Actions and Detail Panel
Effective cyber security strategies for your law firm
Wed 24 May 2017, 13:30 – 16:30 BST
There is a large amount of information available to law firms on what should be done for cyber security. There is significantly less information available on how you should approach putting cyber security in place. This course provides an overview of the “how” so that participants can proceed to make a tangible plan.
The cyber security kill chain as context to prevention strategies
- How cyber-attacks occur using noteworthy examples
- How seemingly protected environments are still hacked
Cyber security strategy maturity levels
- Concepts of confidentiality, integrity and availability
- A maturity framework for understanding cyber security
Asset classification as the key to dividing and conquering
- How your data assets will drive your cyber security plans
- Drive decisions using threats, vulnerabilities, and impact
The concept of security in layers for protecting your firm
- How security in layers can protect very sensitive data
- The interdependence of IT systems and their weakest links
Six steps for creating a cyber security plan
- The operational considerations for cyber security
- Where cyber security plans go wrong
Who should attend
Suitable for practice directors, compliance officers, managing partners, operations managers, finance directors, and anyone responsible for IT strategy.
- Law firm specific - our training is specific to law firms and incorporates relevant industry and regulatory examples
- Interactive - we keep our training sessions limited to 10 people so that everyone has the chance to engage
- No technical knowledge needed - we will fill in the blanks, so that you can understand the concepts
- Demonstration based - we show you how things work using demonstrations
- Action based outcomes - we take you through a checklist of actions that you can apply to your firm
All participants recieve a comprehensive cyber security checklist. The checklist captures advice from the SRA, ICO and GCHQ, along with our own experience. The checklist can be used in your own firms to do a self assessment of any cyber security gaps that may exist.
Richard Tucker has 17 years’ experience in the IT industry and has significant experience managing and deploying cyber security solutions in both government and the private sectors. Richard has an honours degree in engineering and a degree in economics from the Australian National University.