Case study: 2023 state of cyber for australian law firms
Subject: Surveyed Australian law firms
Summary: Findings which are grouped into three categories:
Motivations (what makes the business push for better security)
Maturity (how capable is the business when it comes to acting on their motivations)
Management (how do those that run the business govern organisational motivations and maturity).
Background and context
The 2023 State of Cyber Maturity for Australian Law Firms survey invited legal professionals to share their approaches, motivations, decision making, and management towards cyber security.
DotSec commissioned independent market research firm Momentum Intelligence to conduct the survey in collaboration with Lawyers Weekly.
The survey was conducted on behalf of DotSec by Momentum Intelligence between 8 September and 4 October 2022, and received a total of 500 responses, including a total usable sample of 384 fully completed submissions.
The 2023 State of Cyber Maturity for Australian Law Firms report includes a range of findings which are grouped into three categories: Motivations (what makes the business push for better security), Maturity (how capable is the business when it comes to acting on their motivations), and Management (how do those that run the business govern organisational motivations and maturity).
Interestingly, the survey found that 48 per cent of Australian legal firms are confident in their ability to detect and respond to threats; the responses of these firms indicated a higher level of cyber maturity with processes and practices in place across the entire organisation. On the flip side however, the majority (51 per cent) of legal firms indicated that they are not confident in their threat detection and response capabilities.
Interestingly, the stats for these findings were being collected at around the same time as major Australian organisations Optus and Medibank have suffered significant data breaches. More recently, ASX-listed lender Latitude Financial suffered a major cyber-attack that saw somewhere around 300K customer identification documents stolen.
Keen to proceed but unsure on cost-effectiveness
Respondents to this survey sometimes indicated that there were areas in which they might like to improve their organisation’s information security maturity, but that they were uncertain how to proceed in a cost-effective way. Here are some ideas (all of which are referenced in detail, in the report) to consider:
- There are no silver bullets! Cyber security is BIG business at the moment, and vendors, agents and resellers are on a feeding frenzy of Jaws-like proportions! But don’t be seduced by the salesperson that offers you the next and greatest silver bullet: WAF, XDR, EDR, cloud, vulnerability management, NDR, SOC, NOC, SIEM, and everything else that you can buy is likely going to be a waste of money if you buy it as a silver bullet, a solution looking for a problem.
Hang on to your cash until you’ve considered the next few points! - What do you want from me now? That is the question you should hear from anyone who purports to be able to increase your organisation’s level of cyber security maturity. No two legal firms are the same; similar, perhaps, but not the same, and so there is no one product, solution or approach that is suitable for all would-be clients.
The first thing for the would-be supplier to do is to understand (deeply) the particular requirements and operational details and constraints of the business in question. Only then is it possible to understand and prioritise risks, and only (ONLY!) then is it possible to agree on a plan (perhaps involving products, procedures and/or services) that will meet the client’s requirements by addressing risk to an acceptable level, within an agreed time and budget. - He who represents himself has a fool for a client. It’s a saying taken from law, but it holds just as true in cyber security. So many “specialists” are so confident in themselves that they’ll recommend an approach because that’s what they feel (probably honestly, but whatever) is right, because a vendor taught them (in pre-sales engineering training) that was right, or that they think it’s the approach that XYZ company used and no one has ever complained about it before.
Just because DotSec says that log collection and monitoring are important, who cares? Look for an approach that aims to improve your organisation’s level of cyber security maturity by prioritising and addressing risk with reference to a reputable, national or international, preferably vendor-neutral, standard or framework.
We’ve listed a few good examples in the report so you have a head start!
You decide the speed and direction!
Cyber security is in some ways a rapidly evolving field, but in other ways (think account management and logging) many problems remain inadequately addressed, despite decades of spending. And many commentaries seem to be designed to achieve little more than hype up the FUD. It’s all good for excitement, publicity and sales but doesn’t really help.
Firewalls, anti-malware, cloud, data-leakage prevention, endpoint protection, SIEM/SOAR/SOC… this list of cyber silver bullets is endless, and there’s always a new silver bullet to be sold. Yet evidence shows (more often now with the increasing number and severity of breaches) that sales-based cyber security doesn’t work, at least not for the customer.
Why? Because when products and services are sold without reference to a holistic, risk-based strategy, each product becomes just another solution looking for a stand-alone problem to address.
Of course, it doesn’t have to be so: Instead of a sales-focused approach, DotSec has delivered, holistic, customer-focused, risk-based cyber security services to legal firms (as well as most other industry sectors and all tiers of government) for over 25 years. In fact, we started working with our oldest, ongoing legal client (a multinational firm) in 2002.
A customer-focused, risk-based approach to cyber security improvement requires a significant investment of our own time and resources, as well as a deep understanding of the customer’s specific needs and requirements. While such an approach might be seen as more challenging for the security provider, we have found the customer-focused, risk-based approach to cyber security to be ultimately more rewarding, both in terms of the financial and reputation benefits that it can bring to both parties.
So please, download the report, consider the above points, stand firm in the swirling panic, and set your own course. A well-mapped cyber security journey really can save your organisation time and money, and done right, can put you a cut above the rest.
We sincerely hope you enjoy the report and we look forward to any feedback you might have.
In conclusion
DotSec has over 25 years of experience of helping with risk identification, prioritisation and treatment.
Our information security experts have, for many years, used the latest dev-ops and cloud-hosting technologies to deploy and manage on-line services securely, efficiently, and cost-effectively, our managed SOC/SIEM protects private and government customers daily, and our GRC work helps clients to manage their compliance requirements.
Why not download the report and then get in contact with us now, to discuss how our secure managed services will provide immediate and real benefits to your business.
Premier australian cyber security specialists
ISO 27001 consulting
Practical and experienced Australian ISO 27001 and ISMS consulting services. We will help you to establish, implement and maintain an effective information security management system (ISMS).
Penetration tests
DotSec’s penetration tests are conducted by experienced, Australian testers who understand real-world attacks and secure-system development. Clear, actionable recommendations, every time.
PCI DSS
dotSec stands out among other PCI DSS companies in Australia: We are not only a PCI QSA company, we are a PCI DSS-compliant service provider so we have first-hand compliance experience.
WAF and app-sec
Web Application Firewalls (WAFs) are critical for protecting web applications and services, by inspecting and filtering out malicious requests before they reach your web servers
Identity management
Multi-Factor Authentication (MFA) and Single Sign-On (SSO) reduce password risks, simplify access, letting verified and authorised users reach sensitive systems, services and apps.
Vulnerability management
dotSec provides comprehensive vulnerability management services. As part of this service, we analyse findings in the context of your specific environment, priorities and threat landscape.
Phishing and soc eng
We don’t just test whether users will click a suspicious link — we also run exercises, simulating phishing attacks that are capable of bypassing multi-factor authentication (MFA) protections.
Penetration testing
DotSec’s penetration testing services help you identify and reduce technical security risks across your applications, cloud services and internal networks. Clear, actionable recommendations, every time!
Managed SOC/SIEM
dotSec has provided Australian managed SOC, SIEM and EDR services for 15 years. PCI DSS-compliant and ISO 27001-certified. Advanced log analytics, threat detection and expert investigation services.
Secure configuration
We provide prioritised, practical guidance on how to implement secure configurations properly. Choose from automated deployment via Intune for Windows, Ansible for Linux or Cloud Formation for AWS.
Secure cloud hosting
Secure web hosting is fundamental to protecting online assets and customer data. We have over a decade of AWS experience providing highly secure, scalable, and reliable cloud infrastructure.
Essential eight
DotSec helps organisations to benefit from the ACSC Essential Eight by assessing maturity levels, applying practical security controls, assessing compliance, and improving resilience against attacks.
CIS 18 Critical Controls
Evaluation against the CIS 18 Controls establishes a clear baseline for stakeholders, supporting evidence-based planning, budgeting, maturity-improvement and compliance decisions
Advisory services
We have over 25 years of cyber security experience, providing practical risk-based guidance, advisory and CISO services to a wide range of public and private organisations across Australia.