Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

Incident Response 2.0

Attorney Kim Peretti on What it Takes to Respond Effectively to Today's Top Cybercrimes

Cybersecurity incidents have evolved considerably since the TJX and Heartland breaches of 2007-08. And so has incident response, says former prosecutor Kim Peretti, now a partner at the law firm Alston & Bird. She defines incident response 2.0.

See Also: Cloud Security and Developers: Role of Zero Standing Privilege

In a video interview at Information Security Media Group's Washington Fraud and Breach Prevention Summit, Peretti discusses:

  • How cyber incidents have evolved and put new demands on organizations;
  • The fundamentals of incident response 2.0;
  • Vulnerabilities in current incident response strategies.

Peretti is a partner in the Alston & Bird LLP law firm's white collar crime group and co-chair of its security incident management and response team. Previously, she was director of PricewaterhouseCoopers' cyber forensic service practice and a former senior litigator for the Department of Justice's Computer Crime and Intellectual Property Section. While at the Department of Justice, Peretti led several benchmark cybercrime investigations and prosecutions, including the prosecution of the TJX hacker Albert Gonzalez, currently serving 20 years in prison for his role in the largest hacking and identity theft case ever prosecuted by the department.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.