Watch: The Evolution of Cybersecurity

Law firms and attorneys know that the likelihood of a cyber attack is high and acknowledge that the industry is under siege from cybercriminals. Attackers have evolved from opportunistic and transactional attacks to more bespoke operations that target specific firms, or worse, specific attorneys.

Hackers have learned to attack “trusted” associates and vendors as an easy way to infiltrate their client law firms. It’s a one-stop-shop approach to law firm targeting that leverages economy of scale, and the trust relationship between a law firm and its eDiscovery, document management or billing system infrastructure vendors.

The risks are higher, clients are more informed and reputations are on the line. In this video, we will focus on:

Learning Objectives

  • The economic model of a law firm and what makes targeting attorneys so attractive to attackers
  • Why contracted attacks are harder to defend against
  • What a ‘spoke’ attack is and how media plays a role
  • Real-time review of use cases of similar attacks with incident response and DDQ frameworks that align with ABA cybersecurity standards

Sponsored by:

Please note, this is a non-CLE webinar.
Image is from

Check Also

Can I Write Off Dinner with My Spouse?

The fastest way to get yourself in trouble when it comes to your taxes; is …