Ken Rand, Managing Director,
Chapter 6 CRISIS MANAGEMENT. Introduction - Crisis: ◦is a situation that specifically involves a pharmaceutical product, medical device or activity with.
The Third Annual Medical Device Regulatory, Reimbursement and Compliance Congress How to establish a Compliance Program that will Minimize the Impact of.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Item 5d Texas RE 2011 Budget Assumptions April 19, Texas RE Preliminary Budget Assumptions Board of Directors and Advisory Committee April 19,
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
Balance Between Audit/Compliance and Risk Management- Best Practices FIRMA 21 st National Training Conference Julia Fredricks, U.S. Chief Compliance Officer.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
Pharmaceutical Regulatory and Compliance Congress and Best Practices Forum Special Program for Internal/Compliance Audit Professionals: Enterprise Risk.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Trade Compliance Considerations April 13, © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
1Third Party Assurance Optimization and Control RationalizationCopyright © 2016 Deloitte Development LLC. All rights reserved. Third-Party Assurance (TPA)
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cybersecurity as a Business Differentiator
Information Security Program
CPA Gilberto Rivera, VP Compliance and Operational Risk
Data Minimization Framework
Information Security: Risk Management or Business Enablement?
General Counsel and Chief Privacy Officer
Neil Kirton and Zoë Newman
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Introduction to Digital Forensics
Presentation transcript:

Jarrett Kolthoff, Advisor - Corporate Legal Counsels

“It’s not what you are… it’s what you’re not.” - Chief Legal Officer, Large Defense Contractor

Who We Are Who We Are Advisory Team Advisory Team Corporate Counsel’s Challenges Corporate Counsel’s Challenges Case Studies Case Studies

Who we are: Who we are: Specially trained experts offering advisory services to the General Counsel - Chief Legal Officer, Chief Compliance Officer, and Audit Committee Chairman leading companies representing America’s Critical Infrastructure and Strategic National Assets. We understand Civil Legal Procedure, Intellectual Property, Antitrust, and Regulatory Compliance, and our team builds secure, trust relationships with corporate officers chiefly responsible for corporate Governance, Risk Management and Compliance (GRC). We offer: Multi-Disciplined Counterintelligence (Methodology & Toolset) An intelligence gathering organization that leverages all available sources of information including Human Intelligence (HUMINT), eDiscovery / Digital Forensics, Law, and Open Source Evidence Collection, utilized in the protection of our client’s Brand Asset.

Michael Fagan Former Asistant United States Attorney General, Eastern District of Missouri -United States Department of Justice John KeplerJarrett Kolthoff Intellectual Property AttorneyFormer U.S. Counterintelligence Agent -Gallop, Johnson & Neuman-U.S. Army William Linnenbringer Former Partner and Chairman, Global Financial Services Industry Practice -PricewaterhouseCoopers LLP Jerry McElhattonTom Saey Former President, TechnologyCEO -MasterCard International- Saey US Consulting Norman Tice James Wright Former Chairman of the BoardCPA MasterCard International- Wright Criscione, PC Advisory Team

Management of Governance Risk Compliance Corporate Brand Management Theft of Intellectual Property Interaction with Governmental Entities Collusion / Embezzlement Various Civil Litigation Matters eDiscovery – Digital Forensics Contract Compliance  Software Development Agreements  Third Party Vendor Risk Profiles Obtaining un-conflicted Advice Management of Governance Risk Compliance Corporate Brand Management Theft of Intellectual Property Interaction with Governmental Entities Collusion / Embezzlement Various Civil Litigation Matters eDiscovery – Digital Forensics Contract Compliance  Software Development Agreements  Third Party Vendor Risk Profiles Obtaining un-conflicted Advice Corporate Counsel’s Challenges

CASE STUDIES

Sanctions - eDiscovery Client: International Firm CHALLENGE Headline Case: International Corporation Facing Sanctions for the internal mishandling of Material Evidence APPROACH  Worked with Corporate Legal Counsel to establish a strategy prior to embarking upon response  Fixed the client’s issues, eliminating the threat of sanctions, and completed the case prior to deadline in a fraction of the time allowed by the court  Helped litigation team rebuild the court’s confidence in the evidence  Significantly decreased the client’s cost of litigation RESULTS Re-engineered practices, policies and procedures to improve efficiency and reduce the cost of future litigation Enabled Corporate Counsel the ability to respond rapidly / accurately in the future Established a means to gather real-time enterprise knowledge

Probe, Investigation, Forensic Examination Client: International Firm CHALLENGE Global Firm Loses Several Key Executives in Major Markets to Competitor APPROACH  Respond to a corporate espionage case and immediately began work with internal and external counsel and chief executives  All systems and logs were requested and a forensic analysis was initiated  Triaged the situation and identified through intelligence collection efforts of a new company that the resigned employees had started  Conducted forensic analysis and identified the data stolen via s, USB drives and printed documents to build our case. RESULTS Client was able to act decisively against this group and retained their client base Client now has the capabilities, methodologies and processes to identify and mitigate unethical behavior Client also has a strategy to mitigate threats and losses before they occur

PCI Breach Client: International Firm CHALLENGE Unknown Perpetrator Stealing Proprietary PCI Data from Client APPROACH  Isolated each point of intrusion and determined the best possible course of action.  Forensics, link analysis, time event charting, and association matrices provided key factors in unraveling case.  A final report was drafted and a briefing was provided to a select number of corporate officers.  Due to the seriousness of this event, the report was later elevated to the appropriate Federal Law Enforcement Agency which assisted in the apprehension and prosecution of this international crime ring. RESULTS International crime ring located and arrested by foreign agency New security practices, policies and procedures were implemented based on Best Practice guidelines

Contract Compliance Client: Healthcare Organization CHALLENGE Secure Enterprise Web Application offering sensitive medical information to the public APPROACH  Determined original architecture was ill-conceived and insufficient to meet objective  Threat Modeling determined that a multiple layered approach was the most appropriate  Provided training on Threat Modeling, Software Development Life Cycle practices, worked directly with the organization to understand their existing model, and introduced new practices into the overall architecture RESULTS Provided evidentiary valued information to Legal Counsel to recoup losses Helped establish an internal Gold Standard to ensure ethical “work product” from vendors

Additional Points for Consideration Cost Control – “do more with less” Tangible Results for Clients – top management and business units Real-Time Legal Risk Management Function Enterprise Intelligence – Enhanced Advisory Value Permeate Brand Loyalty within organization