Tips and Tools for Breach Investigations

Kim Peretti, Partner, Alston & Bird LLP
Tips and Tools for Breach Investigations

Attorney Kim Peretti helped put TJX hacker Albert Gonzalez behind bars, and now she is helping organizations investigate and respond to their own data breaches. What tips and tools does she recommend?

See Also: 2016 IAM Research: Where Financial Institutions' PAM Programs Are Falling Short

Her first piece of advice: Don't focus too narrowly. Often, investigators emphasize the origin of a breach, but fail to understand its true depth and scope - until it's too late.

In a video interview about effective breach investigations, Peretti discusses:

  • Areas most frequently overlooked;
  • Lessons learned from recent investigations;
  • Technology tools to aid investigators.

Kimberly (Kim) Kiefer Peretti is a partner in the Alston & Bird, LLP law firm's White Collar Crime Group and co-chair of its Security Incident Management and Response Team. She is also a former director of PricewaterhouseCoopers' cyber forensic service practice and a former senior litigator for the Department of Justice's Computer Crime and Intellectual Property Section.

While at the Department of Justice, Peretti led several benchmark cybercrime investigations and prosecutions, including the prosecution of the infamous TJX hacker Albert Gonzalez, currently serving 20 years in prison for his role in the largest hacking and identity theft case ever prosecuted by the department.

About the Author

Tom Field

Tom Field

Vice President - Editorial, ISMG

Field is an award-winning journalist with over 30 years experience in newspapers, magazines, books, events and electronic media. A veteran community journalist with extensive business/technology and international reporting experience, Field joined ISMG in 2007 and currently oversees the editorial operations for all of ISMG's global media properties. An accomplished public speaker, Field has developed and moderated scores of podcasts, webcasts, roundtables and conferences, and he has appeared at RSA Conference and on various C-SPAN, The History Channel and Travel Channel television programs.

Around the Network