1 / 16

2013 International White Collar Crime Conference London, United Kingdom

2013 International White Collar Crime Conference London, United Kingdom. October 2013. The Evolving Challenges of Investigating and Preventing Corporate Espionage and Cyber Crimes in the Twenty-First Century. Panelists

ceri
Download Presentation

2013 International White Collar Crime Conference London, United Kingdom

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 2013 International White Collar Crime Conference London, United Kingdom October 2013

  2. The Evolving Challenges of Investigating and Preventing Corporate Espionage and Cyber Crimes in the Twenty-First Century Panelists Neil H. MacBride, Former United States Attorney, Eastern District of Virginia Andy Archibald, Interim Head, National Cyber Crime Unit, UK National Crime Agency, London David Garfield, Managing Director of Cyber Security, BAE Systems Detica, London Jennifer Archie, Latham & Watkins, Washington, D.C. Moderator Scott Marrah, Kilpatrick Townsend, Atlanta

  3. Current Threat Landscape • The Insider • Financial Crime and Identity Theft • Cyber Espionage and Sabotage • Hacktivists • Piracy

  4. Taking a holistic view of the risk State of the Art Prepare Protect Monitor Respond

  5. Incident Response • What to Do First • Roles and Responsibilities • Forensics • In-House/Outside Counsel • Communications • Law Enforcement

  6. Immediate Judgment Calls • Whether to Report • Who to Tell • Affected Parties • Media • Public • Customers • What to Report

  7. Working with Law Enforcement • What to Expect • When to Report • Who to Call • How to Present • Government Perspectives

  8. Law Enforcement Requests • What Do They Typically Request? • Voluntary Cooperation or Formal Process? • Cross border cooperation and considerations

  9. Criminal Charges • Charges Available? • Challenges To Building Cases • Factors for Whether Investigation is Opened • Factors for Whether Case Is Charged

  10. Self Help • Civil Litigation to Investigate and Stop Computer Crimes • Positives & Negatives

  11. Specific Scenarios: Are you or your clients ready?

  12. Criminal Hacking • An anonymous criminal gang (seemingly based in Eastern Europe) hacks into a retailer’s website to obtain credit card and personal information about the retailer’s customers.

  13. Mislaid Data • An employee of a medical device company left a laptop on the train. The laptop was not encrypted or password protected. The laptop was recently backed up to the network and the IT Department reports that the misplaced laptop had locally stored email attachments and other documentation containing the personal data of 5,000 patients who had participated in a clinical trial of a new medical device.

  14. Insider Gone Bad • A senior executive at Company A left to set up his own company. Last week Company A learned that a large team was leaving to join the former executive. A look at the emails of the individuals involved shows that some of the departing employees emailed key, confidential documents to their personal email accounts immediately before announcing their resignation.

  15. State Sponsored Espionage (“Advanced Persistent threats”) • A major company discovers that a virus had been placed onto their computer systems, potentially allowing nearly unfettered access by unknown hackers for several months. Neither the extent of the loss, nor the identity of the perpetrator is clear.

  16. QUESTIONS

More Related