Video

Tips and Tools for Breach Investigations

Kim Peretti, Partner, Alston & Bird LLP
Tips and Tools for Breach Investigations

Attorney Kim Peretti helped put TJX hacker Albert Gonzalez behind bars, and now she is helping organizations investigate and respond to their own data breaches. What tips and tools does she recommend?

See Also: Break the Fraud Lifecycle

Her first piece of advice: Don't focus too narrowly. Often, investigators emphasize the origin of a breach, but fail to understand its true depth and scope - until it's too late.

In a video interview about effective breach investigations, Peretti discusses:

  • Areas most frequently overlooked;
  • Lessons learned from recent investigations;
  • Technology tools to aid investigators.

Kimberly (Kim) Kiefer Peretti is a partner in the Alston & Bird, LLP law firm's White Collar Crime Group and co-chair of its Security Incident Management and Response Team. She is also a former director of PricewaterhouseCoopers' cyber forensic service practice and a former senior litigator for the Department of Justice's Computer Crime and Intellectual Property Section.

While at the Department of Justice, Peretti led several benchmark cybercrime investigations and prosecutions, including the prosecution of the infamous TJX hacker Albert Gonzalez, currently serving 20 years in prison for his role in the largest hacking and identity theft case ever prosecuted by the department.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.