SlideShare a Scribd company logo
1 of 24
Presented by Dr. Ilia Kolochenko
April 18, 2024
Cyber Law,
Cybercrime Investigations
and Response
Agenda
Bill Gibbs, Host
1. About Capitol Technology University
2. Session Pointers
3. About the Presenter
4. Presentation
5. Q and A
6. Upcoming Webinars
7. Recording, Slides, Certificate
About
Established in 1927, we are one
of the few private Universities in
the U.S. specifically dedicated to
STEM-Based
academic programs. The
University offers degrees at the
Associate, Bachelor, Master, and
Doctoral levels
3
Nonprofit, Private &
Accredited
Capitol is a nonprofit, private accredited university
located in Laurel, Maryland, USA
Capitol Technology University is
accredited by the Commission on
Higher Education of the Middle
States Association of Colleges and
Schools
The University is authorized by the
State of Maryland to confer
Associate’s (A.A.S.), Bachelor’s (B.S.),
Master’s (M.S., M.B.A., M.Ed, M.Res.,
T.M.B.A, M.Phil.), and Doctoral (D.Sc.,
Ph.D., D.B.A., Ed.D.) degrees.
Session Pointers
• We will answer questions at the conclusion of the presentation. At any time, you
can post a question in the text chat and we will answer as many as we can.
• Microphones and webcams are not activated for participants.
• A link to the recording and to the slides will be sent to all registrants and available
on our webinar web page.
• A participation certificate is available by request for both Live Session and On
Demand viewers.
Dr. Ilia Kolochenko
• Adjunct Prof. of Cybersecurity/Cyber Law for Capitol
• 15+ years experience in cyber, information security
auditing and cybercrime investigation
• Lawyer, Partner and Cybersecurity Practice Lead at
Platt Law LLP. Admitted to Washington DC Bar
• Chief Architect and CEO of ImmuniWeb
• BS in Computer Science and Mathematics (Webster U.)
• MS in Criminal Justice (Boston U.) MLS (Washington
U.), LLM in Technology Law (U. of Edinburgh)
• Ph.D. in Computer Science (Capitol Technology U.)
Presented by Dr. Ilia Kolochenko
April 18, 2024
Cyber Law,
Cybercrime Investigations
and Response
About the Speaker
Ilia Kolochenko, Ph.D.
• Chief Architect & CEO at ImmuniWeb
• Partner & Cybersecurity Practice Lead at Platt Law LLP
• Continuous Legal Education (CLE) Faculty Member at the D.C. Bar
• Adjunct Professor of Cybersecurity Practice & Cyber Law at Capitol Technology University
• Member of Europol EDEN, INTERPOL DFEG, SANS CISO Network, IAPP Board of Appeals
• CIPP/A, CIPP/C, CIPP/E, CIPP/US, CIPT, CIPM, FIP certified by IAPP
• GLEG, GMOB, GCPN, GPCS, GCSA, GCTI, GDAT certified by GIAC
Disclaimer
No Legal Advice or Attorney-Client Relationship
This presentation and all related materials (hereinafter “information”) are provided “as is”
without any warranty of any kind for general informational purposes only. The information
does not, and is not intended to, constitute legal advice. Nothing herein is intended to, and
shall not, create an attorney-client relationship.
Countries with Data Protection,
Privacy or Cybersecurity Laws
From 137 countries in 2021 to over 170 in 2024
US State Privacy Law Tracker by IAPP
Complex patchwork of state privacy legislation
Modern Stack of Data Protection
Laws and Regulations
• Supranational Laws and Regulations (e.g. EU GDPR, NIS 2 Directive, DORA, AI Act)
• National Laws and Regulations (e.g. Swiss nFADP, Brazilian LGPD, Singaporean PDPA)
- State law (e.g. New York SHIELD Act, California CCPA/CPRA, Illinois BIPA)
- Federal law (e.g. US HIPAA, FISMA, FTC Act)
- Administrative rules (e.g. US SEC Rules on Cybersecurity, FTC Safeguards Rule)
- Executive orders (e.g. EO on Improving the Nation’s Cybersecurity)
• Guidelines Incorporated into National Law (e.g. US NIST SP 800-Series, FIPPs)
• Mandatory Governmental Frameworks and Standards (e.g. US DFARS, upcoming CMMC 2.0)
• Mandatory Private Frameworks and Standards (e.g. PCI DSS, Swift CSCF)
• Voluntary Private Frameworks and Standards (e.g. ISO 27001, SOC 2)
May apply simultaneously, vertically or horizontally
Why Does It Matter?
1. Didi Global: $1.19 billion
2. Amazon: $877 million
3. Equifax: $575 Million
4. Instagram: $403 million
5. TikTok: $370 million
6. T-Mobile: $350 million
7. Meta (Facebook): $277 million
8. WhatsApp: $255 million
9. Home Depot: $200 million
10. Capital One: $190 million
Top 10 Regulatory
Fines, Penalties and
Settlements in 2023
Statistics by CSO Online, Michael Hill (UK Editor)
Non-compliance costs and penalties are soaring
Why Does It Matter? Continued
Cybersecurity professionals become personally liable
EU NIS 2 Directive Example
Article 21 (“Cybersecurity risk-management measures”) Section 2:
a) policies on risk analysis and information system security;
b) incident handling;
c) business continuity, such as backup management and disaster recovery, and crisis management;
d) supply chain security, including security-related aspects concerning the relationships between each
entity and its direct suppliers or service providers;
e) security in network and information systems acquisition, development and maintenance, including
vulnerability handling and disclosure;
f) policies and procedures to assess the effectiveness of cybersecurity risk-management measures;
g) basic cyber hygiene practices and cybersecurity training;
h) policies and procedures regarding the use of cryptography and, where appropriate, encryption;
i) human resources security, access control policies and asset management;
j) the use of multi-factor authentication or continuous authentication solutions, secured voice, video
and text communications.
Strategy. Processes. Evidence.
NY DFS Cybersecurity Regulation Example
• Section 500.2 (“Cybersecurity Program”)
(a) Cybersecurity Program. Each Covered Entity shall maintain a cybersecurity program designed to protect […] the Covered
Entity’s Information Systems, (b)The cybersecurity program shall be based on the Covered Entity’s Risk Assessment
• Section 500.3 (“Cybersecurity Policy”)
Each Covered Entity shall implement and maintain a written policy or policies approved by […] board of directors […] setting forth
the Covered Entity’s policies and procedures for the protection of its Information Systems
• Section 500.5 (“Penetration Testing and Vulnerability Assessments”)
• Section 500.6 (“Audit Trail”)
• Section 500.10 (“Cybersecurity Personnel and Intelligence”)
• Section 500.11 (“Third Party Service Provider Security Policy”)
• Section 500.16 (“Incident Response Plan”)
Strategy. Processes. Evidence.
PCI DSS 4.0 Example
Strategy. Processes. Evidence.
Data Breach Disclosures and Notifications
• Not every security incident is a data breach
• Not every data breach is a reportable data breach
• Consider regulatory requirements to report (NB: not just data protection legislation)
• Consider contractual duties to report both security incidents and data breaches
• Consider ethical duties to disclose security incidents: transparency matters
• Prepare your media and stakeholders communication plan beforehand
• Coordinate everything with your legal team and specialized law firm
Over-disclosure and under-disclosure are both harmful
Investigating and Responding to Incidents
• Implement and regularly review an Incident Response (IR) plan with clearly defined roles,
responsibilities, procedures and processes to follow
• Consider hiring an external law firm to lead IR after a data breach to protect forensic reports and other
evidence from compelled disclosure in court
• Review your digital evidence collection procedure with lawyers to ensure that evidence and artifacts
collection procedures are legally sound and the obtained evidence is admissible in court
• Review your corporate data (especially regulated data) and log retention policies, monitoring of
employees and their use of corporate equipment with lawyers to ensure compliance with law
• Establish a point of contact with local and federal law enforcement agencies to report serious
incidents, consider joining your industry ISAC to share threat intelligence
Multidisciplinary approach is essential for success
Cybersecurity Insurance Best Practices for 2024
• Define and crystalize terminology used in your insurance contract
• Pay special attention to and clarify your own duties and obligations
• Ensure that you retain control over the DFIR and interrelated tasks
• Review insurance cap on direct, incidental and consequential damages
• Consider clauses that may be unlawful in your country like paying ransom
• Scrutinize exclusions and exceptions in your insurance contract
• Agree on possible coverage penalties after an incident happens
The devil is in the details. Talk to a Lawyer.
Thank you for your attention
Questions & Answers
Session
For updates on cyber law, follow my LinkedIn:
www.linkedin.com/in/kolochenko
Upcoming webinars
www.captechu.edu/webinar-series
Introduction to Hybrid
Quantum-Classical Machine Learning
May 23
Dr. Alexander Perry
Defining the DoD Roadmap to Digital
Supremacy by Effectively Adopting Digital
Transformation
June 20
Dr. Donovan Wright
www.captechu.edu/webinar-series
To Register for Webinars or
View On Demand Webinars:
Capitol offers 20 regionally
accredited degrees from the
Associate to Doctoral levels
related to this webinar. For more
information about degrees and
certificates offer in Cybersecurity,
visit
CapTechU.edu.fields-of-study
Join us for Master’s and Doctoral
Virtual Information Sessions. Held
monthly. To learn more:
Email: gradadmit@captechu.edu •
Phone: 1- 800-950-1992

More Related Content

Similar to Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx

Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityShiva Bissessar
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to KnowCMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to KnowPECB
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsKyle Brown
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 

Similar to Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx (20)

Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to KnowCMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 

More from CapitolTechU

CapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapitolTechU
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
CapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapitolTechU
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxCapitolTechU
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Masters Presentation - February 2024.pptx
Masters Presentation - February  2024.pptxMasters Presentation - February  2024.pptx
Masters Presentation - February 2024.pptxCapitolTechU
 
Capitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitolTechU
 
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapitolTechU
 
Masters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxMasters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxCapitolTechU
 
Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024CapitolTechU
 
CapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapitolTechU
 
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapitolTechU
 
Masters Presentation - November 2023
Masters Presentation - November 2023 Masters Presentation - November 2023
Masters Presentation - November 2023 CapitolTechU
 
Doctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxDoctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxCapitolTechU
 
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxClean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxCapitolTechU
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapitolTechU
 
CapTechU Masters Presentation October 2023.pptx
CapTechU Masters Presentation October 2023.pptxCapTechU Masters Presentation October 2023.pptx
CapTechU Masters Presentation October 2023.pptxCapitolTechU
 
Doctoral Presentation -October 2023.pptx
Doctoral Presentation -October 2023.pptxDoctoral Presentation -October 2023.pptx
Doctoral Presentation -October 2023.pptxCapitolTechU
 
Capitol Masters Info Session Sept 2023
Capitol Masters Info Session Sept 2023Capitol Masters Info Session Sept 2023
Capitol Masters Info Session Sept 2023CapitolTechU
 
Capitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptxCapitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptxCapitolTechU
 

More from CapitolTechU (20)

CapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
CapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptx
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Masters Presentation - February 2024.pptx
Masters Presentation - February  2024.pptxMasters Presentation - February  2024.pptx
Masters Presentation - February 2024.pptx
 
Capitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptx
 
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
 
Masters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxMasters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptx
 
Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024
 
CapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptx
 
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
 
Masters Presentation - November 2023
Masters Presentation - November 2023 Masters Presentation - November 2023
Masters Presentation - November 2023
 
Doctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxDoctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptx
 
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxClean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptx
 
CapTechU Masters Presentation October 2023.pptx
CapTechU Masters Presentation October 2023.pptxCapTechU Masters Presentation October 2023.pptx
CapTechU Masters Presentation October 2023.pptx
 
Doctoral Presentation -October 2023.pptx
Doctoral Presentation -October 2023.pptxDoctoral Presentation -October 2023.pptx
Doctoral Presentation -October 2023.pptx
 
Capitol Masters Info Session Sept 2023
Capitol Masters Info Session Sept 2023Capitol Masters Info Session Sept 2023
Capitol Masters Info Session Sept 2023
 
Capitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptxCapitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptx
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx

  • 1. Presented by Dr. Ilia Kolochenko April 18, 2024 Cyber Law, Cybercrime Investigations and Response
  • 2. Agenda Bill Gibbs, Host 1. About Capitol Technology University 2. Session Pointers 3. About the Presenter 4. Presentation 5. Q and A 6. Upcoming Webinars 7. Recording, Slides, Certificate
  • 3. About Established in 1927, we are one of the few private Universities in the U.S. specifically dedicated to STEM-Based academic programs. The University offers degrees at the Associate, Bachelor, Master, and Doctoral levels 3
  • 4. Nonprofit, Private & Accredited Capitol is a nonprofit, private accredited university located in Laurel, Maryland, USA Capitol Technology University is accredited by the Commission on Higher Education of the Middle States Association of Colleges and Schools The University is authorized by the State of Maryland to confer Associate’s (A.A.S.), Bachelor’s (B.S.), Master’s (M.S., M.B.A., M.Ed, M.Res., T.M.B.A, M.Phil.), and Doctoral (D.Sc., Ph.D., D.B.A., Ed.D.) degrees.
  • 5. Session Pointers • We will answer questions at the conclusion of the presentation. At any time, you can post a question in the text chat and we will answer as many as we can. • Microphones and webcams are not activated for participants. • A link to the recording and to the slides will be sent to all registrants and available on our webinar web page. • A participation certificate is available by request for both Live Session and On Demand viewers.
  • 6. Dr. Ilia Kolochenko • Adjunct Prof. of Cybersecurity/Cyber Law for Capitol • 15+ years experience in cyber, information security auditing and cybercrime investigation • Lawyer, Partner and Cybersecurity Practice Lead at Platt Law LLP. Admitted to Washington DC Bar • Chief Architect and CEO of ImmuniWeb • BS in Computer Science and Mathematics (Webster U.) • MS in Criminal Justice (Boston U.) MLS (Washington U.), LLM in Technology Law (U. of Edinburgh) • Ph.D. in Computer Science (Capitol Technology U.)
  • 7. Presented by Dr. Ilia Kolochenko April 18, 2024 Cyber Law, Cybercrime Investigations and Response
  • 8. About the Speaker Ilia Kolochenko, Ph.D. • Chief Architect & CEO at ImmuniWeb • Partner & Cybersecurity Practice Lead at Platt Law LLP • Continuous Legal Education (CLE) Faculty Member at the D.C. Bar • Adjunct Professor of Cybersecurity Practice & Cyber Law at Capitol Technology University • Member of Europol EDEN, INTERPOL DFEG, SANS CISO Network, IAPP Board of Appeals • CIPP/A, CIPP/C, CIPP/E, CIPP/US, CIPT, CIPM, FIP certified by IAPP • GLEG, GMOB, GCPN, GPCS, GCSA, GCTI, GDAT certified by GIAC
  • 9. Disclaimer No Legal Advice or Attorney-Client Relationship This presentation and all related materials (hereinafter “information”) are provided “as is” without any warranty of any kind for general informational purposes only. The information does not, and is not intended to, constitute legal advice. Nothing herein is intended to, and shall not, create an attorney-client relationship.
  • 10. Countries with Data Protection, Privacy or Cybersecurity Laws From 137 countries in 2021 to over 170 in 2024
  • 11. US State Privacy Law Tracker by IAPP Complex patchwork of state privacy legislation
  • 12. Modern Stack of Data Protection Laws and Regulations • Supranational Laws and Regulations (e.g. EU GDPR, NIS 2 Directive, DORA, AI Act) • National Laws and Regulations (e.g. Swiss nFADP, Brazilian LGPD, Singaporean PDPA) - State law (e.g. New York SHIELD Act, California CCPA/CPRA, Illinois BIPA) - Federal law (e.g. US HIPAA, FISMA, FTC Act) - Administrative rules (e.g. US SEC Rules on Cybersecurity, FTC Safeguards Rule) - Executive orders (e.g. EO on Improving the Nation’s Cybersecurity) • Guidelines Incorporated into National Law (e.g. US NIST SP 800-Series, FIPPs) • Mandatory Governmental Frameworks and Standards (e.g. US DFARS, upcoming CMMC 2.0) • Mandatory Private Frameworks and Standards (e.g. PCI DSS, Swift CSCF) • Voluntary Private Frameworks and Standards (e.g. ISO 27001, SOC 2) May apply simultaneously, vertically or horizontally
  • 13. Why Does It Matter? 1. Didi Global: $1.19 billion 2. Amazon: $877 million 3. Equifax: $575 Million 4. Instagram: $403 million 5. TikTok: $370 million 6. T-Mobile: $350 million 7. Meta (Facebook): $277 million 8. WhatsApp: $255 million 9. Home Depot: $200 million 10. Capital One: $190 million Top 10 Regulatory Fines, Penalties and Settlements in 2023 Statistics by CSO Online, Michael Hill (UK Editor) Non-compliance costs and penalties are soaring
  • 14. Why Does It Matter? Continued Cybersecurity professionals become personally liable
  • 15. EU NIS 2 Directive Example Article 21 (“Cybersecurity risk-management measures”) Section 2: a) policies on risk analysis and information system security; b) incident handling; c) business continuity, such as backup management and disaster recovery, and crisis management; d) supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers; e) security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure; f) policies and procedures to assess the effectiveness of cybersecurity risk-management measures; g) basic cyber hygiene practices and cybersecurity training; h) policies and procedures regarding the use of cryptography and, where appropriate, encryption; i) human resources security, access control policies and asset management; j) the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications. Strategy. Processes. Evidence.
  • 16. NY DFS Cybersecurity Regulation Example • Section 500.2 (“Cybersecurity Program”) (a) Cybersecurity Program. Each Covered Entity shall maintain a cybersecurity program designed to protect […] the Covered Entity’s Information Systems, (b)The cybersecurity program shall be based on the Covered Entity’s Risk Assessment • Section 500.3 (“Cybersecurity Policy”) Each Covered Entity shall implement and maintain a written policy or policies approved by […] board of directors […] setting forth the Covered Entity’s policies and procedures for the protection of its Information Systems • Section 500.5 (“Penetration Testing and Vulnerability Assessments”) • Section 500.6 (“Audit Trail”) • Section 500.10 (“Cybersecurity Personnel and Intelligence”) • Section 500.11 (“Third Party Service Provider Security Policy”) • Section 500.16 (“Incident Response Plan”) Strategy. Processes. Evidence.
  • 17. PCI DSS 4.0 Example Strategy. Processes. Evidence.
  • 18. Data Breach Disclosures and Notifications • Not every security incident is a data breach • Not every data breach is a reportable data breach • Consider regulatory requirements to report (NB: not just data protection legislation) • Consider contractual duties to report both security incidents and data breaches • Consider ethical duties to disclose security incidents: transparency matters • Prepare your media and stakeholders communication plan beforehand • Coordinate everything with your legal team and specialized law firm Over-disclosure and under-disclosure are both harmful
  • 19. Investigating and Responding to Incidents • Implement and regularly review an Incident Response (IR) plan with clearly defined roles, responsibilities, procedures and processes to follow • Consider hiring an external law firm to lead IR after a data breach to protect forensic reports and other evidence from compelled disclosure in court • Review your digital evidence collection procedure with lawyers to ensure that evidence and artifacts collection procedures are legally sound and the obtained evidence is admissible in court • Review your corporate data (especially regulated data) and log retention policies, monitoring of employees and their use of corporate equipment with lawyers to ensure compliance with law • Establish a point of contact with local and federal law enforcement agencies to report serious incidents, consider joining your industry ISAC to share threat intelligence Multidisciplinary approach is essential for success
  • 20. Cybersecurity Insurance Best Practices for 2024 • Define and crystalize terminology used in your insurance contract • Pay special attention to and clarify your own duties and obligations • Ensure that you retain control over the DFIR and interrelated tasks • Review insurance cap on direct, incidental and consequential damages • Consider clauses that may be unlawful in your country like paying ransom • Scrutinize exclusions and exceptions in your insurance contract • Agree on possible coverage penalties after an incident happens The devil is in the details. Talk to a Lawyer.
  • 21. Thank you for your attention Questions & Answers Session For updates on cyber law, follow my LinkedIn: www.linkedin.com/in/kolochenko
  • 22. Upcoming webinars www.captechu.edu/webinar-series Introduction to Hybrid Quantum-Classical Machine Learning May 23 Dr. Alexander Perry Defining the DoD Roadmap to Digital Supremacy by Effectively Adopting Digital Transformation June 20 Dr. Donovan Wright
  • 23. www.captechu.edu/webinar-series To Register for Webinars or View On Demand Webinars:
  • 24. Capitol offers 20 regionally accredited degrees from the Associate to Doctoral levels related to this webinar. For more information about degrees and certificates offer in Cybersecurity, visit CapTechU.edu.fields-of-study Join us for Master’s and Doctoral Virtual Information Sessions. Held monthly. To learn more: Email: gradadmit@captechu.edu • Phone: 1- 800-950-1992