PART 2 – CASE STUDIES

CHAPTER 5: NOTES FROM THE FIELD

This chapter will present some of the substantial differences that exist between a police investigation and a private one, as one or the other usually follows a breach. It seems necessary to point out these differences, to provide the reader with a better understanding of the available options.

Privacy

Strange as it may sound, you should carefully weigh the risk of your situation getting more publicity than you wish for, if you report it to the authorities. If your case is high profile enough, either due to the nature of the breach (such as 100 million credit card records stolen) or due to the fact that your company is well known (a Fortune 500 company or the national equivalent), the likelihood ...

Get Managing Information Security: Studies from real life now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.