Closing The Loop

Hackers have law firms in their crosshairs. It’s no wonder why. Law firms are increasingly viewed as “one-stop shops” for valuable corporate information. After all, why hack a dozen different companies when you can simply infiltrate their law firm, gaining access to some of their most sensitive information?

As dozens of examples show, when hackers target law firms, they’re too often successful. Recent, headline-making law firm cyberattacks include:

  • The devastating Panama Papers leaks, which exposed the way global elites shelter their wealth and led to the shuttering of the hacked firm, Mossack Fonseca, at the center of the scandal;
  • The infiltration of Cravath and Weil Gotshal, which saw valuable M&A information siphoned off by foreign hackers with ties to the Chinese government;
  • The massive ransomware attacks on DLA Piper, which forced the firm to halt almost all operations for days, at the cost of millions of dollars.

And those are just a few of the highest profile examples. Smaller firms, too, are often targeted by hackers, with equally distressing results.

What is it that makes these firms susceptible to such attacks and what can be done to prevent them in the future?

Join us for an upcoming webinar as we explore just that question. On July 18th, our panel of experts will explain the “anatomy of a hack,” using examples from real-world law firm cyberattacks, and demonstrate what you can do to protect yourself and your clients.

Anatomy of a Hack Intro Slide

 

Sign up for the webinar now to learn:

  • Why cybercriminals are increasingly targeting legal professionals
  • What vulnerabilities make law firms easy prey for hackers
  • The ethical implications of law firm cybersecurity
  • How to protect yourself, your clients, and your data

Featuring a panel of experts, including:

Jake BernsteinJake Bernstein: An attorney with Newman Du Wors, Jake Bernstein’s practice focuses on counseling clients on cybersecurity issues. A former Washington State Assistant Attorney General and a frequent speaker and advisor on cybersecurity legal issues, Bernstein has significant experience with regulatory compliance, privacy, and cybersecurity law.


eli_wald_circleEli Wald: A professor of legal ethics at the University of Denver’s Sturm College of Law, Eli Wald was one of the first academics to investigate the ethical implications of law firm cybersecurity. A frequent author and speaker on ethics and professional responsibility, his work has been cited in ABA ethics opinions and excerpted in legal ethics casebooks.


Kip BoylKip Boyle: A 20-year information security expert and founder of Cyber Risk Opportunities, Kip Boyle advises global companies in the logistics, technology and financial services industries. He is a nationally recognized analyst, lecturer and thought-leader in cyber risks and has been featured in Entrepreneur magazine, Chief Executive magazine and others.


Save your seat today and save yourself from a potentially devastating cyberattack in the future. If you can’t make it, don’t worry. Sign up anyway and you’ll have access to the webinar at any time, on-demand once it airs.

Watch an on-demand webinar on eDiscovery dirty tricks (and how to defeat them)

Subscribe To Our Blog

Download your free guide to Slack Discovery

Let us know what you thought about this post.

Put your comment below.