2013 international white collar crime conference london united kingdom
Download
1 / 16

2013 International White Collar Crime Conference London, United Kingdom - PowerPoint PPT Presentation


  • 123 Views
  • Uploaded on

2013 International White Collar Crime Conference London, United Kingdom. October 2013. The Evolving Challenges of Investigating and Preventing Corporate Espionage and Cyber Crimes in the Twenty-First Century. Panelists

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' 2013 International White Collar Crime Conference London, United Kingdom' - ceri


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
2013 international white collar crime conference london united kingdom

2013 International White Collar Crime Conference London, United Kingdom

October 2013


The Evolving Challenges of Investigating and Preventing Corporate Espionage and Cyber Crimes in the Twenty-First Century

Panelists

Neil H. MacBride, Former United States Attorney, Eastern District of Virginia

Andy Archibald, Interim Head, National Cyber Crime Unit, UK National Crime Agency, London

David Garfield, Managing Director of Cyber Security, BAE Systems Detica, London

Jennifer Archie, Latham & Watkins, Washington, D.C.

Moderator

Scott Marrah, Kilpatrick Townsend, Atlanta


Current threat landscape
Current Threat Landscape Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • The Insider

  • Financial Crime and Identity Theft

  • Cyber Espionage and Sabotage

  • Hacktivists

  • Piracy


Taking a holistic view of the risk
Taking a holistic view of the risk Corporate Espionage and Cyber Crimes in the Twenty-First Century

State of the Art

Prepare

Protect

Monitor

Respond


Incident response
Incident Response Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • What to Do First

  • Roles and Responsibilities

  • Forensics

  • In-House/Outside Counsel

  • Communications

  • Law Enforcement


Immediate judgment calls
Immediate Judgment Calls Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • Whether to Report

  • Who to Tell

    • Affected Parties

    • Media

    • Public

    • Customers

  • What to Report


Working with law enforcement
Working with Law Enforcement Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • What to Expect

  • When to Report

  • Who to Call

  • How to Present

  • Government Perspectives


Law enforcement requests
Law Enforcement Requests Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • What Do They Typically Request?

  • Voluntary Cooperation or Formal Process?

  • Cross border cooperation and considerations


Criminal charges
Criminal Charges Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • Charges Available?

  • Challenges To Building Cases

  • Factors for Whether Investigation is Opened

  • Factors for Whether Case Is Charged


Self help
Self Help Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • Civil Litigation to Investigate and Stop Computer Crimes

  • Positives & Negatives


Specific scenarios are you or your clients ready

Specific Scenarios: Corporate Espionage and Cyber Crimes in the Twenty-First CenturyAre you or your clients ready?


Criminal hacking
Criminal Hacking Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • An anonymous criminal gang (seemingly based in Eastern Europe) hacks into a retailer’s website to obtain credit card and personal information about the retailer’s customers.


Mislaid data
Mislaid Data Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • An employee of a medical device company left a laptop on the train. The laptop was not encrypted or password protected. The laptop was recently backed up to the network and the IT Department reports that the misplaced laptop had locally stored email attachments and other documentation containing the personal data of 5,000 patients who had participated in a clinical trial of a new medical device.


Insider gone bad
Insider Gone Bad Corporate Espionage and Cyber Crimes in the Twenty-First Century

  • A senior executive at Company A left to set up his own company. Last week Company A learned that a large team was leaving to join the former executive. A look at the emails of the individuals involved shows that some of the departing employees emailed key, confidential documents to their personal email accounts immediately before announcing their resignation.


State sponsored espionage advanced p ersistent threats
State Sponsored Espionage (“Advanced Corporate Espionage and Cyber Crimes in the Twenty-First CenturyPersistent threats”)

  • A major company discovers that a virus had been placed onto their computer systems, potentially allowing nearly unfettered access by unknown hackers for several months. Neither the extent of the loss, nor the identity of the perpetrator is clear.


Questions

QUESTIONS Corporate Espionage and Cyber Crimes in the Twenty-First Century


ad