Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,230 results for "Cybersecurity Law & Strategy"...

The Evolution of the 'Virtual Law Firm'
<b><i>Though “Virtual Firms” Are on the Decline, Cloud Technology May Be Shifting the Model to Refocus on Lawyer Mobility</i></b><p>While the "virtual lawyer" may be on the decline, the technology making law practices more portable and potentially more efficient has seen a surge. The rise of cloud computing in particular has made it possible for attorneys to keep all the technology tools they need to practice on hand at all times and eschew direct client contact and office space if so desired.
Cybersecurity Public Private Partnerships: Challenges and Opportunities
Close cooperation between the public and private sector is crucial, given the enormous risks associated with the continued acceleration of global connectedness. Upon closer inspection, however, significant cultural and legal barriers exist that can hinder further cooperation necessary to effectively combat the cyber theat.
Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines
For many of us, the term "data breach" conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats.
<i><b>Legal Tech:</i></b><br>Three Legal Challenges In-House Counsel Face with 3-D Printing
<b><i>As 3-D Printing Becomes More Widespread, In-House Counsel Will Be Tasked with Complex IP and Liability Challenges</b></i><p>Yet another potentially disruptive technology is set to join the ranks of blockchain and AI as a headache for legal: 3-D printing. While its use in legal is limited, 3-D printing presents unique challenges to in-house counsel prosecuting or defending IP and liability issues.
Virtual Snooping
The modern-day snoop is all too often someone you know. If this consideration doesn't leave you paranoid and looking over your shoulder, it should.
Presidential Cybersecurity Handoff
Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.
Internet Law in a Trump Presidency
President Trump is already being pressured to reverse President Obama's Open Internet Order (also known as “net neutrality”) and take an aggressive stance against it. It remains to be seen how President Trump will balance the call for privacy regulations amidst our country's vulnerability to cyber-attacks.
Is Your Data Breach Response Plan Good Enough? Stress Test It
As the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.
Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence?
Law firms are increasingly confident in their cybersecurity capabilities, despite many falling short of adequate breach response preparation.
Best Practices in Data Security for Financial Institutions
The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.

MOST POPULAR STORIES