|
This course is available in the Classroom and via Teams   Cybersecurity for Data Protection Professionals Course Overview Security breaches continue to be one of the most common triggers for regulatory enforcement action, and increasingly involve coordinated criminal networks operating through ransomware-as-a-service models, supply chain compromise, and AI-enabled attack techniques. Organisations are increasingly operating under overlapping regulatory regimes spanning data protection, operational resilience, and cybersecurity law. Information law professionals must also be equipped to respond effectively during cyber incidents - working closely with IT and forensics teams, advising boards, managing regulatory engagement, preserving privilege, and navigating the risks of cross‑regime enforcement. This session is prepared specifically for information law professionals who are looking to understand the technical, regulatory and practical aspects of cybersecurity and covers the following areas: - analysis of current and emerging attack methods, including ransomware-as-a-service, denial of service, credential compromise and supply chain infiltration
- deeper examination of authentication vulnerabilities and security controls, including hashing, salting, privilege escalation risks and multi-factor authentication implementation failures
- advanced supply chain and third-party cyber risk management, including contractual and governance blind spots
- navigating overlapping regulatory regimes, including GDPR enforcement exposure, NIS2 and sectoral cyber regulation, DORA operational resilience obligations, the Cyber Resilience Act and AI-related cyber risk considerations
- building a mature cyber preparedness framework, including board reporting structures, cyber simulation exercises, privilege planning, and regulatory engagement strategy
- breach response governance: from initial alert through containment, investigation, regulator engagement, public communications and litigation risk
- AI as both an offensive and defensive cybersecurity tool
- an end-to-end breach case study analysing strategic legal decision-making at each stage
No technical background is required; however Practitioners who are new to the area of cybersecurity or who are seeking a foundational overview should first consider attending Data Security & Cybersecurity. |