Securing the Law Firm Summit

The perfect storm for legal cybersecurity?

2nd July 2026 • Park Plaza Victoria, London, UK

Legal firms face an existential shift that some may not survive. Securing the new business model will be tough.

 

No country for old CISOs? Protecting the Al-native law firm 

Law firms, like many other services companies, face an uncertain future. Is their current business model obsolete, as Al tools take over many of the low- to mid-level functions of the old fashioned 'document producer' operating model? Will senior partners see Al as an easy way to higher profits even while the technology is still nascent? And what do law firms, and the wider legal marketplace, look like in a world in which Al tools really do deliver on their promises? 

While the business wrestles with these questions, the future operating model of their firms also profoundly affects cybersecurity teams. As we have seen recently with the attack on consultancy firm McKinsey, and others, the Al tools being introduced into firms to deliver this alleged revolution are vulnerable to a range of security issues, from the Echoleak/ZeroClick vulnerabilities in Microsoft 365 Copilot, to the data leakage and access control issues with the use of off-the-shelf LLMs. 

And, as Al-enabled attacks also show, Al agents are being used offensively as well as creating vulnerabilities within the organisations in which they are deployed. If identity is the new perimeter, it just got even more complicated. 

The potential upheaval in their operating model, the already unique challenges of securing client data in an environment of constant external data sharing around sensitive real-time deal making, and the attractiveness of the firms as a target for both economic and nation-state/geopolitical actors, will create the perfect storm for cybersecurity leaders in the legal sector. 

So, what needs to be done? 

Law firms need to accelerate their current BAU security programmes whilst adding additional Al-related initiatives: 

  • Upgrade identity security: identity lifecycle management & privileged-access hardening; unifying 1AM, PAM, CIEM, and SSO into a coherent identity fabric; conditional access with continuous risk scoring; identity threat detection (ITDR); MFA hardening+ phishing­resistant methods (FID02, passkeys).
  • Add Al-driven identity security and insider-threat detection, Al-augmented anti­phishing and social engineering defences, Al-powered vulnerability discovery and code security, and Al-enhanced soc operations.
  • Modernise detection and response modernisation: XDR + Al-augmented SOC; automated incident response and playbooks; adversary-simulation tooling to tune detections.
  • Third-party and Saas risk: Continuous external attack-surface monitoring of vendors; Automated evidence collection & assurance workflows; contract-level visibility of data access, and attack/threat data.
  • Data security and data governance (especially in Al-driven environments): data discovery; DSPM (Data Security Posture Management); guardrails for LLM/AI usage: data leakage prevention, policy enforcement.
  • Business continuity and resilience engineering: immutable backup architecture + automated recovery; mapping minimum viable business processes; dependency mapping across apps, vendors, cloud, data.

 

The Securing the Law Firm Summit will look at the latest thinking around legal cybersecurity. As well as presentations from some of the world’s largest firms we will also be asking how small and medium-sized organisations can keep up with cybersecurity best practice in the sector.

 

 

Key themes will include:

Identity, authority, and control for non-human actors 
CISOs must rethink core identity and governance frameworks, including the adoption of robust agent identity models (spanning machine, service, and workload identities), and clearly defined delegation structures that determine what authority an agent holds and who grants it. What technologies can help them maintain visibility and control? 

Securing algorithmic insiders 
What does "insider threat" mean when the actor is non-human? For CISOs, the focus shifts to monitoring the behaviour of agents as well as users, developing capabilities to detect anomalous machine activity, and establishing effective controls that balance guardrails, detection, and containment. Do you need Al defences to do that? 

Data control when there is no perimeter 
How can firms enforce confidentiality when data is constantly in motion across systems the firm does not fully control? For CISOs, does this mean that the focus must shift toward controlling data itself rather than the environments it resides in? If so, what kinds of architectures and solutions can deliver security in that context? 

The power of automation 
There's too much manual intervention in security. SOAR pulls data from SIEMs, EDRs, firewalls, cloud APls, ticketing systems threat intelligence feeds, and even email servers and coordinates actions across tools via APls and prebuilt integrations and intelligent playbooks. Well, that's the theory. How does it work in the real world? 

Integrity and the Al-enabled supply chain 
Al-native operating models imply dependence on a complex supply chain of foundation models, internal systems, and external APls and orchestration layers that collectively produce legal work. Imagine the consequences of hacking such a system. So how do CISOs stop that happening? 

Dealing with regulations 
CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands; they must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret differently later; they face unrealistic expectations around incident reporting; and they face personal liability. Can RegTech help? 


Who attends

Job titles

Security Architect
Information Security Senior Analyst
Head of Solutions Delivery
Head of Information Security
Operations Manager, Cyber
Global Information Governance Manager
IT Security Manager
Cyber Security Analyst
Cyber Security Technologist
IT Manager
Info Sec Governance Risk & Compliance Manager
Head of Information Technology
Senior Information Security Analyst
Head of IT Operations
Head of Cyber Security
Chief Information Security Officer
IT Operations and Security Manager
Security Operations Engineer
Head of IT & Operations
Head of IT
CISO
Director of IT
Head of GRC
Cyber GRC Manager
Head of Cyber Security
Security Analyst
Information Security Analyst
IT Risk and Disaster Recovery Manager
Lead Enterprise Architect
Information Security Manager
Information Security Governance Manager
Head of Technology and Security
Head of IT
Lead Cybersecurity Engineer
Information Security Analyst
Head of Information Technology
Security Operations Manager
Cyber Security Manager
Information Security Manager
Senior Business Continuity & Resilience Specialist
Lead End User solutions engineer
Security Architect
Head of Information Security
Chief Information Security Officer
Information Security Officer
IT Manager
Information Security Analyst
Information Security Officer
Information Security Manager
IT Admin and Compliance Officer
Information Security Manager
Director of IT
Senior Manager Business Assurance
Information Security Architect
Head of IT and Information Security Officer
IT Manager
Head of Information Security
Director of IT
IT Director
Director of Information Security
Head of IT
Customer Support Analyst
Information Governance
IT Director
Cyber Security Specialist
Head of IT
Information Security Analyst
Head of IT Infrastructure and Architecture
Chief Information Officer
IT Manager
Director of Risk and Compliance
Cyber Security Analyst
IT and Cyber Security Administrator
Global Info Sec GRC Manager
Head of Information Security
Information Security Manager
Cyber Consulting Director
Director, Risk & Compliance
Cyber Security Manager
Compliance Consultant
Information Security Officer
Cyber Security Engineer
Senior Manager, Platforms and Infrastructure Design
Chief Information Officer
Information Security Officer
Information Security Manager
Unified Communications and Collaboration Services
CTO
Head of Information Security
Data Privacy and Regulatory Compliance Lawyer
Information Security Operations Analyst
Information Assurance Officer
Senior IT Manager
Information Security Manager
Information Security Specialist
SecOps Manager
Risk, Culture and Engagement Lead Specialist
Associate Director - Information Security
Applications Support Specialist
CISO - Corporate Functions
Lead End User Computing Solutions Engineer
IT Manager

Organisations

Walkers Global
Shakespeare Martineau
Gateley Plc
Slaughter and May
Clyde & Co LLP
HFW
The Law Society
HFW
Macfarlanes LLP
Gill Jennings & Every LLP
Shakespeare Martineau
King & Wood Mallesons (KWM)
Horwich Farrelly
Addleshaw Goddard LLP
HFW
Withersworldwide LLP
EIP Europe LLP
Travers Smith LLP
Cains
Beale & Co
Walkers Global
CMS
Dentons UKMEA LLP
Mishcon de Reya LLP
DLA Piper LLP
Taylor Wessing LLP
Travers Smith LLP
Norton Rose Fulbright LLP
Shakespeare Martineau
Wedlake Bell LLP
RPC LLP
Howard Kennedy LLP
RPC LLP
Mishcon de Reya LLP
Forsters LLP
Lightfoots LLP
Shakespeare Martineau
Foot Anstey LLP
Burges Salmon LLP
Clifford Chance LLP
Clifford Chance LLP
Ashurst LLP
Freeths LLP
Clyde & Co LLP
Ashurst LLP
Colman Coyle LLP
Joseph Hage Aaronson
Taylor Wessing LLP
Gateley Plc
Birketts LLP
Ward Hadaway
IBB Law
Brodies LLP
Clifford Chance LLP
Bates Wells LLP
Martin Tolhurst Solicitors
Addleshaw Goddard LLP
Bevan Brittan LLP
Stewarts Law LLP
Morae Global
Wiggin LLP
Birkett Long LLP
Penningtons Manches Cooper LLP
Boult Wade Tennant
Government Legal Department
Russell-Cooke LLP
Shakespeare Martineau
Blake Morgan LLP
Horwich Farrelly
Cadwalader Wickersham & Taft LLP
Dechert LLP
Addleshaw Goddard LLP
Martin Tolhurst Solicitors
Allen & Overy LLP
Mishcon de Reya LLP
Macfarlanes LLP
Mishcon de Reya LLP
Wedlake Bell LLP
RPC LLP
Coole Bevis LLP
Shepherd and Wedderburn
HFW
Hogan Lovells International LLP
Buckles Solicitors LLP
Gowling WLG
Ashurst LLP
Clifford Chance LLP
Hogan Lovells International LLP
Bird & Bird LLP
Dechert LLP
Shakespeare Martineau
Trowers & Hamlins
The Honourable Society of Lincoln's Inn
HFW
Travers Smith LLP
Farrer & Co LLP
DLA Piper LLP
Morae Global
Orrick Herrington & Sutcliffe LLP
Credit Suisse
Clifford Chance LLP
4 New Square

Industries

Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Banking
Legal
Barristers Chambers


Venue

Park Plaza Victoria, London

vpp

Location:
Park Plaza Victoria
239 Vauxhall Bridge Road, London, UK, SW1V 1EQ
Telephone: 0333 400 6140

Directions:
Please click here