Bridging The Gap Between IT And Law Enforcement

One of the big impediments to prosecuting computer crimes is getting law enforcement to pursue computer crimes with the same intensity that they do traditional property and violent crimes. But that’s easier said than done. At the recent B-Sides San Francisco Conference, Threatpost.com sat down with Nick Selby, a Managing Director at IT security consulting firm Trident Risk Management to talk about the gulf that separates the “guns and badges” folks from the world of IT security.

One of the big impediments to prosecuting computer crimes is getting law enforcement to pursue computer crimes with the same intensity that they do traditional property and violent crimes. But that’s easier said than done. At the recent B-Sides San Francisco Conference, Threatpost.com sat down with Nick Selby, a Managing Director at IT security consulting firm Trident Risk Management to talk about the gulf that separates the “guns and badges” folks from the world of IT security.

The divisions between those two camps are attributable to a lot of sources: lack of training, different job requirements – even a different language for talking about computer crime. In this interview with Threatpost’s Paul Roberts, Selby provides some thoughts on ways that IT security professionals and law enforcement can bridge the gap and work together to pursue computer crimes. 

“We can plod along and try to keep up and plug holes,” Selby says, but sophisticated computer criminals are already taking advantage of the air gaps between IT security and the cops. “Until we start to speak, we won’t solve the problem.”

Suggested articles

jokers stash takedown

Joker’s Stash Carding Site Taken Down

The underground payment-card data broker saw its blockchain DNS sites taken offline after an apparent law-enforcement effort – and now Tor sites are down.