• Mail
SUBMIT A CASEABOUT
Law and Forensics
  • Capabilities
    • eDiscovery
      • Document Review and Production
      • eDiscovery Consulting and Strategy
      • ESI Preservation and Collection
      • ESI Processing and Hosting
      • Expert Testimony and Reporting
    • Cybersecurity
      • Cybersecurity Assessments
      • Board-Level Cybersecurity Services
      • Cybersecurity Consulting
      • Industry-Specific Cybersecurity Solutions
      • Cybersecurity Expert Witness Services
      • Cybersecurity Incident Response Services 
    • Forensic
      • Forensic Consulting
      • Forensic Expert Witness
      • Forensic Investigations
      • Forensic Analysis
      • Computer Forensics Services
      • Cloud Computing Forensics
      • Internet of Things Forensics
      • Mobile Device Forensics
      • Server Forensics
      • Social Media Forensics
    • Digital Banking
      • Blockchain Services
      • CSO and CRO Advisory Service
      • Digital Banking Expert Witness Services
      • Digital Banking Regulatory Compliance Services
      • Digital Banking Strategy Consulting Services
      • Digital Banking Training Services
    • Privacy
      • Privacy Consulting
      • Privacy-Focused Regulatory Services
      • Privacy Incident Response Planning
      • Privacy Program Development
  • Products
  • Insights
  • Search
  • Menu Menu
  • Predictions And Threats For The Year In Cybersecurity

    INSIGHTS

TAG Cyber Law Journal

Predictions And Threats For The Year In Cybersecurity

March, 2018

By Legal BlackBook

PREDICTIONS AND THREATS FOR THE YEAR IN CYBERSECURITY

Legal BlackBook: The MIT article focused on the likely future targets of cyberattacks, including cloud storage companies, data brokers who store information about people’s Web browsing habits, and infrastructure such as electric grids and voting machines. What potential targets strike you as the most important for in-house lawyers to pay attention to?
Daniel Garrie: Vendors and supply chains. They will have the biggest impact, and there is a high likelihood that they will be targeted. This presents a huge risk because larger companies can have many vendors, some of which may have connectivity to a company’s most sensitive information. If vendors get hit and they have the right level of connectivity, that can have the most material consequences to the organization.

LBB: What can they do to protect their companies?
DG: Three things. First, policies and procedures should be implemented and followed. It is not enough to simply make policies and consider the problem solved. Having a bunch of policies that no one at the company follows is a problem. Having a bunch of procedures that aren’t followed by managers or vendors is also a problem. That’s why it is critical to ensure that policies are being followed by anyone with access to company data. Second, there should be a robust structure for educating employees on good information security practices. It’s important that the training is not threat-driven, but rather engages employees and focuses on the constructive rather than destructive aspects of security. The third area is insurance. They should make sure they’ve done an evaluation and adjustment of their insurance framework and coverages, and understand where the gaps are. They need to review their insurance in light of all their risks, and then determine what they may need to insure against from a cyber perspective.

LBB: Based on your experience, how do you think they’re doing?

DG: Most of the companies I have worked with struggle with all three—at different levels, depending on the resources they have available to them.

To read the full article, go to TAG Cyber Law Journal

Newsletter

Sign Up for Updates!

Jobs

Apply for a Job

Products

Assessments
Playbooks
Tabletop.ai
Legal Cyber Academy
ForensicTools.dev



Contact Us

Sales Inquiry
​Press Inquiry
​Speaking Inquiry

Capabilities

Digital Banking Services
Forensic Services
Cybersecurity Services
eDiscovery Services
Privacy Services

RESOURCES

About Us
Events
Search

Law & Forensics © 2023. All Rights Reserved
  • Privacy Policy
  • Legal Notices
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more×

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visit to our site you can disable tracking in your browser here:

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Other cookies

The following cookies are also needed - You can choose if you want to allow them:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy
Accept settingsHide notification only

Subscribe to Our Newsletter!

* indicates required

 





Please select all the ways you would like to hear from Law and Forensics:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp’s privacy practices here.