{"id":244,"date":"2013-05-23T00:00:00","date_gmt":"2013-05-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/23\/telling-the-fbi-your-company-has-been-hacked\/"},"modified":"2021-12-30T11:36:50","modified_gmt":"2021-12-30T11:36:50","slug":"telling-the-fbi-your-company-has-been-hacked","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/23\/telling-the-fbi-your-company-has-been-hacked\/","title":{"rendered":"Telling the FBI Your Company Has Been Hacked"},"content":{"rendered":"<p>As cyber attacks against U.S. companies move markets, drain tens of millions dollars from bank accounts, siphon off trade secrets, and threaten critical infrastructure, the mantra among government officials is: sharing (information) is caring. The government\u2019s desire to increase information sharing on cyber intrusions with the private sector is at the heart of an executive order issued in February\u2014and it was a point underscored at a New York City Bar Association event on Monday, when Mary Galligan, who is an FBI \u201ccyber cop,\u201d urged corporations to come forward with information about attacks on their networks.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For this, we turn to Galligan\u2019s afternoon panel on cyber crime, where she was accompanied by attorneys in private practice, a law professor, the head of a computer forensics firm, and the chief of the Manhattan District Attorney\u2019s investigations division.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">First, as Ed Stroz, of the investigative firm Stroz Friedberg, explained, it\u2019s important to recognize that you could be attacked by different categories of attackers, including state-sponsored actors, organized criminal groups, individual hackers or \u201chacktivists,\u201d and company insiders. \u201cWhat happens with the FBI is right now, approximately 60 percent of the time, we are going out and telling a company that they have been intruded upon,\u201d says Galligan. Well, either they\u2019re getting the information from another FBI investigation, \u201cor we\u2019re getting it from our partners in the government,\u201d Galligan says, which includes all 16 of the U.S. intelligence agencies.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Whether you call them or they call you, Galligan and her FBI team are going to hope your company has already contemplated the possibility of a cyber attack, that you have a response plan, and that your general counsel is involved in it.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cBecause we say over and over\u2014and I have seen it over and over\u2014that unless the general counsels and\/or your outside counsel are involved in these issues from the beginning, are part of your plan, it becomes very, very difficult for the government to help you,\u201d Galligan says,<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The bureau also pointed out to the banks that a DDoS can serve as an opportunity for criminal actors to \u201ccome in and commit crime in your system.\u201d<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cIt\u2019s a discussion where we say, \u2018We recognize you need to make a business decision,\u201d she says, \u201cand that business decision is going to be a very complicated one.\u2019<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cYou have to really figure out what exactly you\u2019re going to be willing to do,\u201d says DeVore &amp; DeMarco partner Joseph DeMarco, who specialized in cyber crime as an assistant U.S.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.law.com\/corporatecounsel\/PubArticleCC.jsp?id=1202601094171&amp;Telling_the_FBI_Your_Company_Has_Been_Hacked\">http:\/\/www.law.com\/corporatecounsel\/PubArticleCC.jsp?id=1202601094171&amp;Telling_the_FBI_Your_Company_Has_Been_Hacked<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-244","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=244"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/244\/revisions"}],"predecessor-version":[{"id":2731,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/244\/revisions\/2731"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}