Download presentation
Presentation is loading. Please wait.
Published byEdwin Campbell Modified over 8 years ago
1
October 2013
3
The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage
4
State of the Art Protect Respond Prepare Monitor
5
What to Do First Roles and Responsibilities Forensics In-House/ Outside Counsel Communications Law Enforcement
6
Whether to Report Who to Tell Affected Parties Media Public Customers What to Report
7
What to Expect When to Report Who to Call How to Present Government Perspectives
8
What Do They Typically Request? Voluntary Cooperation or Formal Process? Cross border cooperation and considerations
9
Charges Available? Challenges To Building Cases Factors for Whether Investigation is Opened Factors for Whether Case Is Charged
10
Civil Litigation to Investigate and Stop Computer Crimes Positives & Negatives
12
An anonymous criminal gang (seemingly based in Eastern Europe) hacks into a retailer’s website to obtain credit card and personal information about the retailer’s customers.
13
An employee of a medical device company left a laptop on the train. The laptop was not encrypted or password protected. The laptop was recently backed up to the network and the IT Department reports that the misplaced laptop had locally stored email attachments and other documentation containing the personal data of 5,000 patients who had participated in a clinical trial of a new medical device.
14
A senior executive at Company A left to set up his own company. Last week Company A learned that a large team was leaving to join the former executive. A look at the emails of the individuals involved shows that some of the departing employees emailed key, confidential documents to their personal email accounts immediately before announcing their resignation.
15
A major company discovers that a virus had been placed onto their computer systems, potentially allowing nearly unfettered access by unknown hackers for several months. Neither the extent of the loss, nor the identity of the perpetrator is clear.
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.