Cyber-Extortion: A How-To Guide

Cyber-Extortion: A How-To Guide

Cyber extortion refers to a situation in which a third party threatens that if an organization does not pay money, or take a certain action, the third party will take an adverse action against the organization. Among other things, threats may include exploiting a security vulnerability identified by the extorter, reporting the organization’s security vulnerability to the press, or reporting the organization’s security vulnerability to regulators. …

cyber ext

Your Organization is Impacted by Ransomware – Now What?

Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid. Although variants of ransomware operate differently, many encrypt the contents of a victim’s hard drive using asymmetric encryption in which the decryption key is stored on the attacker’s server and is available only after payment of the ransom. Victims typically discover the ransomware when they receive an on-screen message instructing them to transfer funds using an electronic currency, such as bitcoin, in order to receive the decryption key and access to their files. “CryptoLocker” is the most famous ransomware family and first appeared in 2013….

ransomware

How to Respond to a Cyber Extortion Demand

Cyber extortion refers to a situation in which a third party threatens that if an organization does not pay money, or take a certain action, the third party will take an adverse action against the organization.  Among other things, threats may include exploiting a security vulnerability identified by the extorter, reporting the organization’s security vulnerability to the press, or reporting the organization’s security vulnerability to regulators….

cyberextortiondemand

Webinar: Cyber Extortion — What are the Laws that Protect Against It and How Should Lawyers Respond?

June 16, 2016 at 12 p.m. EDT

While extortion is not a new concept, in the digital world, it is taking on a new dimension. Individuals, companies, organized crime, and even terrorist groups are increasingly threatening cyber-attacks, public disclosure of personal information, or reporting security vulnerabilities to regulators if companies do not accede to their demands. Join Mary Beth Buchanan and David Zetoony as they:

  • discuss different types of cyber-extortion,
  • describe the interaction between criminal laws preventing extortion and the data security laws, and
  • provide practical advice on how lawyers should respond to cyber-extortion demands.

Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.