Dominique Shelton, an experienced litigator and counselor, partner in the Litigation group and Claire Lucy Readhead, Associate, co-wrote the Law360 article “No Cookie for You: How COPPA Will Affect Your Company.” Consumers generate “Big Data” through e-mail, Facebook, Twitter, LinkedIn, YouTube and many other sources. Companies buy and sell Big Data and personal data for the […]
Kim Peretti Quoted in Law360 Article “Biggest-Ever Hacking Bust Restores Faith in DOJ”
On July 26, 2013, Kim Peretti, co-chair of the firm’s Security Incident Management & Response Team, was quoted in a Law360 article titled, “Biggest-Ever Hacking Bust Restores Faith in DOJ.” Peretti addresses law enforcement official’s capabilities and interest in pursuing attacks that originate outside of the country. According to Peretti, “The advantages of working with […]
LISTEN: Kim Peretti Interviewed by Information Security Media Group, “Indictments: New Clues Into Fraud Schemes”
Kim Peretti, co-chair of the firm’s Security Incident Management & Response Team and former senior litigator for the Justice Department’s Computer Crime and Intellectual Property Section, was interviewed by Information Security Media Group on the unsealed indictments released last week against the five men accused of hacking the computer network of several major corporations. “The indictments, […]
WATCH: Kim Peretti Interviewed by NPR, “Five Men Accused of Stealing Credit”
Kim Peretti, co-chair of the firm’s Security Incident Management & Response Team and former senior litigator for the Justice Department’s Computer Crime and Intellectual Property Section, was interviewed by NPR on the unsealed indictments against five men accused of hacking the computer network of several major corporations. These men allegedly stole hundreds of millions of dollars […]
Cyber Alert: Breach Investigations, Part 3: Conducting Enterprise Impact Investigations – Law360 Article by Kim Peretti
This article is the third in a four-part series describing some of the challenges to conducting breach investigations in response to increasingly sophisticated attacks. In Part 1, entitled “Right-Sizing the Data Breach Investigation,” published in Law360 on March 26, 2013, we provided an overview of the evolving advanced cyber threat landscape and the three common […]