SlideShare a Scribd company logo
D I S P U T E S & I N V E S T I G AT I O N S




Illuminating the Impact
Data Breach and Theft of Trade Secret Investigations
About Navigant (NYSE: NCI) is a specialized,
global expert services firm dedicated to assisting clients in
creating and protecting value in the face of critical business
risks and opportunities. Through senior level engagement with
clients, Navigant professionals combine technical expertise in
Disputes and Investigations, Economics, Financial Advisory and
Management Consulting, with business pragmatism in the highly
regulated Construction, Energy, Financial Services and Healthcare
industries to support clients in addressing their most critical
business needs. Navigant has offices in over 43 cities in North
America, Europe and Asia.




                                                                    As headlines constantly confirm, organizations of all types and sizes
                                                                    are being targeted for the information kept within their computer
                                                                    systems. Valuable data and records can be accessed through a lost
                                                                    laptop, a burglarized back-up tape, misappropriated computer code,
                                                                    or a sophisticated hacking scheme. A rapid and decisive response
                                                                    is critical to mitigating the legal, financial and reputational risks.
                                                                    Navigant’s uniquely qualified global forensic team quickly preserves
                                                                    and analyzes relevant evidence, assesses potential exposure, and
                                                                    provides significant independent experience and innovative insights
                                                                    into data breach and theft of trade secret investigations.
lead with experience.
                                                                                    expect results.




THE CHALLENGE                                               THE CHALLENGE                                               THE CHALLENGE
HACKER TARGETS UNIVERSITY                                   EMPLOYEE THEFT OF TRADE                                     COMPUTER THEFT
                                                            SECRET INVESTIGATION                                        JEOPARDIZES PERSONAL DATA

THE SOLUTION                                                THE SOLUTION                                                THE SOLUTION
A California-based university had been the                  A global financial services firm needed                     A full-service, multi-state hospitalist company
victim of a foreign-based hacker. Navigant                  assistance in reviewing forensically-preserved              became aware of the theft of a computer and
was engaged to collect evidence about the                   hard drives, network files, phone records,                  personal digital assistant from a locked office.
breach, ensure the breach was contained, and                chat logs, Bloomberg e-mails, expense                       Navigant was called to investigate the data
investigate whether any confidential information            reports, HR records, security access logs,                  breach implications associated with the theft.
about its students was disclosed. Our analyses              URL activity, and key stroke logging software               Our analysis was instrumental in notifying
identified the methods and hacking tools used               for evidence of potential non-compliance by                 over 6,000 former patients that personally
to gain access, reconstructed the hacker’s                  certain former employees with non-compete,                  identifiable information (“PII”) and/or
activities inside the network, and isolated the             non-solicitation, and partnership agreement                 protected health information (“PHI”) may
hacker’s location. We were able to confirm                  obligations. Navigant was engaged to conduct                have been compromised, including names,
that no confidential university data was                    the review which also included extensive public             Social Security numbers, dates of birth,
compromised.                                                records research and targeted interviews. Our               diagnosis codes, medical record numbers,
                                                            team assisted counsel with depositions,                     and similar information.
                                                            subpoena requests, legal strategy, and a
                                                            preliminary injunction hearing.



 INFORMATION SECURITY & DATA BREACH REPORT
 Navigant’s Information Security & Data Breach Report utilizes current information and data contained in news sources, press releases, government websites and
 proprietary resources to identify insights and trends in the information security arena. This report is updated and published on a quarterly basis to spotlight major
 breaches and answer questions about how these breaches occur. How is personal data being lost or stolen? How many people are affected? How long does it
 take to report a breach? How much will it cost if your company loses personal information? If you would like to receive a copy of the current edition of Navigant’s
 Information Security & Data Breach Report, and quarterly updates, please contact Kris Swanson at 312.583.5784 or kswanson@navigant.com.
Kris Swanson
312.583.5784
kswanson@navigant.com                                                                                                                                                                        www.navigant.com




Our proven response methodology addresses the following phases.

 INVESTIGATE                                                              ANALYZE                                                                 RESOLVE
 The investigative phase is critical in defining what                     Companies may not know initially what they have                         Finally, we offer services that help bring closure to
 is known or knowable about the loss or theft,                            lost, but they appreciate the serious regulatory,                       an event and assist with conflict resolution by:
 and charting a path to understanding how the                             reputational, legal and financial risks in play. Our                    » Advising on notification strategies and imple-
 event occurred, who may be involved, and what                            team has extensive experience in forensically                             mentation
 information to gather to assess intent.                                  analyzing complex data and can quickly bring                            » Assisting with responses to regulatory inquiries
                                                                          salient insights into focus.                                              (e.g., FTC, Attorneys General, HHS OCR, DOJ)
 Our seasoned professionals leverage deep computer
 forensic, private investigative and data analysis                        Once the investigation identifies the potentially                       » Establishing decision models for claim adjudica-
 expertise, and are skilled at navigating the relevant                    relevant individuals and data involved, Navigant                          tion or settlement
 legal standards and privilege issues typically                           uses proven forensic and analytical techniques to                       » Providing expert damages testimony in defense
 encountered during an investigation.                                     uncover additional insights and further define the                        of legal actions brought by third parties, or to
                                                                          scope of the event. Objectively analyzing the value                       support claims against third parties
 The investigative phase may include:                                                                                                             » Supporting clients in the preparation of insur-
                                                                          of the lost data and consequential risks will help
 » Interviewing relevant staff to determine the initial                   determine the remediation actions needed.                                 ance claims to maximize recoveries
   scope of the loss or theft                                                                                                                     » Providing management recommendations to
 » Reviewing information technology systems to                            The analysis phase may include:                                           mitigate the frequency and impact of future
   identify data stores and preserving data for                           » Identifying the valuable data and systems that                          incidents
   subsequent forensic analysis                                             were compromised, and assessing the business
 » Creating a “proxy” for what was lost or stolen,                          implications
   and how it was likely compromised                                      » Establishing the list of individuals or entities
 » Conducting discreet public records and business                          who may need to be notified due to a breach of
   intelligence research to gain knowledge about                            health and/or personal information
   targets                                                                » Helping clients triage the most significant events
 » Developing a timeline of business events to help                         that may influence the response plan
   better inform and augment the investigation




©2011 Navigant Consulting, Inc. All rights reserved.
Navigant Consulting is not a certified public accounting firm and does not provide audit, attest, or public accounting services. See www.navigant.com/licensing for a complete listing of private investigator licenses.

More Related Content

What's hot

Enterprise Collaboration For The Legal Community
Enterprise Collaboration For The Legal CommunityEnterprise Collaboration For The Legal Community
Enterprise Collaboration For The Legal CommunityAlasdair Kilgour
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat Gap
Tripwire
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
Mark Arena
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
Digital Transformation EXPO Event Series
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Case
tbeckwith
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Seema Sheth-Voss
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Government Technology and Services Coalition
 
Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Threat Activity Groups - Dragos
Threat Activity Groups - Dragos
Dragos, Inc.
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
Patrick Florer
 
Threat Detect Hipaa Compliance
Threat Detect Hipaa ComplianceThreat Detect Hipaa Compliance
Threat Detect Hipaa Compliance
tbeckwith
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsClear Technologies
 
Evidence-Based Risk Management
Evidence-Based Risk ManagementEvidence-Based Risk Management
Evidence-Based Risk Management
EnergySec
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
CSSaunders
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Personnel Security Specialist
Personnel Security SpecialistPersonnel Security Specialist
Personnel Security SpecialistRhodaisha Phoenix
 

What's hot (18)

Enterprise Collaboration For The Legal Community
Enterprise Collaboration For The Legal CommunityEnterprise Collaboration For The Legal Community
Enterprise Collaboration For The Legal Community
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat Gap
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Case
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
 
Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?Targeted Attacks: Have you found yours?
Targeted Attacks: Have you found yours?
 
Threat Activity Groups - Dragos
Threat Activity Groups - Dragos Threat Activity Groups - Dragos
Threat Activity Groups - Dragos
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
 
Threat Detect Hipaa Compliance
Threat Detect Hipaa ComplianceThreat Detect Hipaa Compliance
Threat Detect Hipaa Compliance
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton Communications
 
Evidence-Based Risk Management
Evidence-Based Risk ManagementEvidence-Based Risk Management
Evidence-Based Risk Management
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Personnel Security Specialist
Personnel Security SpecialistPersonnel Security Specialist
Personnel Security Specialist
 

Viewers also liked

Present Perfec
Present PerfecPresent Perfec
Present Perfec
ermelchamba
 
Muestra dia del libro 6/6/2013
Muestra dia del libro 6/6/2013Muestra dia del libro 6/6/2013
Muestra dia del libro 6/6/2013Tania Rodríguez
 
第三屆個人簡介Part1
第三屆個人簡介Part1第三屆個人簡介Part1
第三屆個人簡介Part1
Yuan-chi Yang
 
Data Breach Brochure
Data Breach BrochureData Breach Brochure
Data Breach Brochuretonycord01
 
學長姊個人自介(完整版)
學長姊個人自介(完整版)學長姊個人自介(完整版)
學長姊個人自介(完整版)Yuan-chi Yang
 
3分鐘Azure search自我介紹 ( 3 min talking about Azure Search)
3分鐘Azure search自我介紹 ( 3 min talking about Azure Search)3分鐘Azure search自我介紹 ( 3 min talking about Azure Search)
3分鐘Azure search自我介紹 ( 3 min talking about Azure Search)
Aaron King
 

Viewers also liked (8)

Present Perfec
Present PerfecPresent Perfec
Present Perfec
 
個人簡介PART2
個人簡介PART2個人簡介PART2
個人簡介PART2
 
Muestra dia del libro 6/6/2013
Muestra dia del libro 6/6/2013Muestra dia del libro 6/6/2013
Muestra dia del libro 6/6/2013
 
個人簡介Part1
個人簡介Part1個人簡介Part1
個人簡介Part1
 
第三屆個人簡介Part1
第三屆個人簡介Part1第三屆個人簡介Part1
第三屆個人簡介Part1
 
Data Breach Brochure
Data Breach BrochureData Breach Brochure
Data Breach Brochure
 
學長姊個人自介(完整版)
學長姊個人自介(完整版)學長姊個人自介(完整版)
學長姊個人自介(完整版)
 
3分鐘Azure search自我介紹 ( 3 min talking about Azure Search)
3分鐘Azure search自我介紹 ( 3 min talking about Azure Search)3分鐘Azure search自我介紹 ( 3 min talking about Azure Search)
3分鐘Azure search自我介紹 ( 3 min talking about Azure Search)
 

Similar to Data Breach Brochure

The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
Shawn Tuma
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
Shawn Tuma
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
CMR WORLD TECH
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
Priyanka Aash
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
Dimitris Chalambalis
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
Andreanne Clarke
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Decoding Incident Response for Internal Threats in Legal Practice
Decoding Incident Response for Internal Threats in Legal PracticeDecoding Incident Response for Internal Threats in Legal Practice
Decoding Incident Response for Internal Threats in Legal Practice
LDMGlobal
 
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskUsing SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
SurfWatch Labs
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
Manik Bhola
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
AbimbolaFisher1
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
PECB
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
Mighty Guides, Inc.
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
FitCEO, Inc. (FCI)
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 

Similar to Data Breach Brochure (20)

The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Decoding Incident Response for Internal Threats in Legal Practice
Decoding Incident Response for Internal Threats in Legal PracticeDecoding Incident Response for Internal Threats in Legal Practice
Decoding Incident Response for Internal Threats in Legal Practice
 
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskUsing SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 

Recently uploaded

Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 

Recently uploaded (20)

Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 

Data Breach Brochure

  • 1. D I S P U T E S & I N V E S T I G AT I O N S Illuminating the Impact Data Breach and Theft of Trade Secret Investigations
  • 2. About Navigant (NYSE: NCI) is a specialized, global expert services firm dedicated to assisting clients in creating and protecting value in the face of critical business risks and opportunities. Through senior level engagement with clients, Navigant professionals combine technical expertise in Disputes and Investigations, Economics, Financial Advisory and Management Consulting, with business pragmatism in the highly regulated Construction, Energy, Financial Services and Healthcare industries to support clients in addressing their most critical business needs. Navigant has offices in over 43 cities in North America, Europe and Asia. As headlines constantly confirm, organizations of all types and sizes are being targeted for the information kept within their computer systems. Valuable data and records can be accessed through a lost laptop, a burglarized back-up tape, misappropriated computer code, or a sophisticated hacking scheme. A rapid and decisive response is critical to mitigating the legal, financial and reputational risks. Navigant’s uniquely qualified global forensic team quickly preserves and analyzes relevant evidence, assesses potential exposure, and provides significant independent experience and innovative insights into data breach and theft of trade secret investigations.
  • 3. lead with experience. expect results. THE CHALLENGE THE CHALLENGE THE CHALLENGE HACKER TARGETS UNIVERSITY EMPLOYEE THEFT OF TRADE COMPUTER THEFT SECRET INVESTIGATION JEOPARDIZES PERSONAL DATA THE SOLUTION THE SOLUTION THE SOLUTION A California-based university had been the A global financial services firm needed A full-service, multi-state hospitalist company victim of a foreign-based hacker. Navigant assistance in reviewing forensically-preserved became aware of the theft of a computer and was engaged to collect evidence about the hard drives, network files, phone records, personal digital assistant from a locked office. breach, ensure the breach was contained, and chat logs, Bloomberg e-mails, expense Navigant was called to investigate the data investigate whether any confidential information reports, HR records, security access logs, breach implications associated with the theft. about its students was disclosed. Our analyses URL activity, and key stroke logging software Our analysis was instrumental in notifying identified the methods and hacking tools used for evidence of potential non-compliance by over 6,000 former patients that personally to gain access, reconstructed the hacker’s certain former employees with non-compete, identifiable information (“PII”) and/or activities inside the network, and isolated the non-solicitation, and partnership agreement protected health information (“PHI”) may hacker’s location. We were able to confirm obligations. Navigant was engaged to conduct have been compromised, including names, that no confidential university data was the review which also included extensive public Social Security numbers, dates of birth, compromised. records research and targeted interviews. Our diagnosis codes, medical record numbers, team assisted counsel with depositions, and similar information. subpoena requests, legal strategy, and a preliminary injunction hearing. INFORMATION SECURITY & DATA BREACH REPORT Navigant’s Information Security & Data Breach Report utilizes current information and data contained in news sources, press releases, government websites and proprietary resources to identify insights and trends in the information security arena. This report is updated and published on a quarterly basis to spotlight major breaches and answer questions about how these breaches occur. How is personal data being lost or stolen? How many people are affected? How long does it take to report a breach? How much will it cost if your company loses personal information? If you would like to receive a copy of the current edition of Navigant’s Information Security & Data Breach Report, and quarterly updates, please contact Kris Swanson at 312.583.5784 or kswanson@navigant.com.
  • 4. Kris Swanson 312.583.5784 kswanson@navigant.com www.navigant.com Our proven response methodology addresses the following phases. INVESTIGATE ANALYZE RESOLVE The investigative phase is critical in defining what Companies may not know initially what they have Finally, we offer services that help bring closure to is known or knowable about the loss or theft, lost, but they appreciate the serious regulatory, an event and assist with conflict resolution by: and charting a path to understanding how the reputational, legal and financial risks in play. Our » Advising on notification strategies and imple- event occurred, who may be involved, and what team has extensive experience in forensically mentation information to gather to assess intent. analyzing complex data and can quickly bring » Assisting with responses to regulatory inquiries salient insights into focus. (e.g., FTC, Attorneys General, HHS OCR, DOJ) Our seasoned professionals leverage deep computer forensic, private investigative and data analysis Once the investigation identifies the potentially » Establishing decision models for claim adjudica- expertise, and are skilled at navigating the relevant relevant individuals and data involved, Navigant tion or settlement legal standards and privilege issues typically uses proven forensic and analytical techniques to » Providing expert damages testimony in defense encountered during an investigation. uncover additional insights and further define the of legal actions brought by third parties, or to scope of the event. Objectively analyzing the value support claims against third parties The investigative phase may include: » Supporting clients in the preparation of insur- of the lost data and consequential risks will help » Interviewing relevant staff to determine the initial determine the remediation actions needed. ance claims to maximize recoveries scope of the loss or theft » Providing management recommendations to » Reviewing information technology systems to The analysis phase may include: mitigate the frequency and impact of future identify data stores and preserving data for » Identifying the valuable data and systems that incidents subsequent forensic analysis were compromised, and assessing the business » Creating a “proxy” for what was lost or stolen, implications and how it was likely compromised » Establishing the list of individuals or entities » Conducting discreet public records and business who may need to be notified due to a breach of intelligence research to gain knowledge about health and/or personal information targets » Helping clients triage the most significant events » Developing a timeline of business events to help that may influence the response plan better inform and augment the investigation ©2011 Navigant Consulting, Inc. All rights reserved. Navigant Consulting is not a certified public accounting firm and does not provide audit, attest, or public accounting services. See www.navigant.com/licensing for a complete listing of private investigator licenses.