Presentation is loading. Please wait.

Presentation is loading. Please wait.

October 2013. The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.

Similar presentations


Presentation on theme: "October 2013. The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage."— Presentation transcript:

1 October 2013

2

3 The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage

4 State of the Art Protect Respond Prepare Monitor

5 What to Do First Roles and Responsibilities Forensics In-House/ Outside Counsel Communications Law Enforcement

6 Whether to Report Who to Tell Affected Parties Media Public Customers What to Report

7 What to Expect When to Report Who to Call How to Present Government Perspectives

8 What Do They Typically Request? Voluntary Cooperation or Formal Process? Cross border cooperation and considerations

9 Charges Available? Challenges To Building Cases Factors for Whether Investigation is Opened Factors for Whether Case Is Charged

10 Civil Litigation to Investigate and Stop Computer Crimes Positives & Negatives

11

12 An anonymous criminal gang (seemingly based in Eastern Europe) hacks into a retailer’s website to obtain credit card and personal information about the retailer’s customers.

13 An employee of a medical device company left a laptop on the train. The laptop was not encrypted or password protected. The laptop was recently backed up to the network and the IT Department reports that the misplaced laptop had locally stored email attachments and other documentation containing the personal data of 5,000 patients who had participated in a clinical trial of a new medical device.

14 A senior executive at Company A left to set up his own company. Last week Company A learned that a large team was leaving to join the former executive. A look at the emails of the individuals involved shows that some of the departing employees emailed key, confidential documents to their personal email accounts immediately before announcing their resignation.

15 A major company discovers that a virus had been placed onto their computer systems, potentially allowing nearly unfettered access by unknown hackers for several months. Neither the extent of the loss, nor the identity of the perpetrator is clear.

16


Download ppt "October 2013. The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage."

Similar presentations


Ads by Google