the international trade organization for legal procurement

best practices for buying legal services and legal technology


With the greater sophistication and continued rise of cyber threats, it is essential that you understand how your trusted partners, law firms and other suppliers, protect your confidential and highly sensitive information.

Data supply chain security is every corporation’s responsibility and a critical area of concern, because trusted partners are often the weakest point in your defense against cyber attacks.

Join our series on Cyber Security this July and learn what you can do to protect your organization.


CYBER SECURITY: NOT IF, BUT WHEN - Download the Guide on Legal Vendor Cyber Risk Management:

The cyber threat landscape is complex and security breaches have become a daily occurrence. As an organization's reputation and data are at increasing risk of being compromised, it is critical for legal departments to adopt a comprehensive and robust approach to vendor cyber risk management. 

Understanding the third-party cyber risk management life cycle is critical for both the organization and its vendors to decrease security control gaps and minimize overall risk. Follow the Guide's detailed steps to build a strong Legal Vendor Cyber Risk Management program. Click here to download.

Privileged Data & Cyber Security: What you need to do about it now

Imran Jaswal and Ryan Spelman of Kroll's Cyber Clarity 360 explain what cyber risks legal vendors present to your organization, unique aspects and impact of legal cyber risk, possible vulnerabilities in your current legal vendor portfolio, and what you can do about it today.

Questions about Cyber Security for legal departments? Ask the experts:

What buyers need to do and know when buying legal services - Imran Jaswal has the answer:

What should buyers know about their law firm's vulnerability? Imran Jaswal has the answer:

What are the typical threats to law firms and other legal services provders? Ryan Spelman has the answer:

What can buyers do to manage & monitor whether their providers are secure? Ryan Spelman has the answer:

Who is accountable for data security? Ryan Spelman has the answer:

This webinar series is powered by: