Bridging The Gap Between IT And Law Enforcement

One of the big impediments to prosecuting computer crimes is getting law enforcement to pursue computer crimes with the same intensity that they do traditional property and violent crimes. But that’s easier said than done. At the recent B-Sides San Francisco Conference, Threatpost.com sat down with Nick Selby, a Managing Director at IT security consulting firm Trident Risk Management to talk about the gulf that separates the “guns and badges” folks from the world of IT security.

One of the big impediments to prosecuting computer crimes is getting law enforcement to pursue computer crimes with the same intensity that they do traditional property and violent crimes. But that’s easier said than done. At the recent B-Sides San Francisco Conference, Threatpost.com sat down with Nick Selby, a Managing Director at IT security consulting firm Trident Risk Management to talk about the gulf that separates the “guns and badges” folks from the world of IT security.

The divisions between those two camps are attributable to a lot of sources: lack of training, different job requirements – even a different language for talking about computer crime. In this interview with Threatpost’s Paul Roberts, Selby provides some thoughts on ways that IT security professionals and law enforcement can bridge the gap and work together to pursue computer crimes. 

“We can plod along and try to keep up and plug holes,” Selby says, but sophisticated computer criminals are already taking advantage of the air gaps between IT security and the cops. “Until we start to speak, we won’t solve the problem.”

Suggested articles

Discussion

  • J Anderson on

    How to get law enforcement to pursue computer crimes with intensity? The answer is simple: provide more evidence. Computer crimes today are murders without bodies. Even when law enforcement is willing to investigate, whether there is probative evidence is a real question is most cases. Would you operate a convenience store without surveillance camera? Of course not. So why operate a mission critical IT function without the controls and records needed to sustain an investigation and prosecution?
  • Anonymous on

    fABULOUS INTERVIEW! MAZELTOV!!!

  • Anonymous on

    Great interview

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.