£82.88

Effective cyber security strategies for your law firm

Event Information

Share this event

Date and Time

Location

Location

British Computer Society

5 Southampton St

London

WC2E 7HA

United Kingdom

View Map

Friends Who Are Going
Event description

Description

Course overview

There is a large amount of information available to law firms on what should be done for cyber security. There is significantly less information available on how you should approach putting cyber security in place. This course provides an overview of the “how” so that participants can proceed to make a tangible plan.

Agenda

The cyber security kill chain as context to prevention strategies

  •  How cyber-attacks occur using noteworthy examples
  •  How seemingly protected environments are still hacked

Cyber security strategy maturity levels

  •  Concepts of confidentiality, integrity and availability
  •  A maturity framework for understanding cyber security

Asset classification as the key to dividing and conquering

  •  How your data assets will drive your cyber security plans
  •  Drive decisions using threats, vulnerabilities, and impact

The concept of security in layers for protecting your firm

  •  How security in layers can protect very sensitive data
  •  The interdependence of IT systems and their weakest links

Six steps for creating a cyber security plan

  • The operational considerations for cyber security 
  • Where cyber security plans go wrong

Who should attend

Suitable for practice directors, compliance officers, managing partners, operations managers, finance directors, and anyone responsible for IT strategy.

Course format

  1. Law firm specific - our training is specific to law firms and incorporates relevant industry and regulatory examples
  2. Interactive - we keep our training sessions limited to 10 people so that everyone has the chance to engage
  3. No technical knowledge needed - we will fill in the blanks, so that you can understand the concepts
  4. Demonstration based - we show you how things work using demonstrations
  5. Action based outcomes - we take you through a checklist of actions that you can apply to your firm

Course materials

All participants recieve a comprehensive cyber security checklist. The checklist captures advice from the SRA, ICO and GCHQ, along with our own experience. The checklist can be used in your own firms to do a self assessment of any cyber security gaps that may exist.

Presenter

Richard Tucker has 17 years’ experience in the IT industry and has significant experience managing and deploying cyber security solutions in both government and the private sectors. Richard has an honours degree in engineering and a degree in economics from the Australian National University.

Share with friends

Date and Time

Location

British Computer Society

5 Southampton St

London

WC2E 7HA

United Kingdom

View Map

Save This Event

Event Saved