Cybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013

Similar documents
Computer Forensics in Investigations and in Court

In Brief. Just the Facts

Case Study: Hiring a licensed Security Provider

KIMMONS INVESTIGATIVE SERVICES, INC. Texas Largest & Most Experienced Investigative Firm

KIMMONS INVESTIGATIVE SERVICES, INC.

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

U. S. Attorney Office Northern District of Texas March 2013

A Guide to Forensic Accounting Investigation. 2nd Edition

How To Protect Your Data From Theft

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

THE WORLD IS MOVING FAST, SECURITY FASTER.

OCIE Technology Controls Program

For Private circulation only Creative. Clear. Focused. Forensic Services

Statement of Qualifications Cybercrime & data breach

Cybersecurity: Protecting Your Business. March 11, 2015

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Information Security Addressing Your Advanced Threats

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Computer Forensics Preparation

Cybersecurity and internal audit. August 15, 2014

Cybersecurity y Managing g the Risks

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Data Breach Lessons Learned. June 11, 2015

Reducing Cyber Risk in Your Organization

Privacy Rights Clearing House

How To Help Your Business With Data Security And Privacy

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

OCIE CYBERSECURITY INITIATIVE

Data Privacy and Cybersecurity Task Force

Attachment A. Identification of Risks/Cybersecurity Governance

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

National Cybersecurity Awareness Campaign

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

How To Protect Your Cybersecurity From Cyber Incidents

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh

SUMMARY SELECTED EXAMPLE ENGAGEMENTS. Jerry Hatchett

How To Protect Yourself From Cyber Threats

Corporate Spying An Overview

The Importance of Privacy & Data Security in a Changing World

VES Privacy Policy Effective Date: June 25, 2015

BSA GLOBAL CYBERSECURITY FRAMEWORK

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Global Security Program Overview

Continuing Legal Education Program Course Catalog

Managing cyber risks with insurance

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

Cyber Security Solutions Integrated. Proactive. Resilient.

Cyber Insurance Presentation

PREPARE YOUR INCIDENT RESPONSE TEAM

Information Security Law: Control of Digital Assets.

Clients Legal Needs in HIPAA Security Compliance

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

WRITTEN TESTIMONY OF

Microsoft s cybersecurity commitment

Forensic Services. kpmg.hu

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Security Overview. BlackBerry Corporate Infrastructure

SMALL BUSINESS PRESENTATION

Questions You Should be Asking NOW to Protect Your Business!

INTRODUCTION DEVELOPMENT AND PHENOMENA

Central and Eastern European Data Theft Survey 2012

The Practical Realities of Cybersecurity

KEY STEPS FOLLOWING A DATA BREACH

PwC Cybercrime US Center of Excellence

Unprecedented Hacking and Trading Scheme Highlights Important Cybersecurity Lessons

How To Secure An Extended Enterprise

ITAR Compliance Best Practices Guide

Special Report The HITECH Act

e-discovery Forensics Incident Response

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Working with the FBI

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Anatomy of a Privacy and Data Breach

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Connect Smart for Business SME TOOLKIT

Always Worry About Cyber Security. Always. Track 4 Session 8

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Transcription:

Cybersecurity Opportunities Presented to: National Professional Science Masters Association November 13, 2013

Overall Themes For Discussion Advice for Grads Your Degree Is A Place To Start. It does not dictate your destiny It adds flexibility and says a lot about you Don t be constrained by what you see/know today Network, network, network (did I say network?) 2

Cybersecurity Is A Broad Concept Opportunities Abound Some obvious areas: CIA (Confidentiality, Integrity, Availability) Broken down into: Network Security Application Security Anti-Virus, Data Leakage Protection, Application Integrity, Authentication, Authorization, Cryptography, Physical Security..too many to list. 3

Our Service Offerings Forensics & Investigatio ns Discovery & Disclosure Defend & Respond Intelligen ce DIGITAL FORENSICS INVESTIGATIONS FORENSIC ACCOUNTING DATA DISCOVERY DATA DISCLOSURE INCIDENT RESPONSE SECURITY SCIENCE COMPLIANCE NAVIGATION INTELLIGENCE & DUE DILIGENCE DATA ANALYTICS NEUTRALS, MASTERS & MONITORS 4

Firm Highlights Market Growth Number of Clients Year 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 # of Clients 12 225 425 Blue Chip Clients: 8 of the Fortune 10 (2012 list - revenues) 30 of the Fortune 50 (2012 list - revenues) 94 of the AmLaw 100 (2013 list gross revenues) No industry sector or complexity of client need is beyond our scope of service 5

World Class Talent Drawn From Top Organizations World Class Talent Drawn From Top Organizations Former US Federal Cybercrime Prosecutors; FTC and SEC Managers; Special Agents of the FBI, IRS, and Postal Inspection Service; Private Technology Lawyers, Litigators, and IT Specialists; Agents or Directors from US Air Force Office of Special Investigations (AFOSI); Big Four Accounting Firms, Investment Banks, and the British Army. 6

Thought Leaders 7

Successful & Cutting Edge Engagements Trial expert in Facebook founder s contract dispute Heartland data breach response Government s expert in Enron barge trial Sony s expert in digital rights media investigation by 12 attorneys general Source code review for Google wifi matter RNC s expert in White House records act investigation Martha Stewart Omnimedia s expert in securities fraud case Consultant to special master in AMD v. Intel antitrust case Investigate spyware for Federal Trade Commission Advisor to attorneys general task force tjx breach 8

Forensics & Investigations - DIGITAL FORENSICS - INVESTIGATIONS - FORENSIC ACCOUNTING - NEUTRALS, MASTERS & MONITORS

DIGITAL FORENSICS Digital Forensics The best industry reputation and solutions for: Theft of Intellectual Property Social Networking Forensics Detection, Remediation of Data Deletion and Wiping Source Code Forensics and Comparisons E-Forgeries Computer Intrusions Spoliation Child Pornography in the Workplace Expert Testimony Neutral and Court-Appointed Forensic Examinations 10

Investigations A methodical, thorough and skilled approach to internal investigations, civil litigations, or criminal cases of: Embezzlement Fraud Workplace misconduct Bribery and foreign corrupt payments Money laundering Confidential information leaks Ponzi schemes Insider trading Illegal short selling Anonymous harassment 11

Forensic Accounting Our experienced professionals have conducted hundreds of complex investigations involving: Foreign Corrupt Practices Act (FCPA)/Anti-Bribery and Corruption (ABC) Intellectual Property/Trade Secrets Theft Money Laundering Embezzlement Insider Trading Securities Fraud Asset Tracing Procurement Fraud 12

Discovery & Disclosure - DATA DISCOVERY - DATA DISCLOSURE

Data Discovery End-to-end electronic discovery services, plus powerful tools: Proprietary Review Hosting Platform Anywhere, anytime access with 24/7 support Best-in-class searching, foldering, redacting, coding, and bulk-tagging functionality Secure, multi-party review from one data set EU Safe Harbor Certified Mobile Processing Unit Deployable 14

Defend & Respond - INCIDENT RESPONSE - SECURITY SCIENCE - COMPLIANCE NAVIGATION

Incident Response High-tech and investigative experts respond to, remediate, and help resolve an array of cyberrelated incidents including: Data Breach Authorized Access Lost Laptops, Servers, Backup Tapes Leaks of Confidential Information Theft of IP & Trade Secrets Identity Theft Advanced Persistent Threat Spyware & Other Invasive Software Botnets and Malicious Code Denial-of-Service ( DDoS ) Cyber-extortion & Cyberharassment Click Fraud & Affiliate Marketing Fraud Industrial Espionage Hacks, Unauthorized Access, Exceeding 16

Security Science A holistically analytic approach to IT and physical security: Scientific principles and methodologies to assess the spectrum of security risks Comprehensive assessment of your security risks Conduct interviews with key technology and business personnel Evaluate the electronic vulnerabilities of your information technology network Assess the physical security of your information assets Assist you in developing a risk-based security strategy that applies across key business processes and comports with your culture 17

Compliance Navigation Our compliance experts help regulated organizations better understand and successfully mitigate risks; offerings include: Developing, reviewing and analyzing comprehensive global compliance policies & procedures Training delivered with impact Robust remediation consulting Mobile Compliance Application: Navigator SM 18

Compliance Navigation Navigator SM is compliance made simple: First of it kind mobile application brings compliance policies to life Dynamic and interactive allows for simple questions and easy answers and/or approvals Users receive just the necessary information needed at that point in time whenever and where ever Provide analytics and facts for ondemand tracking, reporting and making informed data-driven compliance decisions Exclusively available through Stroz Friedberg 19

Intelligence - INTELLIGENCE & DUE DILIGENCE - DATA ANALYTICS

Intelligence & Due Diligence Minimizing risk and empowering decision making via insightful knowledge; we provide clients: Reputational due diligence investigations of corporate and other entities Background investigations of individuals, vendors and competitors Domestic and international source inquiries Red flag and enhanced due diligence reports 21

Closing Thought. There is more out there than you know. Be open to it. 22

THANK YOU strozfriedberg.com.. Kenneth A. Mendelson, CISSP, CIPP T: +1 202-464-5802 kmendelson@strozfriedberg.com.