Knowledge Base
LexMundi.com
Contact us
Cybersecurity
Legal Tech
Strategies and challenges
Software options
Accelerating projects and adoption
Member firm tech and innovation
Cybersecurity
Lex Mundi Core Standards and Recommended Practices
Cybersecurity Products and Vendors
Cybersecurity Guidelines & Organizations
Cybersecurity and Business Continuity Monthly Open Call
Matter Delivery
Matter Scoping
Matter Management
Matter Feedback
About Lex Mundi Tech & Innovation
Tech & Innovation (T&I) team
Back to home
Knowledge Base
Cybersecurity
Legal Tech
Strategies and challenges
Software options
Accelerating projects and adoption
Member firm tech and innovation
Cybersecurity
Lex Mundi Core Standards and Recommended Practices
Cybersecurity Products and Vendors
Cybersecurity Guidelines & Organizations
Cybersecurity and Business Continuity Monthly Open Call
Matter Delivery
Matter Scoping
Matter Management
Matter Feedback
About Lex Mundi Tech & Innovation
Tech & Innovation (T&I) team
Cybersecurity
Learn about updates in legal cybersecurity
Lex Mundi Cybersecurity Working Group
Lex Mundi Core Standards and Recommended Practices
Cybersecurity Checklist
Cybersecurity Core Standards and Recommended Practices
Cybersecurity Self-assessment: Checklist
Cybersecurity - firm policy
How to Create Secure Passwords - Proper Password Management
Patch Management, Protecting Against Ransomware and Virtual Desktop Infrastructure
Governance and Leadership - Core Standard and Overview of GDPR
Information Access Control - role-based access
Business continuity, backup and restoration
User Awareness / behavior change
Multi-Factor Authentication (MFA)
Creating Crisis-Communication Frameworks and Cybersecurity Plans
The Importance of Email Encryption
Pen Testing and Assessing Cloud and Data Security
Cybersecurity Updates from Lex Mundi Members Around the World
Vendor Management
See more
Cybersecurity Products and Vendors
Cybersecurity - PingCastle
Aon Professional Services Practice
Firms with Cybersecurity Insurance (2022)
Incident Response Tabletop Exercises - special offer
Cloud backup software options in the event of system failure, outage
Anti-Virus Software
SecureWorks - Taegis XDR (Extended Detection Response)
Rajah & Tann Technologies - Cybersecurity Service Package (special offer)
KYND ON - Cybersecurity Monitoring Dashboard
Mitre Attack - Detection and Analytics
Skurio - Protect Your Data
Aon - Cybersecurity Solutions
Offer - KnowBe4Security Awareness and Phishing Platform
Incident response tabletop exercises (Backdoors & Breaches)
Risk assessment vendors
Fingbox - Simple and effective security and control for your connected environment
See more
Cybersecurity Guidelines & Organizations
ISO 27001
Small Business Information Security: The Fundamentals - NISTIR 7621
IBA Presidential Task Force Guidelines on Cyber Security
Auditing / external evaluation
Whitelisting
Working Remotely – Member Firm Checklist
Legal Services Information Sharing and Analysis Organization (LS-ISAO)
Cybersecurity Professional Associations
See more
Cybersecurity and Business Continuity Monthly Open Call
Cybersecurity: Weighing All the Risks Before the Response from Microsoft (DART) Team
Endpoint Protection and Software
Endpoint Security Solutions
CyberChats with Members
Skurio Demonstration Recording- Protecting your Data
March 2021 - Penetration Testing Brian Johnson 7 Min Security
April 2021 - Frameworks and Automation; General
June 2021 - Moving to Office 365
July 2021 - Lex Mundi Cybersecurity Demo - KnowBe4's KCM GRC Platform
August 2021 - Ransomware
September 2021 - Mobile Device Management
October 2021 - Sheehan Phinney Presentation
Email encryption, social media, and chat/messaging policies - best practices (November 2021)
See more