SlideShare a Scribd company logo
1 of 2
Download to read offline
No one in the legal industry wants to talk about it.
But cyber criminals are out there. And they have law
firms in their sights.
Cyber security experts at Mandiant, a FireEye
company, warned as far back as 2011 that at least
80 of the top 100 law firms in the country (by
revenue) had already been attacked by cyber
criminals. Not surprisingly, 79% of respondents to a
2014 Marsh survey said that cyber privacy security
was one of their top 10 risks when they considered
their overall risk strategies. And more than 40% of
those surveyed would place it even higher—as one of
their top five risks.
An internal March 2015 report by Citibank
obtained by the New York Times concluded that law
firms today were at “high risk for cyberintrusions.”
The reason? They were rich troves of highly
sensitive information: patent applications,
business deals, and the personally identifiable
information (PII) of clients.
The article also said that law firms’ reluctance to
discuss their risks publicly made it difficult to know
exactly what they were doing to protect themselves.
Still, the number of recent high-profile breaches
implies that security at law firms is less effective
than that at retail or financial services industries.
Breaking the Silence
on Cyber Security
How FireEye keeps your law
firm—and you—secure.
S O L U T I O N S B R I E F
SECURITY
REIMAGINED
Why should you care? Because you’ve trusted your
law firm with your highly sensitive information: your
corporate intellectual property (IP), your merger-
and-acquisition (M&A) plans and the PII of your
employees, among other things.
It’s time to break the silence around cyber security.
It’s important to know how your law firm keeps your
information safe. How it stays vigilant in the face of
ever-more-sophisticated cybercriminals. And what
threat intelligence and technology it deploys to keep
you protected.
You need to know that yours chose FireEye.
SECURITY CERTIFIED BY THE
DEPARTMENT OF HOMELAND SECURITY
TheFireEyeMVX™EngineandCloudPlatformarethe
onlycybersecuritytechnologiestobedeemedso
“useful”and“effective”bytheDepartmentofHomeland
Security(DHS)thattheyareSAFETYActCertified.
What does this mean? In a nutshell, this is the highest
level of DHS approval. It means if businesses use
FireEye solutions that include those technologies,
they may not be liable for certain types of damages
in the event of a cyber terrorist attack. That’s how
confident the DHS is that FireEye solutions will hold
up in the face of potentially devastating attacks.
1
	 Mandiant Consulting internal research. 2011.
2 	
Marsh. 2014 Global Law Firm Cyber Survey. https://www.marsh.com/us/insights/more-cyber-preparedness-needed-2014-law-firm-cyber-survey.html.
3
	 Ibid.
4
	 Matthew Goldstein (New York Times).“Citigroup Report Chides Law Firms for Silence on Hackings.” March 26, 2015.
5
	 Ibid.
Breaking the Silence on Cyber Security: How FireEye keeps
your law firm—and you—secure.
SOLUTION BRIEF:
FireEye, Inc. | 1440 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
© 2015 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc.
All other brands, products, or service names are or may be trademarks or service
marks of their respective owners. — SB.HP.NX.EN.102015
FIREEYE ON THE FRONT LINE
FireEye, one of the world’s foremost cyber
incident responders, is often the first company
called in to respond to sophisticated cyber attacks.
We spend more than 100,000 hours each year
responding to the major breaches in the headlines.
The intelligence we gain from being on the front
line of incident response feeds directly back into
our technology to ensure you are protected from
the most complex and unexpected attacks.
WHAT FIREEYE DOES FOR LAW FIRMS—
AND THEREFORE FOR YOU
Here’s how our FireEye solutions help your law
firm protect your important information.
We catch the most advanced threats
Traditional network and endpoint security
products—such as endpoint antivirus (AV)
solutions and intrusion prevention systems
(IPS)—are designed to detect known threats
through pattern-matching signatures.
Unfortunately, advanced attackers often
customize malware to evade signature-based
detection. Custom malware sails past most
signature-based defenses—through web, email,
and other avenues of attack—as if they weren’t
even there. FireEye detects and prevents
otherwise unrecognized and unknown zero-day
exploits and advanced multi-stage and multi-
vector attacks.
We respond swiftly to incidents
No matter how much money a law firm spends on
security, the potential for compromise by a
determined attacker always exists. There are no
guarantees with IT security. Rapid detection and
response is essential. Swiftly investigating attacks
when an incident does occur can mean the
difference between stopping cyber attackers from
achieving their objectives and making headlines as
the latest victim of a foreign threat. FireEye
provides the tools your law firm needs to validate
threats and determine their impact.
We proactively search for compromised devices
When a “patient zero,” connects to a law firm’s
network and infects hundreds of other machines,
the law firm must often suspend network services
and connectivity to deal with the problem. This
downtime can devastate your law firm’s ability to
serve you. FireEye gives your law firm the ability
to proactively look for signs of compromise on all
IT devices, whether they are PCs connected to on
the corporate network, or tablets or laptops
signed in via a public hotspot. This allows your law
firm to identify problems early and isolate infected
devices prevent the spread of malware—without
disrupting network operations. FireEye can also
analyze and triage remote and off-premise devices
for mobile employees.
FIREEYE HELPS LAW FIRMS PRIORITIZE
THE SAFETY OF YOUR INFORMATION
Reading the stories of current cyber attacks can
be scary. But rest assured that when FireEye
provides expertise, intelligence and technology to
law firms, we put them on the cutting edge of
cyber security protection. Keeping your sensitive
information safe is our top priority. Which means
it’s the top priority of your law firm, too.
For more information about FireEye services
and technology for law firms, contact
info@fireeye.com.

More Related Content

Viewers also liked

5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksImperva
 
Where Do They Live
Where Do They LiveWhere Do They Live
Where Do They LiveSCosta
 
презентация рдкм
презентация рдкмпрезентация рдкм
презентация рдкмJimByrne
 
Лазерная технология
Лазерная технологияЛазерная технология
Лазерная технологияkulibin
 
Tweet or Twitt - Twitter 101
Tweet or Twitt - Twitter 101Tweet or Twitt - Twitter 101
Tweet or Twitt - Twitter 101Katt Stearns
 
Donantes y trasplantes de órganos. 2015.
Donantes y trasplantes de órganos. 2015.Donantes y trasplantes de órganos. 2015.
Donantes y trasplantes de órganos. 2015.José María
 
こだわり条件
こだわり条件こだわり条件
こだわり条件stucon
 

Viewers also liked (9)

5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Where Do They Live
Where Do They LiveWhere Do They Live
Where Do They Live
 
презентация рдкм
презентация рдкмпрезентация рдкм
презентация рдкм
 
Лазерная технология
Лазерная технологияЛазерная технология
Лазерная технология
 
Tweet or Twitt - Twitter 101
Tweet or Twitt - Twitter 101Tweet or Twitt - Twitter 101
Tweet or Twitt - Twitter 101
 
Donantes y trasplantes de órganos. 2015.
Donantes y trasplantes de órganos. 2015.Donantes y trasplantes de órganos. 2015.
Donantes y trasplantes de órganos. 2015.
 
こだわり条件
こだわり条件こだわり条件
こだわり条件
 

More from FireEye, Inc.

[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat PrognosisFireEye, Inc.
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by AttackersFireEye, Inc.
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontFireEye, Inc.
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat FireEye, Inc.
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails FireEye, Inc.
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent ThreatFireEye, Inc.
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye, Inc.
 

More from FireEye, Inc. (14)

[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 

Recently uploaded

Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 

Recently uploaded (20)

Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 

Breaking the Silence on Cyber Security: How FireEye Keeps Your Law Firm Secure

  • 1. No one in the legal industry wants to talk about it. But cyber criminals are out there. And they have law firms in their sights. Cyber security experts at Mandiant, a FireEye company, warned as far back as 2011 that at least 80 of the top 100 law firms in the country (by revenue) had already been attacked by cyber criminals. Not surprisingly, 79% of respondents to a 2014 Marsh survey said that cyber privacy security was one of their top 10 risks when they considered their overall risk strategies. And more than 40% of those surveyed would place it even higher—as one of their top five risks. An internal March 2015 report by Citibank obtained by the New York Times concluded that law firms today were at “high risk for cyberintrusions.” The reason? They were rich troves of highly sensitive information: patent applications, business deals, and the personally identifiable information (PII) of clients. The article also said that law firms’ reluctance to discuss their risks publicly made it difficult to know exactly what they were doing to protect themselves. Still, the number of recent high-profile breaches implies that security at law firms is less effective than that at retail or financial services industries. Breaking the Silence on Cyber Security How FireEye keeps your law firm—and you—secure. S O L U T I O N S B R I E F SECURITY REIMAGINED Why should you care? Because you’ve trusted your law firm with your highly sensitive information: your corporate intellectual property (IP), your merger- and-acquisition (M&A) plans and the PII of your employees, among other things. It’s time to break the silence around cyber security. It’s important to know how your law firm keeps your information safe. How it stays vigilant in the face of ever-more-sophisticated cybercriminals. And what threat intelligence and technology it deploys to keep you protected. You need to know that yours chose FireEye. SECURITY CERTIFIED BY THE DEPARTMENT OF HOMELAND SECURITY TheFireEyeMVX™EngineandCloudPlatformarethe onlycybersecuritytechnologiestobedeemedso “useful”and“effective”bytheDepartmentofHomeland Security(DHS)thattheyareSAFETYActCertified. What does this mean? In a nutshell, this is the highest level of DHS approval. It means if businesses use FireEye solutions that include those technologies, they may not be liable for certain types of damages in the event of a cyber terrorist attack. That’s how confident the DHS is that FireEye solutions will hold up in the face of potentially devastating attacks. 1 Mandiant Consulting internal research. 2011. 2 Marsh. 2014 Global Law Firm Cyber Survey. https://www.marsh.com/us/insights/more-cyber-preparedness-needed-2014-law-firm-cyber-survey.html. 3 Ibid. 4 Matthew Goldstein (New York Times).“Citigroup Report Chides Law Firms for Silence on Hackings.” March 26, 2015. 5 Ibid.
  • 2. Breaking the Silence on Cyber Security: How FireEye keeps your law firm—and you—secure. SOLUTION BRIEF: FireEye, Inc. | 1440 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com © 2015 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. — SB.HP.NX.EN.102015 FIREEYE ON THE FRONT LINE FireEye, one of the world’s foremost cyber incident responders, is often the first company called in to respond to sophisticated cyber attacks. We spend more than 100,000 hours each year responding to the major breaches in the headlines. The intelligence we gain from being on the front line of incident response feeds directly back into our technology to ensure you are protected from the most complex and unexpected attacks. WHAT FIREEYE DOES FOR LAW FIRMS— AND THEREFORE FOR YOU Here’s how our FireEye solutions help your law firm protect your important information. We catch the most advanced threats Traditional network and endpoint security products—such as endpoint antivirus (AV) solutions and intrusion prevention systems (IPS)—are designed to detect known threats through pattern-matching signatures. Unfortunately, advanced attackers often customize malware to evade signature-based detection. Custom malware sails past most signature-based defenses—through web, email, and other avenues of attack—as if they weren’t even there. FireEye detects and prevents otherwise unrecognized and unknown zero-day exploits and advanced multi-stage and multi- vector attacks. We respond swiftly to incidents No matter how much money a law firm spends on security, the potential for compromise by a determined attacker always exists. There are no guarantees with IT security. Rapid detection and response is essential. Swiftly investigating attacks when an incident does occur can mean the difference between stopping cyber attackers from achieving their objectives and making headlines as the latest victim of a foreign threat. FireEye provides the tools your law firm needs to validate threats and determine their impact. We proactively search for compromised devices When a “patient zero,” connects to a law firm’s network and infects hundreds of other machines, the law firm must often suspend network services and connectivity to deal with the problem. This downtime can devastate your law firm’s ability to serve you. FireEye gives your law firm the ability to proactively look for signs of compromise on all IT devices, whether they are PCs connected to on the corporate network, or tablets or laptops signed in via a public hotspot. This allows your law firm to identify problems early and isolate infected devices prevent the spread of malware—without disrupting network operations. FireEye can also analyze and triage remote and off-premise devices for mobile employees. FIREEYE HELPS LAW FIRMS PRIORITIZE THE SAFETY OF YOUR INFORMATION Reading the stories of current cyber attacks can be scary. But rest assured that when FireEye provides expertise, intelligence and technology to law firms, we put them on the cutting edge of cyber security protection. Keeping your sensitive information safe is our top priority. Which means it’s the top priority of your law firm, too. For more information about FireEye services and technology for law firms, contact info@fireeye.com.