Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.
Countless organizations have devoted considerable amounts of resources and time building cybersecurity defenses in the last decade. However, efforts to build secure supply chain networks have only begun in recent years. Indeed, it was not until the April 2021 compromise of SolarWinds software that led to a swath of intrusions across government entities and various industries that attacks on supply chain networks became a common concern within the C-Suite. The heightened threat to distribution networks compelled attorneys, among other professionals, to rethink how best to protect existing infrastructure and allocate risks. This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.
This premium content is reserved for
Law Journal Press Subscribers.
Continue reading by getting
started with a subscription.
Plan to Protect: Cybersecurity for Employees Before Day One
By Luke Tenery and Daron Hartvigsen
With new employees come new risks; from aspiring insider threats that intend to join a target to extract sensitive information, to insecure processes being exploited due to too much trust being placed in candidates and new hires.
Preparing Companies for Impending Data Privacy, Cybersecurity Changes
By Sarah F. Hutchins
Failing to pay attention to shifting data privacy and security regulations can be costly. Here’s an overview of what’s been happening — and what’s likely to happen next — in the world of data privacy and security.
AI Considerations for In-House Counsel
By Charmian Aw, Diletta De Cicco, Annette Demmel, Charles-Albert Helleputte, Kyle Fath, Alan Friel, Julia Jacobson, Bartolome Martin and David Naylor
Having an AI policy that outlines acceptable use, and documenting assessments that establish that AI systems are used in a manner consistent with the policy and that the benefits outweigh potential harms, can go a long way in managing legal and reputational risk.
4 Pitfalls To Avoid In Legal Operations (and How to Deal With Them)
By Brian Corbin
For legal stakeholders seeking to take their existing legal operations programs to the next level or start new programs from scratch, there are a few all-too-easy traps that can stunt growth, cost political capital and cause headaches. Having a strategic plan, budget and critical executive buy-in is not enough to avoid these four common issues.