Cybersecurity Opportunities Presented to: National Professional Science Masters Association November 13, 2013
Overall Themes For Discussion Advice for Grads Your Degree Is A Place To Start. It does not dictate your destiny It adds flexibility and says a lot about you Don t be constrained by what you see/know today Network, network, network (did I say network?) 2
Cybersecurity Is A Broad Concept Opportunities Abound Some obvious areas: CIA (Confidentiality, Integrity, Availability) Broken down into: Network Security Application Security Anti-Virus, Data Leakage Protection, Application Integrity, Authentication, Authorization, Cryptography, Physical Security..too many to list. 3
Our Service Offerings Forensics & Investigatio ns Discovery & Disclosure Defend & Respond Intelligen ce DIGITAL FORENSICS INVESTIGATIONS FORENSIC ACCOUNTING DATA DISCOVERY DATA DISCLOSURE INCIDENT RESPONSE SECURITY SCIENCE COMPLIANCE NAVIGATION INTELLIGENCE & DUE DILIGENCE DATA ANALYTICS NEUTRALS, MASTERS & MONITORS 4
Firm Highlights Market Growth Number of Clients Year 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 # of Clients 12 225 425 Blue Chip Clients: 8 of the Fortune 10 (2012 list - revenues) 30 of the Fortune 50 (2012 list - revenues) 94 of the AmLaw 100 (2013 list gross revenues) No industry sector or complexity of client need is beyond our scope of service 5
World Class Talent Drawn From Top Organizations World Class Talent Drawn From Top Organizations Former US Federal Cybercrime Prosecutors; FTC and SEC Managers; Special Agents of the FBI, IRS, and Postal Inspection Service; Private Technology Lawyers, Litigators, and IT Specialists; Agents or Directors from US Air Force Office of Special Investigations (AFOSI); Big Four Accounting Firms, Investment Banks, and the British Army. 6
Thought Leaders 7
Successful & Cutting Edge Engagements Trial expert in Facebook founder s contract dispute Heartland data breach response Government s expert in Enron barge trial Sony s expert in digital rights media investigation by 12 attorneys general Source code review for Google wifi matter RNC s expert in White House records act investigation Martha Stewart Omnimedia s expert in securities fraud case Consultant to special master in AMD v. Intel antitrust case Investigate spyware for Federal Trade Commission Advisor to attorneys general task force tjx breach 8
Forensics & Investigations - DIGITAL FORENSICS - INVESTIGATIONS - FORENSIC ACCOUNTING - NEUTRALS, MASTERS & MONITORS
DIGITAL FORENSICS Digital Forensics The best industry reputation and solutions for: Theft of Intellectual Property Social Networking Forensics Detection, Remediation of Data Deletion and Wiping Source Code Forensics and Comparisons E-Forgeries Computer Intrusions Spoliation Child Pornography in the Workplace Expert Testimony Neutral and Court-Appointed Forensic Examinations 10
Investigations A methodical, thorough and skilled approach to internal investigations, civil litigations, or criminal cases of: Embezzlement Fraud Workplace misconduct Bribery and foreign corrupt payments Money laundering Confidential information leaks Ponzi schemes Insider trading Illegal short selling Anonymous harassment 11
Forensic Accounting Our experienced professionals have conducted hundreds of complex investigations involving: Foreign Corrupt Practices Act (FCPA)/Anti-Bribery and Corruption (ABC) Intellectual Property/Trade Secrets Theft Money Laundering Embezzlement Insider Trading Securities Fraud Asset Tracing Procurement Fraud 12
Discovery & Disclosure - DATA DISCOVERY - DATA DISCLOSURE
Data Discovery End-to-end electronic discovery services, plus powerful tools: Proprietary Review Hosting Platform Anywhere, anytime access with 24/7 support Best-in-class searching, foldering, redacting, coding, and bulk-tagging functionality Secure, multi-party review from one data set EU Safe Harbor Certified Mobile Processing Unit Deployable 14
Defend & Respond - INCIDENT RESPONSE - SECURITY SCIENCE - COMPLIANCE NAVIGATION
Incident Response High-tech and investigative experts respond to, remediate, and help resolve an array of cyberrelated incidents including: Data Breach Authorized Access Lost Laptops, Servers, Backup Tapes Leaks of Confidential Information Theft of IP & Trade Secrets Identity Theft Advanced Persistent Threat Spyware & Other Invasive Software Botnets and Malicious Code Denial-of-Service ( DDoS ) Cyber-extortion & Cyberharassment Click Fraud & Affiliate Marketing Fraud Industrial Espionage Hacks, Unauthorized Access, Exceeding 16
Security Science A holistically analytic approach to IT and physical security: Scientific principles and methodologies to assess the spectrum of security risks Comprehensive assessment of your security risks Conduct interviews with key technology and business personnel Evaluate the electronic vulnerabilities of your information technology network Assess the physical security of your information assets Assist you in developing a risk-based security strategy that applies across key business processes and comports with your culture 17
Compliance Navigation Our compliance experts help regulated organizations better understand and successfully mitigate risks; offerings include: Developing, reviewing and analyzing comprehensive global compliance policies & procedures Training delivered with impact Robust remediation consulting Mobile Compliance Application: Navigator SM 18
Compliance Navigation Navigator SM is compliance made simple: First of it kind mobile application brings compliance policies to life Dynamic and interactive allows for simple questions and easy answers and/or approvals Users receive just the necessary information needed at that point in time whenever and where ever Provide analytics and facts for ondemand tracking, reporting and making informed data-driven compliance decisions Exclusively available through Stroz Friedberg 19
Intelligence - INTELLIGENCE & DUE DILIGENCE - DATA ANALYTICS
Intelligence & Due Diligence Minimizing risk and empowering decision making via insightful knowledge; we provide clients: Reputational due diligence investigations of corporate and other entities Background investigations of individuals, vendors and competitors Domestic and international source inquiries Red flag and enhanced due diligence reports 21
Closing Thought. There is more out there than you know. Be open to it. 22
THANK YOU strozfriedberg.com.. Kenneth A. Mendelson, CISSP, CIPP T: +1 202-464-5802 kmendelson@strozfriedberg.com.