Data and Cybersecurity Pro
Data and Cybersecurity Pro
OUTLINE
● Introduction
● Types of Cyber Threats in the
Legal Industry
● Legal Considerations for Data
and Cybersecurity
● Protecting Sensitive Data and
Information in the Legal Industry
● Incident Response Planning and
Management
● Real World Legal case
Introduction
Definition of Data
and Cyber security
Definition of Data Security
https://www.cisco.com/c/en/us/products/security/what-is-cyber
security.html
Types of Cyber Threats
Phishing
What is Phishing?
● Phishing and email scams are a type of cyber threat that involves
criminals trying to trick individuals into revealing sensitive information,
such as usernames, passwords, and financial information.
Common Examples
https://www.crowdstrike.com/cybersecurity-1
01/ransomware/ransomware-examples/
Malware
Definition of Malware
https://www.ekransystem.com/en/blog/insider-threat-definition
Insider Threat Types
● Malicious insiders
● Careless insiders
● Compromised insiders
https://www.ekransystem.com/en/blog/insider-threat-definition
Cyber Espionage
Definition
https://www.crowdstrike.com/cybersecurity-10
1/cyberattacks/cyber-espionage/
Examples
https://blog.usecure.io/types-of-phishing-attack
https://etactics.com/blog/phishing-email-examples
IoT Threats
IoT
IoT (Internet of Things) refers to the interconnected network of physical devices,
vehicles, home appliances, and other items that are embedded with software,
sensors, and connectivity which enables them to collect and exchange data.
Examples
https://www.cm-alliance.com/cybersecurity-blog/iot-security-5-cyber-attacks-caused-by-iot-
security-vulnerabilities
Legal Considerations for
Data and Cybersecurity
Data Privacy Laws
Data Privacy Laws
https://dataprivacymanager.net/5-things-you-need-to-know-about-data-privacy/
Electronic
Communications
Privacy Act
(ECPA)
ECPA
https://blog.ericgoldman.org/archives/2014/05/disclosing-uniq
ue-user-ids-in-urls-doesnt-violate-ecpa-in-re-zyngafacebook.h
tm
Importance of updating
https://www.aclu.org/issues/privacy-technology/internet-privacy/modernizing-electronic-communications-privacy-act-ecpa
Health Insurance
Portability and
Accountability Act
(HIPAA)
HIPAA
https://medium.com/searchencrypt/what-is-encryption-how-does-i
t-work-e8f20e340537
Apply Encryption
https://www.merchantfraudjournal.com/two-factor-authentication-work
Example of 2FA
https://www.malwarebytes.com/blog/news/2
018/09/two-factor-authentication-2fa-secure
-seems
Regular Software
Updates and Patches
Updates and Patches
● Software updates often include
security fixes and patches that
help protect against vulnerabilities
and new threats.
● Regular software updates and
patches can also help ensure that
systems remain up-to-date with
the latest technology and
capabilities, helping to increase
https://blog.grantmcgregor.co.uk/2019/why-are-s
overall security and reduce the oftware-updates-or-patches-so-important
risk of data breaches and cyber
attacks.
Employee Training
and Awareness
Awareness and Training
https://isnews.stir.ac.uk/2020/09/21/information-security-awareness-trai
ning-is-here/
Incident Response
Planning and
Management
Purpose
Why the need for planning?
https://www.flaticon.com/
Part of a cycle
● An incident response
plan forms the basis of
your incident response
cycle.
https://www.exabeam.com/incident-response/incident-response-plan/
Defining an Incident
When to consider an event as an incident?
1. Incident Commander
2. Lead Investigator
3. Technical Lead
4. Communications Lead
5. Legal Counsel
6. Information Security Specialist
7. IT Operations Lead
Communication and Coordination within the Team
The success of incident response planning largely depends on effective
communication and coordination within the incident response team. The
following are the key elements to consider when it comes to communication
and coordination within the team:
1. Chain of Command
2. Communication Plan
3. Joint Information System
4. Contact List
5. Meeting and Briefing Schedule
Developing the plan
Key Components of an Incident Response Plan
1. Objectives
2. Preparation and Training
3. Incident Response Team
4. Communication Plan
5. Data Collection and Analysis
6. Containment and Remediation
7. Post-Incident Review
8. Continuous Improvement
Identifying Critical Business Processes and Data
1. Case files
2. Client information
3. Financial data
4. Confidential communications
Managing an
incident
Activating the plan
1. Notification
2. Declaration of an incident
3. Initial Assessment
4. Activating the Plan
5. Coordination with External
Agencies
6. Implementation of Response
Procedures
7. Ongoing Monitoring and
Assessment
Collecting and analyzing data
https://techcrunch.com/2020/03/17/zoombombi
ng/
Zoom Video Communications, Inc. v. Cyber Security case
https://support.zoom.us/hc/en-us/articles/360048660871-End-to-end-E2EE-encryption-for-me
etings