Securing the Law Firm

Time to think of law firms as CNI?

22nd January 2025 • Park Plaza Victoria, London, UK

Given the data it holds, the legal sector is a critical part of the economy. It should be secured as such.

 

‘Particularly vulnerable’

Nick Emmerson, president of the Law Society of England and Wales, commented recently that the legal sector is ‘particularly vulnerable to cyber attacks’, and reminded firms how important it is for the economy that they get security right.

Bearing out these comments, a recent survey showed that the number of successful cyber-attacks against UK law firms rose by 77% in the past year to 954, up from 538 the year before, according to a new study of the threat.

Ransomware actors in particular see law firms as easy meat and have targeted the sector.

At the same time, law firms continue to invest heavily in new technology to lower costs and improve productivity. This investment, which includes big investments in Cloud and AI, expands the attack surface available to hackers and increases vulnerability.

And all of this needs to be secured just as the current economic and geopolitical turbulence is making law firms an even more attractive target to traditional and nation-state attackers.

So:

  • How are legal cybersecurity professionals coping with the expansion of the attack surface via new tech and outsourcing
  • How are they ensuring third-party security?
  • How are they building in resilience against Cloud outages that can affect all elements of their business processes and even their SaaS cybersecurity vendors?
  • How are they dealing with the continuing threat to their businesses posed by
    ransomware?
  • And how are they progressing with the core cyber hygiene we all struggle with around hybrid working, email security, ransomware, patching and IDAM?

This January, join security leaders from across the UK’s legal sector to discover their priorities, concerns and the actions they are taking to defend themselves against continued attack. And learn what they really think about AI.

 

Securing the Law Firm will look at the latest thinking around legal cybersecurity. As well as presentations from some of the world’s largest firms, we will also be asking how small and medium-sized organisations can keep up with cybersecurity best practice in the sector.

  • Cloud incident response

    • Recent Cloud outtages have not simply disrupted low-level infrastructure, they have disabled cybersecurity solutions and sometimes shut down corporate access to critical network assets.
    • As well as managing Cloud security, CISOs need good Cloud incident response. How are they going about it?
  • Solutions for CISO burnout

    • The number of security professionals on LinkedIn who’ve left without another job to go to is astonishing given the shortage of cyber-talent.
    • Are CISOs being fired for breaches?
    • Are they quitting companies who’ve lied about their commitment to security?
    • How can firms solve this problem?

     

  • Embracing risk management

    • Until cybersecurity is truly seen as risk management and not a whack-a-mole IT problem, the hackers will continue to evade outmoded control frameworks
    • Part of this is down to CISOs, part of it to Boards and part of it to solution providers
    • The banks have done it. When will the rest of business catch up?
  • Re-thinking email and messaging: is there a better way?

    • From secure web gateways to clever tools designed to let employees flag suspicious emails, technologists have tried to solve the problem of email and message-delivered malware. And they’ve failed.
    • This is still the number one vector for the cyber attacks that cause real damage.
    • Is there another way?
  • Fixing Cloud configuration

    • Cloud security is a multi-dimensional problem.
    • But underneath all the technology and complexity, once again it is human error that is likely to cause the most material losses.
    • For large firms with complex hybrid and multicloud environments, this problem is compounded.
    • So, what are the most common errors and how can they be avoided?
  • Ransomware – dealing with the new normal

    • The US Treasury reported that companies paid an estimated $5.2 billion in BitCoin transactions due to ransomware payments for companies in 2021.
    • Only a quarter of ransomware attacks are reported. 
    • Ransomware is here to stay. So how can CISOs stop it being a permanent tax on the business?
  • From awareness to behaviour

    • There’s too much talk of awareness in cybersecurity and not enough talk about actually changing behaviour.
    • There’s too little talk of personal accountability and disciplinary enforcement of security policies.
    • These are controversial statements - but should they be?
    • Isn’t part of the paradigm shift we need a fundamental change in employee responsibility?
  • Managing insider threats at a time of crisis

    • When economies are under stress, employees too can find themselves in financial difficulty. When geopolitical tensions rise, people can take sides.
    • Insider threats of various kinds become far more prevalent and dangerous at times like these.
    • How have security and other MIS tools matured to make detecting malicious insiders easier and more accurate?
  • From cybercrime to cyberwar

    • Blurred lines between cyber-spies, cybercriminals and cyber-armies have transformed the (in)security landscape
    • Nation-state exploits are now widely available
    • How can the various elements of government work better with private sector solution providers and endusers to build security that can cope with not-quite-nation-state attackers?
  • Streamlining tools and information: focus on insight

    • To solve their problems cybersecurity teams are told to add ever more tools to their stacks, and ingest ever more internal and external data.
    • And then they are told to somehow aggregate all of that complexity to detect cyberattacks, determine risk metrics and all the rest of it.
    • So how to change the paradigm?
  • NIS2 – changing the game in cybersecurity?

    NIS2 expands the scope of who is included. It adds more regulations and divides the world into two tiers, each with different requirements. And it increases the personal liability of senior officers around cybersecurity failings. So how does this new regulatory environment change the cybersecurity calculus? What do firms need to do now?

  • Re-engineering the SOC: the problem of alert overload

    • One specific example of staff overload is the SOC.
    • There are debates over the value of network traffic analysis and other data.
    • Meanwhile SOC teams are flooded with false positives and even ‘smart’ solutions do not alter this calculus very much.
    • Is the answer to outsource or evolve?

Who attends

Job titles

Security Architect
Information Security Senior Analyst
Head of Solutions Delivery
Head of Information Security
Operations Manager, Cyber
Global Information Governance Manager
IT Security Manager
Cyber Security Analyst
Cyber Security Technologist
IT Manager
Info Sec Governance Risk & Compliance Manager
Head of Information Technology
Senior Information Security Analyst
Head of IT Operations
Head of Cyber Security
Chief Information Security Officer
IT Operations and Security Manager
Security Operations Engineer
Head of IT & Operations
Head of IT
CISO
Director of IT
Head of GRC
Cyber GRC Manager
Head of Cyber Security
Security Analyst
Information Security Analyst
IT Risk and Disaster Recovery Manager
Lead Enterprise Architect
Information Security Manager
Information Security Governance Manager
Head of Technology and Security
Head of IT
Lead Cybersecurity Engineer
Information Security Analyst
Head of Information Technology
Security Operations Manager
Cyber Security Manager
Information Security Manager
Senior Business Continuity & Resilience Specialist
Lead End User solutions engineer
Security Architect
Head of Information Security
Chief Information Security Officer
Information Security Officer
IT Manager
Information Security Analyst
Information Security Officer
Information Security Manager
IT Admin and Compliance Officer
Information Security Manager
Director of IT
Senior Manager Business Assurance
Information Security Architect
Head of IT and Information Security Officer
IT Manager
Head of Information Security
Director of IT
IT Director
Director of Information Security
Head of IT
Customer Support Analyst
Information Governance
IT Director
Cyber Security Specialist
Head of IT
Information Security Analyst
Head of IT Infrastructure and Architecture
Chief Information Officer
IT Manager
Director of Risk and Compliance
Cyber Security Analyst
IT and Cyber Security Administrator
Global Info Sec GRC Manager
Head of Information Security
Information Security Manager
Cyber Consulting Director
Director, Risk & Compliance
Cyber Security Manager
Compliance Consultant
Information Security Officer
Cyber Security Engineer
Senior Manager, Platforms and Infrastructure Design
Chief Information Officer
Information Security Officer
Information Security Manager
Unified Communications and Collaboration Services
CTO
Head of Information Security
Data Privacy and Regulatory Compliance Lawyer
Information Security Operations Analyst
Information Assurance Officer
Senior IT Manager
Information Security Manager
Information Security Specialist
SecOps Manager
Risk, Culture and Engagement Lead Specialist
Associate Director - Information Security
Applications Support Specialist
CISO - Corporate Functions
Lead End User Computing Solutions Engineer
IT Manager

Organisations

Walkers Global
Shakespeare Martineau
Gateley Plc
Slaughter and May
Clyde & Co LLP
HFW
The Law Society
HFW
Macfarlanes LLP
Gill Jennings & Every LLP
Shakespeare Martineau
King & Wood Mallesons (KWM)
Horwich Farrelly
Addleshaw Goddard LLP
HFW
Withersworldwide LLP
EIP Europe LLP
Travers Smith LLP
Cains
Beale & Co
Walkers Global
CMS
Dentons UKMEA LLP
Mishcon de Reya LLP
DLA Piper LLP
Taylor Wessing LLP
Travers Smith LLP
Norton Rose Fulbright LLP
Shakespeare Martineau
Wedlake Bell LLP
RPC LLP
Howard Kennedy LLP
RPC LLP
Mishcon de Reya LLP
Forsters LLP
Lightfoots LLP
Shakespeare Martineau
Foot Anstey LLP
Burges Salmon LLP
Clifford Chance LLP
Clifford Chance LLP
Ashurst LLP
Freeths LLP
Clyde & Co LLP
Ashurst LLP
Colman Coyle LLP
Joseph Hage Aaronson
Taylor Wessing LLP
Gateley Plc
Birketts LLP
Ward Hadaway
IBB Law
Brodies LLP
Clifford Chance LLP
Bates Wells LLP
Martin Tolhurst Solicitors
Addleshaw Goddard LLP
Bevan Brittan LLP
Stewarts Law LLP
Morae Global
Wiggin LLP
Birkett Long LLP
Penningtons Manches Cooper LLP
Boult Wade Tennant
Government Legal Department
Russell-Cooke LLP
Shakespeare Martineau
Blake Morgan LLP
Horwich Farrelly
Cadwalader Wickersham & Taft LLP
Dechert LLP
Addleshaw Goddard LLP
Martin Tolhurst Solicitors
Allen & Overy LLP
Mishcon de Reya LLP
Macfarlanes LLP
Mishcon de Reya LLP
Wedlake Bell LLP
RPC LLP
Coole Bevis LLP
Shepherd and Wedderburn
HFW
Hogan Lovells International LLP
Buckles Solicitors LLP
Gowling WLG
Ashurst LLP
Clifford Chance LLP
Hogan Lovells International LLP
Bird & Bird LLP
Dechert LLP
Shakespeare Martineau
Trowers & Hamlins
The Honourable Society of Lincoln's Inn
HFW
Travers Smith LLP
Farrer & Co LLP
DLA Piper LLP
Morae Global
Orrick Herrington & Sutcliffe LLP
Credit Suisse
Clifford Chance LLP
4 New Square

Industries

Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Legal
Banking
Legal
Barristers Chambers


Venue

Park Plaza Victoria, London

vpp

Location:
Park Plaza Victoria
239 Vauxhall Bridge Road, London, UK, SW1V 1EQ
Telephone: 0333 400 6140

Directions:
Please click here