Page 19

engineering engagements. It concerns me that the physical side of security is often overlooked. CISOs and CIOs are kept awake at night by nightmares of cyber intrusions – as they should be. However, hackers often go to the tried and tested physical compromises because they know they are the lowhanging fruit. Be diligent and make sure all bases are covered.

What is driving the focus of security within legal firms? Our data suggest the demands of clients often provide the impetus to shore up a firm’s security program, with more than 80% of respondents to our survey identifying client requirements as the highest influencer in security purchasing decisions. Additionally, regulations specific to various industries play a big role in the focus of security programs and practices. That said, I often advise people that compliance is not the same thing as security. It’s important to adhere to regulations, but a solid security program will go beyond compliance to ensure the firm’s most valuable assets are protected. This leads me to one of the most surprising findings regarding the role of vendor management. A concerning statistic shows 63% of firms surveyed do not have a process in place to evaluate the security of critical vendors! How can this be when so many recent major breaches have been attributed to contractor and employee negligence? The 2015 Ponemon Institute Cost of a Data Breach 1 study attributes 25% of the root cause of a data breach to a negligent employee or contractor. In addition, a lawsuit brought by the US Federal Trade Commission (FTC) against Wyndham Hotels & Resorts illustrates the exposure vendors can introduce. The FTC claims Wyndham failed to adequately restrict third party vendors’ access to the networks and servers of the chain’s hotels, which contributed to breaches that occurred in 2008-2009 2. This is an area that can be readily improved without major investment. More due diligence in qualifying vendors and setting up proper access can shore up security. Firms are more aware of awareness One positive finding from the survey

is that employee security awareness is top-of-mind within legal organizations. Employee negligence and phishing or vishing attacks ranked as the highest concern, which indicates there is recognition of the role employees can play in the protection of organizational assets. Aligning with these concerns is an emphasis on information security training for employees, with close to 80% telling us that a security training product or service is utilized. Less reassuring is the news that the training is conducted infrequently, with 46% of those surveyed revealing that it takes place once a year and 39% revealing that it occurs during a new hire’s orientation. Repetition is paramount to the retention of the key principles that are critical to building a culture of security. While approaches and styles may differ, I’d suggest that in addition to the senior allies within the firm, IT and security teams should recruit “security champions” throughout the organization to garner the buy-in critical to facilitating security-minded behavior. Although the survey showed legal organizations face staff and budget restraints, it appears that an array of security products and services are being deployed. In addition to training, encryption services and intrusion detection products are utilized by over 70% of respondents. This is followed by IT audits and anti-phishing/vishing services at over 60%. Close to 70% also utilize vulnerability scanning and penetration testing, whereas the leastperformed assessments were application code analysis and war dialing. It is noteworthy that only a little over 30% perform physical security reviews and less than 20% conduct on-site social

Another positive trend identified was that only 10% of firms were not utilizing any security assessments. That is a nice improvement from the 20% seen in the 2014 study. The report contains additional information regarding information security standards, policies and technologies, conferences and events attended, and requested content needs to address security challenges. Readers may take a closer look at the report to obtain more data related to the geographic and demographic breakdown of the study sample. It is gratifying to see the evolution of security programs and practices within the legal industry. The vibe at ILTACON reflected enthusiasm for and commitment to security. Attendees were sharing practices and successes with peers and demonstrated an eagerness for proactive programs that will keep their firms, and the brands of their clients, in excellent standing. Click here to download a copy of the 2015 Study of the Legal Industry’s Information Security Assessment Practices. Tom DeSot is EVP & Chief Information Officer at Digital Defense, Inc. He also serves as the company’s internal auditor on security-related matters. Prior to joining Digital Defense, Tom was Vice President of Information Systems for a mid-tier financial institution in San Antonio, Texas. “2015 Cost of Data Breach Study: Global Analysis” – research sponsored by IBM and conducted independently by the Ponemon Institute 2 “Hard Lessons From the Wyndham Decision: What Businesses Must Know About the FTC’s Authority to Regulate Data Security,” Dykema, 1 September 2015 1

LEGAL IT TODAY

|

19

Legal IT Today - issue 11 (September 2015)  

Commentary, Strategy and Market Intelligence for the Global Legal Technology Community

Read more
Read more
Similar to
Popular now
Just for you