October 2013
The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage
State of the Art Protect Respond Prepare Monitor
What to Do First Roles and Responsibilities Forensics In-House/ Outside Counsel Communications Law Enforcement
Whether to Report Who to Tell Affected Parties Media Public Customers What to Report
What to Expect When to Report Who to Call How to Present Government Perspectives
What Do They Typically Request? Voluntary Cooperation or Formal Process? Cross border cooperation and considerations
Charges Available? Challenges To Building Cases Factors for Whether Investigation is Opened Factors for Whether Case Is Charged
Civil Litigation to Investigate and Stop Computer Crimes Positives & Negatives
An anonymous criminal gang (seemingly based in Eastern Europe) hacks into a retailer’s website to obtain credit card and personal information about the retailer’s customers.
An employee of a medical device company left a laptop on the train. The laptop was not encrypted or password protected. The laptop was recently backed up to the network and the IT Department reports that the misplaced laptop had locally stored attachments and other documentation containing the personal data of 5,000 patients who had participated in a clinical trial of a new medical device.
A senior executive at Company A left to set up his own company. Last week Company A learned that a large team was leaving to join the former executive. A look at the s of the individuals involved shows that some of the departing employees ed key, confidential documents to their personal accounts immediately before announcing their resignation.
A major company discovers that a virus had been placed onto their computer systems, potentially allowing nearly unfettered access by unknown hackers for several months. Neither the extent of the loss, nor the identity of the perpetrator is clear.