{"id":574,"date":"2023-08-14T11:25:16","date_gmt":"2023-08-14T11:25:16","guid":{"rendered":"https:\/\/www.lawbertconsult.com\/skpartners\/?page_id=574"},"modified":"2023-08-24T11:22:36","modified_gmt":"2023-08-24T11:22:36","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.lawbertconsult.com\/skpartners\/cyber-security\/","title":{"rendered":"Cyber security"},"content":{"rendered":"<body>\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"574\" class=\"elementor elementor-574\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-613d6cb8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"613d6cb8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19e51331\" data-id=\"19e51331\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e4210a elementor-widget elementor-widget-text-editor\" data-id=\"7e4210a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>Every\u00a0organisation\u00a0faces the risk of\u00a0cyber attacks. Their impacts can include:<\/p>\n\n\n\n<p>\u2022\u00a0business interruption<\/p>\n\n\n\n<p>\u2022\u00a0financial loss<\/p>\n\n\n\n<p>\u2022\u00a0loss of IP and confidential information<\/p>\n\n\n\n<p>\u2022\u00a0regulatory enforcement<\/p>\n\n\n\n<p>\u2022\u00a0liability to employees and third parties<\/p>\n\n\n\n<p>\u2022\u00a0damage to reputation<\/p>\n\n\n\n<p>Being prepared is key to managing these risks and limiting the disruption and damage that\u00a0cybersecurity\u00a0incidents cause. In the event of a cyber-attack, you need a trusted partner who can take immediate and effective action. Our integrated global cyber security team helps our clients identify, manage and mitigate existing and emerging cyber threats by:<\/p>\n\n\n\n<p>\u2022\u00a0building operational resilience and cyber readiness<\/p>\n\n\n\n<p>\u2022\u00a0identifying, managing and reducing cyber security risks by implementing governance, compliance and contractual measures<\/p>\n\n\n\n<p>\u2022\u00a0creating effective incident response plans and resources, including cyber-response toolkits<\/p>\n\n\n\n<p>\u2022\u00a0mapping global cyber notification and reporting obligations<\/p>\n\n\n\n<p>Our network of specialist lawyers provide local support and advice together with strategic oversight. We collaborate with third party IT security specialists and forensic consultants in the most challenging of cyber situations.<\/p>\n\n\n\n<p>We provide our clients with:<\/p>\n\n\n\n<p>\u2022\u00a0immediate incident response advice and support<\/p>\n\n\n\n<p>\u2022\u00a0assessment of regulatory reporting obligations<\/p>\n\n\n\n<p>\u2022\u00a0management of potential enforcement situations and regulatory investigations<\/p>\n\n\n\n<p>\u2022\u00a0on internal and external communications to\u00a0minimise\u00a0liability risks and disruption<\/p>\n\n\n\n<p>\u2022\u00a0assessment and action to control the dissemination of data, including liaising with relevant agencies and via injunctive relief<\/p>\n\n\n\n<p>\u2022\u00a0management of employee concerns and data subject claims<\/p>\n\n\n\n<p>\u2022\u00a0liaison with third parties concerned about data loss and potentially alleging responsibility in relation to the same<\/p>\n\n\n\n<p>\u2022\u00a0assistance with litigation strategies, including in respect of third party vendors<\/p>\n\n\n\n<p>\u2022\u00a0personal\u00a0data on the internet by an employee.<\/p>\n\t\t<\/div>\n\t\t<\/div><\/div><\/div><\/div><\/section><\/div><\/body>","protected":false},"excerpt":{"rendered":"<p>Every\u00a0organisation\u00a0faces the risk of\u00a0cyber attacks. Their impacts can include: \u2022\u00a0business interruption \u2022\u00a0financial loss \u2022\u00a0loss of IP and confidential information \u2022\u00a0regulatory enforcement \u2022\u00a0liability to employees and third parties \u2022\u00a0damage to reputation Being prepared is key to managing these risks and limiting the disruption and damage that\u00a0cybersecurity\u00a0incidents cause. In the event of a cyber-attack, you need a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"class_list":["post-574","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.lawbertconsult.com\/skpartners\/wp-json\/wp\/v2\/pages\/574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lawbertconsult.com\/skpartners\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.lawbertconsult.com\/skpartners\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.lawbertconsult.com\/skpartners\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lawbertconsult.com\/skpartners\/wp-json\/wp\/v2\/comments?post=574"}],"version-history":[{"count":8,"href":"https:\/\/www.lawbertconsult.com\/skpartners\/wp-json\/wp\/v2\/pages\/574\/revisions"}],"predecessor-version":[{"id":866,"href":"https:\/\/www.lawbertconsult.com\/skpartners\/wp-json\/wp\/v2\/pages\/574\/revisions\/866"}],"wp:attachment":[{"href":"https:\/\/www.lawbertconsult.com\/skpartners\/wp-json\/wp\/v2\/media?parent=574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}