Cybersecurity

The Evolution of Cybersecurity: Contracted Attacks & Targeting Attorneys

Law firms and attorneys know that the likelihood of a cyberattack is high and acknowledge that the industry is under siege from cyber criminals. Unbeknownst to law firms, attackers have evolved from opportunistic and transactional attacks to more bespoke operations that target specific firms, or worse, specific attorneys.

Hackers have learned to attack ‘trusted’ associates and vendors as an easy way to infiltrate their client law firms. It’s a one-stop-shop approach to law firm targeting that leverages economy of scale, and the trust relationship between a law firm and its eDiscovery, document management or billing system infrastructure vendors.

The risks are higher, clients are more informed and reputations are on the line. In The Evolution of Cybersecurity: Contracted Attacks & Targeting Attorneys, we will focus on:

Learning Objectives

  • The economic model of a law firm and what makes targeting attorneys so attractive to attackers
  • Why contracted attacks are harder to defend against
  • What a ‘spoke’ attack is and how media plays a role
  • Real-time review of use cases of similar attacks with incident response and DDQ frame works that align to ABA cybersecurity standards

Join us:

Wednesday, May 23rd
2:00pm – 2:30pm ET

Free Registration

Sponsored by:

 

Please note, this is a non-CLE webinar.
Image is from ShutterStock.com.

About Law Technology Today

Law Technology Today
Law Technology Today is the official legal technology blog from the ABA Legal Technology Resource Center (LTRC). Law Technology Today provides lawyers and other legal professionals with current, practical and innovative content developed by some of the leading voices on legal technology.

Check Also

Cybersecurity

Watch: The Evolution of Cybersecurity

Hackers have learned to attack ‘trusted’ associates and vendors as an easy way to infiltrate their client law firms. In this video, eSentire's Mark Sangster helps you understand and combat these attacks.