O'Reilly logo

Managing Information Security: Studies from real life by Michael Krausz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PART 2 – CASE STUDIES

CHAPTER 5: NOTES FROM THE FIELD

This chapter will present some of the substantial differences that exist between a police investigation and a private one, as one or the other usually follows a breach. It seems necessary to point out these differences, to provide the reader with a better understanding of the available options.

Privacy

Strange as it may sound, you should carefully weigh the risk of your situation getting more publicity than you wish for, if you report it to the authorities. If your case is high profile enough, either due to the nature of the breach (such as 100 million credit card records stolen) or due to the fact that your company is well known (a Fortune 500 company or the national equivalent), the likelihood ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required