Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.
Countless organizations have devoted considerable amounts of resources and time building cybersecurity defenses in the last decade. However, efforts to build secure supply chain networks have only begun in recent years. Indeed, it was not until the April 2021 compromise of SolarWinds software that led to a swath of intrusions across government entities and various industries that attacks on supply chain networks became a common concern within the C-Suite. The heightened threat to distribution networks compelled attorneys, among other professionals, to rethink how best to protect existing infrastructure and allocate risks. This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.
*May exclude premium content
By Ben Schmidt and Nathan Curtis
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let’s take a closer look.
By John Beardwood and Shan Arora
Part Three In a Series
Part Three continues the analysis of new compliance requirements in Canada's new Consumer Privacy Protection Act, including the content of organizational privacy policies and anonymization of personal information policies, and business transaction policies contained in the Act.
By Anthony Davies
Routines based around ‘work from home’ are calcifying, and commuting, parking, sandwich shops and childcare are fading into distant memory. With each passing week, the challenge to win attorneys back into the office increases.
By Steve Whiter
With hybrid and remote working practices having become the norm, lawyers communicate through messaging applications — including on personal devices — and firms are using innovative technologies in novel ways as they adopt digital means of working. In this digital-first landscape, all data is at risk. The good news is that new security solutions offer law firms a range of new tools to counter this threat.