Cybercrime & Breach Impact Questions www.pwc.com American Bar Association Criminal Justice Section June 6, 2014.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

In Harmony, In the Cloud: Harmonizing Data Protection Rules In a Cross-Border World Steve Mutkoski Worldwide Director Policy Microsoft Corporation.
Warm-up: Feb. 20 Label the image on your own sheet.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Chapter 14 Crime and Justice in the New Millennium
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Chapter 11 – The federal court system
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
6.3 Implementing & Enforcing Laws. Regulatory Commissions  Commissions established by the government to oversee certain areas.  Federal Trade Commission.
SSA, Todd Petrie The AMLA Presentation: 3/18/2009.
Cybersecurity Governance in Ethiopia
Information Warfare Playgrounds to Battlegrounds.
© 2011 Foley Hoag LLP. All Rights Reserved. 1 What Law Applies In “the Cloud”? And how far into the Cloud does Massachusetts law extend? A CloudCamp Boston.
Cyber Security Nevada Businesses Overview June, 2014.
Warm up? What kinds of services do you think the government should be responsible for?
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
POLICE OF THE CZECH REPUBLIC NATIONAL DRUG HEADQUARTERS CRIMINAL POLICE AND INVESTIGATION SERVICE Beograd,
TRANSNATIONAL ORGANISED CRIME SECRET. CCSS TIER 1 THREATS: IMMEDIATE SIGNIFICANT THREAT.
Information Warfare Playgrounds to Battlegrounds.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
The Executive Branch Enforcing and Executing the law.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Chapter 4: Laws, Regulations, and Compliance
Section 2 -Lower Federal Courts. Federal Judges: Just like members of Congress do the work of the legislative branch, federal judges do the work of the.
Government Agencies. State Department 1789 French Revolution caused us to think about having an agency that deals with other countries Secretary of State.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
A Unique Challenge INTERNATIONAL ORGANIZED CRIME.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
International Crime.  Any thoughts?  Some points to consider:  Jurisdiction – how can nations/individuals/communities prosecute crimes originating.
BOSNIA AND HERZEGOVINA MINISTRY OF SECURITY Reform of Security Sector in Bosnia and Herzegovina October, 2005.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Dr. Heike Neuhaus. Federal Prosecutor General Head of Department Central Tasks; Espionage Staff Espionage 1 Espionage 2 Administration EU IT Espionage.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Maritime Security as an Integral Part of an
Federal Bureau of Investigation
CRIA/IPEF Conference on Internet & Power
Advanced Income Tax Law
UNIT IV – Legislative and Executive Branches
Investment climate and Innovation in europe
External Influences on Telecommunications in the Enterprise
Domestic Policies We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide.
The U.S. Constitution.
Final Project Part 1: Paper and Storyboard
Cybersecurity Threats and Opportunities in Latin America
The Judicial Branch November 10, 2014 Standard: SS8CG4
Crime Lab Agencies.
Trade Secrets 2018: International
Combatting Customs Frauds
LO1 - Know about aspects of cyber security
Risk Articulation Articulation Translation to Risk Register
Warm Up – April 3 Grab the handout from the front and answer the following questions on a post it: What is burden of proof? Preponderance of evidence?
Warm Up – April 2 Answer the following question on a post it:
Criminal Investigations
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

Cybercrime & Breach Impact Questions American Bar Association Criminal Justice Section June 6, 2014

PwC Criminal Charges Against Foreign Military Hackers QUESTION: Do the recent grand jury indictments indicate the US is taking a hard stand against cyber espionage? 2

PwC Transnational Organized Crime QUESTION: Who’s winning the war: criminals or law enforcement? 3

PwC Regulated Data, Intellectual Property and Trade Secrets QUESTION: Which is the more significant target? 4

PwC Intellectual Property and Trade Secret Regulation QUESTION: Will regulation enhance security? And should regulation be applied? 5

PwC The Right to be Forgotten QUESTION: Clearly a technical, administrative and operational challenge, does the value of “the right to be forgotten” outweigh the burden? 6

PwC Information Sharing to Reduce Cybercrime QUESTION: The National Security Act of 1947 restricts what information the government may share with industry. Will legislation, such as HR 3523: Cyber Intelligence Sharing and Protection Act reduce cyber attack risk? And are there any risks in passing such legislation? 7

PwC European Union Privacy Enhancements QUESTION: Will EU privacy enhancements, such as COMM 2012, influence US law and regulation? And will it reduce cybercrime impact associated with the loss of personal data? 8

PwC Cybercrime and Punishment QUESTION: Many cyber attacks support trafficking in illegal arms, human beings, illegal drugs, child pornography, terrorist financing and other crimes. The attacks result in loss of jobs, tax revenue, increased business costs and other impacts. Do we need tougher laws? And are we adequately enforcing current laws? 9

PwC Cybercrime Jurisdiction QUESTION: Cyber breach history reflects inadequate international cooperation. How do we accelerate cooperation? And isn’t cooperation internally counter-productive for that nation-state if it engages in cyber espionage against the US? 10

PwC The Future of Digital Currency QUESTION: What is your position on the future of digital currency? Regulated? Unregulated? International adoption? 11

PwC When an Attack Occurs QUESTION: When did the attack occur? Where did it originate? Who is the attacker? What was the point of breach? Containment? What was compromised? Should law enforcement be involved? 12

PwC Contact Information MacDonnell Ulsch Managing Director PricewaterhouseCoopers LLP Cybercrime & Breach Response 125 High Street Boston, Massachusetts Telephone Mobile