Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Regulation Technology Media and Telecom

Vendor Risk Management for Law Firms: 7 Steps to Success

Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don’t just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm’s responsibility to ensure their vendors are managing risk appropriately.

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don’t just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. This risk continues to grow as cloud-service providers gain acceptance in law firms. As cloud service providers become commonplace, so too does a firm’s responsibility to ensure their vendors are managing risk appropriately.

This premium content is locked for Cybersecurity Law & Strategy subscribers only

Continue reading by getting
started with a subscription.

ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN CYBERSECURITY, PRIVACY, INFORMATION GOVERNANCE, LEGAL TECHNOLOGY AND E-DISCOVERY.
  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on cyber threats, data breaches, and legal technology
  • Tap into expert guidance from top legal tech lawyers and experts

SUBSCRIBE NOW

Subscribe Now For Unlimited Access

Read These Next