Watch: The Evolution of Cybersecurity

Law firms and attorneys know that the likelihood of a cyber attack is high and acknowledge that the industry is under siege from cybercriminals. Attackers have evolved from opportunistic and transactional attacks to more bespoke operations that target specific firms, or worse, specific attorneys.

Hackers have learned to attack “trusted” associates and vendors as an easy way to infiltrate their client law firms. It’s a one-stop-shop approach to law firm targeting that leverages economy of scale, and the trust relationship between a law firm and its eDiscovery, document management or billing system infrastructure vendors.

The risks are higher, clients are more informed and reputations are on the line. In this video, we will focus on:

Learning Objectives

  • The economic model of a law firm and what makes targeting attorneys so attractive to attackers
  • Why contracted attacks are harder to defend against
  • What a ‘spoke’ attack is and how media plays a role
  • Real-time review of use cases of similar attacks with incident response and DDQ frameworks that align with ABA cybersecurity standards

Sponsored by:

Please note, this is a non-CLE webinar.
Image is from

About Law Technology Today

Law Technology Today
Law Technology Today is the official legal technology blog from the ABA Legal Technology Resource Center (LTRC). Law Technology Today provides lawyers and other legal professionals with current, practical and innovative content developed by some of the leading voices on legal technology.

Check Also

Watch: The ABCs of Law Firm Financials: Accounting, Billing, and Keeping It All Compliant

Erica Birstler from CosmoLex Cloud will be joining Industry Insights for an in-depth review of law firm financials. Topics include accounting, billing, and compliance.