The TheftTriageInvolving Law EnforcementThe First Customer Breach NotificationDownplaying RiskMedia ManipulationSkeletons in the ClosetWhat We Can Learn2.1 Data Is the New Oil2.2 The Five Data Breach Risk Factors2.3 The Demand for Data2.4 Anonymization and Renonymization2.5 Follow the Data2.6 Reducing Risk2.7 Conclusion