13
October 30, 2014 Don't be the next target

Working with law enforcement

Embed Size (px)

Citation preview

Page 1: Working with law enforcement

October 30, 2014 Don't be the next target

Page 2: Working with law enforcement

TO CATCH A CYBER CRIMINAL: TRENDS IN CYBER CRIME

Andreas Kaltsounis, Special Agent Department of Defense, Inspector General Andrew Friedman US Department of Justice, Western District of Washington Craig Spiezle, CEO & Executive Director Online Trust Alliance Timothy Wallach, Supervisory Special Agent, Cyber Task Force Federal Bureau of Investigation

Page 3: Working with law enforcement

Laws of Data • Your company includes “covered information” • You have regulatory requirement(s) • You will have a data breach incident

• If you are unprepared it will cost you • Direct expenses • Remediation • Brand • Business Shock

© 2014 All rights reserved. Online Trust Alliance (OTA) Slide 3

Page 4: Working with law enforcement

Lack of a Breach Plan

Page 5: Working with law enforcement

So Who You Gonna Call?

Page 6: Working with law enforcement

Open Dialog

• Contacting Law Enforcement • When, Who, Why, How

• Regulatory Requirements – • State, FTC, FCC, SEC ….. & International

• Incidents vs Attempts • The need for threat intel

Page 7: Working with law enforcement

Role of Law Enforcement

• What specific assistance can LE responders provide during or after an incident that adds value to an organization's incident response? What is outside the scope of LE?

Page 8: Working with law enforcement

Forensics – “Do Not Try This At Home”

Page 9: Working with law enforcement

Status of Federal Breach Legislation

• Two weeks ago President Obama stated, "Today, data breaches are handled by dozens of separate state laws, and it's time to have one clear national standard that brings certainty to businesses and keeps consumers safe."

Page 10: Working with law enforcement

Communications – Being Prepared

Page 11: Working with law enforcement

Summary • Be prepared! • Develop, test and update your plans quarterly • Complete an audit of all systems, data stores and cloud providers. • Develop a relationship with the appropriate Law Enforcement Agency

in the next 72 hours! • Validate your Boards “Risk Appetite”

Page 12: Working with law enforcement

Resources

• Data Breach Response Readiness Guide https://otalliance.org/breach • FBI Cybercrime Resources

http://www.fbi.gov/about-us/investigate/cyber/cyber • InfraGard https://www.infragard.org/ • Internet Crime Complaint Center (IC3) http://www.ic3.gov/default.aspx • U.S. Department of Defense

http://www.defense.gov/home/features/2013/0713_cyberdomain/

Page 13: Working with law enforcement

Contract Us

• Andreas Kaltsounis [email protected]

• Andrew Friedman

[email protected] • Craig Spiezle +1 425-455-7400

[email protected] • Timothy Wallach

[email protected]