This presentation focused on cybersecurity protections for law firms and attorneys' ethical obligation to protect client information. Cybersecurity and data privacy attorney Shawn Tuma presented this continuing legal education session on March 10, 2017. It was delivered live at the TexasBarCLE presents the 8th Annual Course
Essentials of Business Law:Four Modules for a Robust Practice Cosponsored by the Business Law Section of the State Bar of Texas.
4. www.solidcounsel.com
Ethics – Specific Attorney Risks.
▪ Law firm cybersecurity – this applies to law firms and attorneys.
▪ Clients are demanding adequate security (firms are their third-party risk).
▪ Law firms are an increasingly popular target.
▪ Value and sensitivity of data.
▪ Data for multiple clients.
▪ “A lawyer should preserve the confidences and secrets of a client.”
▪ Ethics Opinion 384 (Sept. 1975)
▪ Canon No. 4, Code of Professional Responsibility
▪ Disciplinary Rule (DR) 4-101 (A) and (B)
6. www.solidcounsel.com
The real-world threats are not so sophisticated.
Easily preventable
• 90% in 2014
• 91% in 2015
• 63% confirmed breaches from weak,
default, or stolen passwords
• Data is lost over 100x more than stolen
• Phishing used most to install malware
Easily preventable
• 90% in 2014
• 91% in 2015
7. www.solidcounsel.com
Start with the basics.
“Some people try to find
things in this game that don’t
exist but football is only two
things – blocking and
tackling.”
-Vince Lombardi
* If you want to talk deep programming-
type issues, see Section VII of paper.
8. www.solidcounsel.com
Our objective is to protect IP.
Which of the following aspects of the IP are we most
focused on protecting?
1. Confidentiality
2. Integrity
3. Availability
4. All of the above
“CIATriad” of
cybersecurity
10. www.solidcounsel.com
Malicious
• compete
• newco
• Sabotage
• disloyal insider
Negligence
• email
• usb
• passwords
Blended
• foot out the door
• misuse of network
• stealing data
• negligence with data
• violate use policies
Hacking /
Cracking
Social
Engineering
Malware
Stealing
Planting
Corrupting
Who are the primary threats?
12. To protect law firm, you must:
• Protect our companies’ data
• Confidentiality
• Integrity
• Availability
• Against threats from
• Insiders
• Outsiders
• Third-party partners
13. www.solidcounsel.com
Cybersecurity needs for companies (and firms).
▪ Strong cybersecurity basics.
▪ Policies and procedures focused on cybersecurity.
▪ Social engineering.
▪ Password and security questions
▪ Training of all employees.
▪ Phish all employees (esp. executives).
▪ Signature based antivirus and malware detection.
▪ Multi-factor authentication.
▪ Backups segmented from the network.
▪ Incident response plan.
▪ Encryption for sensitive and air-gap for hypersensitive data.
▪ Adequate logging and retention.
▪ Third-party security and supply chain risk management.*
▪ Intrusion detection and intrusion prevention systems.*
19. www.solidcounsel.com
• Board of Directors & General Counsel, Cyber Future Foundation
• Board of Advisors, NorthTexas Cyber Forensics Lab
• Cybersecurity & Data Privacy LawTrailblazers, National Law Journal (2016)
• SuperLawyersTop 100 Lawyers in Dallas (2016)
• SuperLawyers 2015-16 (IP Litigation)
• Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law)
• Council, Computer &Technology Section, State Bar ofTexas
• Privacy and Data Security Committee of the State Bar ofTexas
• College of the State Bar ofTexas
• Board of Directors, Collin County Bench Bar Foundation
• Past Chair, Civil Litigation & Appellate Section, Collin County Bar Association
• Information Security Committee of the Section on Science &Technology
Committee of the American Bar Association
• NorthTexas Crime Commission, Cybercrime Committee
• Infragard (FBI)
• International Association of Privacy Professionals (IAPP)
• Board of Advisors Office of CISO, Optiv Security
• Editor, Business Cybersecurity Business Law Blog
Shawn Tuma
Cybersecurity Partner
Scheef & Stone, L.L.P.
214.472.2135
shawn.tuma@solidcounsel.com
@shawnetuma
blog: www.shawnetuma.com
web: www.solidcounsel.com