Do you know where your organization’s data is? It’s not a rhetorical question—it’s a serious issue that should be at the core of any cybersecurity assessment. Many IT and security departments may have all sorts of sophisticated tools and processes for securing data in-house, but what about service providers who have access to the network? What about outside law firms handling the data on their own premises or in the cloud? And what about the vendors that those firms use?

Cybersecurity has been elevated to a top priority in today’s corporate boardrooms, as news of major data breaches has become commonplace over the last few years. The scope of some of those breaches has reached catastrophic proportions, and recent discoveries illustrate the systematic approach of hackers’ third-party vendor attack strategy.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]