Agenda

Presentations already confirmed include:


►Quantum Leap - Preparing for a quantum-safe future 

Steve Davies, Head of Cyber Security, DLA Piper

  • What is quantum computing and what does it mean for the enterprise?
  • What are the risks and how serious is the threat from quantum computing? 
  • How can you prepare for the post-quantum future, today?
  • What does post-quantum readiness look like across technology service providers?

►Panel Discussion: Operationalising Threat Intelligence in High-Risk Environments

Rob Flanders, Head of Threat and Incident Response, BAE Systems 

  • How can traditional cyber intelligence be integrated into threats to legal practice? 
  • Can existing intelligence marking schemes (e.g. TLP) be easily fit with restrictions surrounding legal privilege?
  • How can intelligence support the mitigation of attacks against VIPs, case leads, and privileged data?
  • Which is of greatest concern to the legal sector – ransomware or targeted attacks?

►Briefs and Breaches: Why Foreign States Target Law Firms

Chris Worthy, Former Deputy Director, UK Home Office & Independent Consultant

  • State sponsored espionage and where cyber fits in
  • Why would foreign States carry out espionage (including Cyber) against law firms?
  • How they use the information gathered
  • The range of techniques used (including Cyber and non-cyber methods)

►Panel Discussion: Managing Elevated Threats: Protecting Clients, Staff, and Data

Chris Worthy, Former Deputy Director, UK Home Office & Independent Consultant 
Steve Davies, Head of Cyber Security, DLA Piper

  • How is the firm addressing the risk of being targeted due to representing politically sensitive or high-profile clients?
  • What measures are in place to protect partners and employees during travel to regions with heightened security concerns, like the UAE or USA?
  • How are we preparing for potential threats from activists, hacktivist groups, or state-sponsored actors targeting the firm or its clients? Is this a concern and something that has become more of an issue for you in recent months?
  • What protocols exist to detect and manage insider risks? 

►Bridging the cybersecurity skills gap. Are you part of the problem or part of the solution?

Ash Spencer, Head of IT and Security, Minster Law

  • What is the cybersecurity skills gap?
  • What problems or challenges do those gaps cause?
  • Some potential solutions to address the skills gap within your organisation

Education seminars