Meeting your clients’ compliance requirements is becoming a regular part of doing business. The challenge is that there are no regulated mandates for cybersecurity policies and procedures in the legal industry, so firms are left to figure it out on their own. From trade secrets to client information, you have an ethical and legal obligation to protect your firm’s privileged data. Cyber-attackers who struggle to breach an organization’s network more commonly see their outside counsel as an easy target. Unfortunately, cybersecurity is an inherently difficult problem in the legal industry. Recent breaches have put third-party due diligence in the spotlight and as a result, legal firms are being held to the various regulatory obligations of their clients (e.g. HIPAA, GDPR,PCI, FINRA and SEC). And, cybersecurity isn’t always top of mind, as firms naturally focus their investment on client defense, rather than cyber protection. This evolution in client requirements has led to new selection criteria for doing business with a firm. While due diligence is a common exercise, there’s no common framework or regulated mandates for cybersecurity policies and procedures that firms can adopt that meets all clients’ regulatory requirements. To help legal firms meet client requirements, we’ve developed a checklist based on the six pillars laid out in The ABA Cybersecurity Handbook. 1 ABA Tech Report 2017 2 ABA Journal March 2017 3 2018 Cost of Data Breach Study, Phonemon Legal Cybersecurity Checklist 38% of breach victims reported loss of billable hours as a consequence 1 62% of firms over 500 lawyers provided with cybersecurity requirements by their clients 2 57% YoY increase in number of legal firms that have experienced a breach 1 3.86M - average cost of a breach 3
10
Embed
Legal Cybersecurity Checklist€¦ · 4.0 Test Environment for New Software/Applications 4.A Test/Dev for New Software 4.B Test/Dev for Web Application PART 3: Protection of Network
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Meeting your clients’ compliance requirements is becoming a regular
part of doing business. The challenge is that there are no regulated
mandates for cybersecurity policies and procedures in the legal industry,
so firms are left to figure it out on their own.
From trade secrets to client information, you have an ethical
and legal obligation to protect your firm’s privileged data.
Cyber-attackers who struggle to breach an organization’s
network more commonly see their outside counsel as an
easy target.
Unfortunately, cybersecurity is an inherently difficult problem
in the legal industry. Recent breaches have put third-party due
diligence in the spotlight and as a result, legal firms are being
held to the various regulatory obligations of their clients (e.g.
HIPAA, GDPR,PCI, FINRA and SEC). And, cybersecurity isn’t
always top of mind, as firms naturally focus their investment on
client defense, rather than cyber protection.
This evolution in client requirements has led to new selection
criteria for doing business with a firm. While due diligence is a
common exercise, there’s no common framework or regulated
mandates for cybersecurity policies and procedures that firms
can adopt that meets all clients’ regulatory requirements.
To help legal firms meet client requirements, we’ve developed
a checklist based on the six pillars laid out in The ABA
Cybersecurity Handbook.
1ABA Tech Report 20172ABA Journal March 2017
32018 Cost of Data Breach Study, Phonemon
Legal Cybersecurity Checklist
38%of breach victims reported
loss of billable hours as a consequence1
62%of firms over 500 lawyers
provided with cybersecurity requirements by their clients2
57%YoY increase in number of
legal firms that have experienced a breach1
3.86M- average cost of a breach3
Build your cybersecurity program?
The Legal Cybersecurity Checklist will help you understand your legal obligations, meet your client’s third-party
requirements and detect and respond to security threats in real-time.
PART 1: Cybersecurity Governance eSentire RAMP eSentire MDR
1.0 Cybersecurity Governance
1.A Chief Information Security Officer or Equivalent
signals identified by eSentire’s analytics engine to
ensure no threat is missed.
esLOG+Purpose-built log management for MDR
• Co-managementUses a co-managed model with access to run your
own advanced search queries, generate alerts,
manage profiles, run reports, and investigate events
alongside our SOC analysts.
• Time to valueesLOG+ is a pure SaaS offering that features simple-
to-deploy collectors with rich filtering capabilities
that can be up and running within minutes.
• Simplified compliance management and reportingEnsures compliance mandates are met with
centralized logging, continuous monitoring, and
automated retention policies with various out of
the box, and custom security reports that meet
regulatory requirements such as HIPAA, PCI,
SEC, GDPR and more.
• Cross-platform monitoring and visibilityCollects, aggregates and monitors data across on-
premises, cloud, multi-cloud, and hybrid platforms like
AWS, Microsoft Azure and the Google Cloud Platform.
• Embedded threat hunting and forensic investigationEmbedded threat hunting and forensic investigation of
aggregated log data accelerate precision and speed
that facilitates rapid response and threat containment.
• Big data and machine learning integrationUtilizes big data, machine learning and predictive
analytics to make sense of expected and unexpected
behavior across your environment with pattern, anomaly
and outlier detection.
• Real-time search and visualizations Preconfigured and customizable searches and
dashboards with KPIs.
7 LEGAL CYBERSECURITY CHECKLIST
eSentire Managed Detection and Response
esENDPOINTNext-gen endpoint threat detection and response
• Prevents attacks from spreadingLocks down and isolates compromised endpoints to
prevent the lateral spread of attacks.
• Managed by 24x7 security operations centers Detects, isolates and responds to threat attacks
in real-time.
• Broad, lightweight device and system support Secures Mac, Linux and Windows devices for local
and remote users with no performance impact to the
endpoints.
• Captures and monitors all activityContinuously monitors, records, centralizes and retains
activity for every endpoint in your organization.
• Detects and scopes cyber-attacks in secondsDetects unknown attacks leveraging attack patterns and
behavioral analytics, not simplistic signatures or IOCs.
• Hunts threats in real-time Allows eSentire SOC analysts to hunt for known and
unknown threats using advanced threat intelligence and
behavioral analytics.
RAMP eSentire Risk Advisory and Managed Prevention continuously identifies blind spots, builds a strategy around risk and operationalizes
capabilities to predict and prevent known threats. Complimentary to our Risk Advisory and Managed Prevention suite
of services, eSentire Managed Detection and Response (MDR) hunts and responds to the unknown. As a result, your
security function is able to measure success over time and becomes adaptable to business performance drivers and
the evolving threat landscape without increased risk or gaps in compliance mandates.
Risk Advisory:
• vCISO
• penetration testing
• risk assessment
• red team
• phishing
• et
Managed Prevention:
• Managed Endpoint Defense
• Managed Vulnerability Service
See Everything
Miss Nothing
Act Before Impact
Harden Against Future Attacks
8 LEGAL CYBERSECURITY CHECKLIST
eSentire Managed Detection and Response
Managed Vulnerability ServiceNext-gen endpoint threat detection and response
• Continuous Optimization and Focused Guidance
eSentire dedicated Managed Vulnerability Service
experts become a genuine extension of your team
providing end-to-end management that optimizes
the vulnerability management lifecycle including
remediation guidance, verification, scan quality
assurance, and weekly communication on newly
discovered vulnerabilities.
• Co-managed Flexibility
Full system access and flexibility to run your own
customized scans and reporting alongside eSentire’s
dedicated Managed Vulnerability Service experts.
• Web Application Scanning (Add On)
Safely and accurately scan your web application
portfolio without the worry of performance latency or
disrupting your development team.
• PCI Approved Scanning Vendor Solution (Add On)
Streamline and comply with quarterly scanning
requirements required by PCI 11.2.2.
• Comprehensive Visibility
Industry-leading IT asset coverage with scanning
available for more than 109,000 vulnerabilities.
• Elastic License Model
Assets-based licensing built for dynamic and quickly
changing environments that consumes a single license
unit per asset, even if the asset has multiple IP addresses.
• Dynamic Asset Tracking
Group and classify assets in a single pane of glass
with attributes beyond IP addresses to more accurately
identify and prioritize new and existing vulnerabilities.
• Business Contextual Risk Prioritization
eSentire dedicated Managed Vulnerability Service experts
provide risk prioritization and guidance specific to your
unique business context.
• Executive and Technical ReportingCustom executive and detailed summary reporting
available for technical and non-technical audiences.
• Regulatory Requirement Reporting
Pre-built compliance reporting and dashboards for
multiple security frameworks including PCI, NIST,
ISO, and CIS.
9 LEGAL CYBERSECURITY CHECKLIST
eSentire, Inc., the global leader in Managed Detection and Response (MDR), keeps organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. Protecting more than $6 trillion AUM, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @eSentire.