A N D
New Strategies for Managing the Risks of Exploitation
F O R E N S I C
A N D
L I T I G A T I O N
S E R V I C E S
“Now that most transactions and exchanges have become electronic, you really don’t need to be an expert to predict that this will become, or already is, a crime generator. What is relatively new is the value of business information. We see a tendency for rising criminal activity in this field. Not only the theft of information, but also the threat of making information public.”1
L O E K W E E R D , P O L I C E I N S P E C TO R A N D C O M P U T E R C R I M E - U N I T E X P E RT, H A AG L A N D E N R E G I O NA L P O L I C E , T H E N E T H E R L A N D S
TABLE OF CONTENTS
2 4 11 15 19 20 21
Introduction The Current Environment: Understanding the New Risks Taking Action to Protect Your Business When the Worst Happens: Avoiding Further Damage Looking Ahead: Emerging Risks in a Changing Business World Conclusion Appendix I: Ensuring Preparedness—An Interview with Jeff Hormann of AARP
25
Appendix III: Applying the Law to Cyber Invasions—An Interview with Meredith Fuchs of Wiley, Rein & Fielding
27 28
Appendix IV: Beyond the Internet—Exploiting Digital Telephony Services Endnotes
M A N A G I N G
1
N E W
S T R A T E G I E S
Produced as part of a series by KPMG’s Assurance & Advisory Services Center.
F O R
T H E
R I S K S
from Olivia Kirtley
O F
23
Appendix II: Questions for the Board of Directors—Recommendations
E X P L O I T A T I O N
I
N T R O D U C T I O N
would be hard-pressed to find a competitive and thriving organisation that does not rely upon communications and other information technologies as an enabler of its activities. No longer incidental to the workings of an organisation, technology is integral to business today. At the same time, however, the very “digital nervous system,”2 as Bill Gates terms it, that