Video: How to prepare a cyber security for your law firm


  • Introduction
  • 3:55 Importance of a strategy, using the story of The Three Little Pigs
  • 11:10 The Kill Chain steps attackers use to gain access to firms
  • 16:10 The tools available to defend against attacks
  • 32:20 Three levels of cyber security
  • 41:04 Six steps for preparing a cyber security strategy
  • 59:26 Example using the six steps with a hypothetical firm