SlideShare a Scribd company logo
ICT and Cybersecurity
101
August 2021 Doug Newdick
Once upon a time in New Caledonia
Warning,
this product
may
contain..
Generalisations
Opinions
Side effects may include:
• Better questions
• Better conversations
My interactions with lawyers
Contract negotiations
Contractual disputes
Security incidents
Legal compliance of solutions
That was then, this is now
How do I get to the cloud? How do I manage my cloud?
Cybersecurity is SEP Cybersecurity is front page news
Agile – agile – agile! DevOps – DevOps – DevOps!
Big data is the new thing It’s part of the furniture
IT: People and Process
Strategy to
Portfolio
• Takes your
strategy and
generates a
portfolio of
projects
Requirements
to Deploy
• Takes a project's
requirements and
generates a
working system
Request to
Fulfil
• Takes your service
desk request and
gives you the
thing you asked
for
Detect to
Correct
• Takes a report of
something broken
and fixes it
CIO, enterprise architects, EPMO
Project managers, solution architects, developers, business analysts, testers
Service desk Support team
IT operations manager
Infrastructure
What we run software on
• Servers
• Storage
• Networks (cables)
• Racks
• Datacentres
These days it’s all virtual!
The Cloud “Stack”
IaaS
PaaS
SaaS
And shared responsibility
Operating systems, databases, integration
Software, logic, data, what you use it for, what you put in it
Software, logic, data what you use it for, what you
put in it
What you use it for,
what you put in it
Operating systems, databases, integration
Software, logic, data
Hardware,
networks,
virtualisation
SaaS
PaaS
IaaS
Provider responsibility
Customer responsibility
Not all clouds
are created
equal
• Enterprise cloud services
can bring efficiencies and
quality unthinkable for in-
house services
• Other cloud services can
hide poor quality behind a
façade
• Beware cloud washing
Artificial Intelligence
and Machine Learning
• A system that doesn’t do what it is instructed,
but figures it out for itself.
• AI and ML are everywhere: Google, Spotify,
iPhone
• Facial and image recognition, machine
translation
• Machine learning is only as good as its learning
set
DevOps
• The latest thing in software development,
cooler than agile
• The people who build it, fix it
• Continuous integration/Continuous deployment
• It’s all about the tools: CI/CD pipelines and
automated testing
Cyber
Security
The only truly secure
system is one that is
powered off, cast in a
block of concrete and
sealed in a lead-lined
room with armed
guards
What’s on
trend in
cybercrime?
• Ransomware
• Phishing
• BEC
• Professionalisation
• Nation states
Supply Chain
Security
• It’s not just about IT
• Maybe your suppliers are
an easier way in
• One supplier gets you lots
of customers
• How good is your
supplier’s cybersecurity?
Questions?

More Related Content

PDF
SD-WAN - comSpark 2019
PDF
Cyber Security for Digital-Era
PPT
Readying your IT Infrastructure for Cloud
 
PPTX
The Future of Cybersecurity - October 2015
PDF
Cyber security-briefing-presentation
PPTX
Lisa Guess - Embracing the Cloud
PPTX
Internet & iot security
PPTX
IoT security patterns
SD-WAN - comSpark 2019
Cyber Security for Digital-Era
Readying your IT Infrastructure for Cloud
 
The Future of Cybersecurity - October 2015
Cyber security-briefing-presentation
Lisa Guess - Embracing the Cloud
Internet & iot security
IoT security patterns

What's hot (20)

PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PPTX
2016 - Cyber Security for the Public Sector
PDF
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
PDF
Cyber Security For Organization Proposal PowerPoint Presentation Slides
PPT
Introduction to Cyber Security
PPTX
Bil Harmer - Myths of Cloud Security Debunked!
PDF
Stopping zero day threats
PDF
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
PDF
Cybersecurity concepts & Defense best practises
PPSX
The Ultimate Guide To Cyber Security Certifications
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPT
Summer Tour CCH Event L2TC
PPTX
Iot security amar prusty
PPTX
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PPTX
Securing the Cloud
PPTX
Security Testing for IoT Systems
PPT
Breaking down the cyber security framework closing critical it security gaps
PPTX
Cyber Security Professionals Viewed via Supply Chain
PPTX
A holistic approach to risk management 20210210 w acfe france & cyber rea...
PPTX
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
2016 - Cyber Security for the Public Sector
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Introduction to Cyber Security
Bil Harmer - Myths of Cloud Security Debunked!
Stopping zero day threats
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity concepts & Defense best practises
The Ultimate Guide To Cyber Security Certifications
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Summer Tour CCH Event L2TC
Iot security amar prusty
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
Securing the Cloud
Security Testing for IoT Systems
Breaking down the cyber security framework closing critical it security gaps
Cyber Security Professionals Viewed via Supply Chain
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Ad

Similar to ICT and Cybersecurity for Lawyers August 2021 (20)

PDF
Cybersecurity 365 FREE PPT ___ 30May2025
PPTX
Why the cloud is more secure than your existing systems
PPTX
Security in the cloud Workshop HSTC 2014
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
PPTX
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
PPTX
What is Cloud Security, and Can I Have Some?
PPTX
A Journey To The Cloud - An Introduction To Cloud Computing
PPT
Agora2013 Yugo Neumorni
PPTX
Mahika cloud services
PPT
Intro cloud-1
PPT
Intro cloud-1
PPT
Cloud computing
PDF
Cloud Computing 101 Workshop Sample
PPT
Cloud Security Alliance's GRC Stack Overview
PDF
Cloud presentatie bug 2011 v2
PDF
Cyber Security and Cloud Computing
PPT
Cloud Computing - Is it the Future of ESI?
PPTX
Cloud Technology Brief 2013 Q1 - Thailand
PDF
A proposal for implementing cloud computing in newspaper company
PDF
Cloud Security Introduction
Cybersecurity 365 FREE PPT ___ 30May2025
Why the cloud is more secure than your existing systems
Security in the cloud Workshop HSTC 2014
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
What is Cloud Security, and Can I Have Some?
A Journey To The Cloud - An Introduction To Cloud Computing
Agora2013 Yugo Neumorni
Mahika cloud services
Intro cloud-1
Intro cloud-1
Cloud computing
Cloud Computing 101 Workshop Sample
Cloud Security Alliance's GRC Stack Overview
Cloud presentatie bug 2011 v2
Cyber Security and Cloud Computing
Cloud Computing - Is it the Future of ESI?
Cloud Technology Brief 2013 Q1 - Thailand
A proposal for implementing cloud computing in newspaper company
Cloud Security Introduction
Ad

Recently uploaded (20)

PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PDF
Event Presentation Google Cloud Next Extended 2025
PDF
creating-agentic-ai-solutions-leveraging-aws.pdf
PDF
Software Development Methodologies in 2025
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
PDF
This slide provides an overview Technology
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Top Generative AI Tools for Patent Drafting in 2025.pdf
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Chapter 2 Digital Image Fundamentals.pdf
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
NewMind AI Weekly Chronicles - July'25 - Week IV
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
madgavkar20181017ppt McKinsey Presentation.pdf
Event Presentation Google Cloud Next Extended 2025
creating-agentic-ai-solutions-leveraging-aws.pdf
Software Development Methodologies in 2025
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
agentic-ai-and-the-future-of-autonomous-systems.pdf
This slide provides an overview Technology
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
Understanding_Digital_Forensics_Presentation.pptx
Top Generative AI Tools for Patent Drafting in 2025.pdf
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
NewMind AI Monthly Chronicles - July 2025
Chapter 2 Digital Image Fundamentals.pdf

ICT and Cybersecurity for Lawyers August 2021

  • 2. Once upon a time in New Caledonia
  • 3. Warning, this product may contain.. Generalisations Opinions Side effects may include: • Better questions • Better conversations
  • 4. My interactions with lawyers Contract negotiations Contractual disputes Security incidents Legal compliance of solutions
  • 5. That was then, this is now How do I get to the cloud? How do I manage my cloud? Cybersecurity is SEP Cybersecurity is front page news Agile – agile – agile! DevOps – DevOps – DevOps! Big data is the new thing It’s part of the furniture
  • 6. IT: People and Process Strategy to Portfolio • Takes your strategy and generates a portfolio of projects Requirements to Deploy • Takes a project's requirements and generates a working system Request to Fulfil • Takes your service desk request and gives you the thing you asked for Detect to Correct • Takes a report of something broken and fixes it CIO, enterprise architects, EPMO Project managers, solution architects, developers, business analysts, testers Service desk Support team IT operations manager
  • 7. Infrastructure What we run software on • Servers • Storage • Networks (cables) • Racks • Datacentres These days it’s all virtual!
  • 9. And shared responsibility Operating systems, databases, integration Software, logic, data, what you use it for, what you put in it Software, logic, data what you use it for, what you put in it What you use it for, what you put in it Operating systems, databases, integration Software, logic, data Hardware, networks, virtualisation SaaS PaaS IaaS Provider responsibility Customer responsibility
  • 10. Not all clouds are created equal • Enterprise cloud services can bring efficiencies and quality unthinkable for in- house services • Other cloud services can hide poor quality behind a façade • Beware cloud washing
  • 11. Artificial Intelligence and Machine Learning • A system that doesn’t do what it is instructed, but figures it out for itself. • AI and ML are everywhere: Google, Spotify, iPhone • Facial and image recognition, machine translation • Machine learning is only as good as its learning set
  • 12. DevOps • The latest thing in software development, cooler than agile • The people who build it, fix it • Continuous integration/Continuous deployment • It’s all about the tools: CI/CD pipelines and automated testing
  • 13. Cyber Security The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards
  • 14. What’s on trend in cybercrime? • Ransomware • Phishing • BEC • Professionalisation • Nation states
  • 15. Supply Chain Security • It’s not just about IT • Maybe your suppliers are an easier way in • One supplier gets you lots of customers • How good is your supplier’s cybersecurity?

Editor's Notes

  • #3: In New Caledonia I had to manage negotiating contracts between our legal team and vendor legal teams.
  • #4: This is the world according to Doug. We have only enough time to cover some key things a high level, not everything, and nothing in detail. I’m hoping at the end of this you will be able to ask better questions of your IT colleagues and have better conversations with them.
  • #6: When I gave the previous version of this talk the world was a different place. An IT “generation” is 5 years so a huge amount of stuff has changed. Cloud: back then everyone was trying to figure out how to get to the cloud, now everyone is in the cloud and trying to understand how to manage their (multiple) cloud(s) Cybersecurity: back then it was always Somebody Else’s Problem (security, IT, anyone), now it your ELT and board care deeply. Software development: back then everyone talked about “agile”, now DevOps is the phrase du jour. Big Data: back then this was a big new thing, now it has largely a bunch of tools and techniques that we use everywhere in IT.
  • #7: Borrowed from the Open Groups IT4IT model, the 4 key value streams of IT mapped to the people/job titles you will work with. The rest of this presentation largely talks about technology, but you should also understand the people and processes of IT.
  • #8: Non-IT people use the word “infrastructure” very loosely. IT people use it with a very specific meaning.
  • #9: Software as a Service (your business apps) runs on top of Platform as a Service (your developer tools) which runs on top of Infrastructure as a service (the raw computing, storage and networks).
  • #10: Some people think that if you are in the cloud, all security is the provider’s job. Not so! There is a shared responsibility (between customer and provider) for security, even if you are using Software as a Service. (There are a million versions of this diagram out there, this is mine).
  • #11: There is no such thing as “the cloud”, just lots of cloud services of varying quality and security. Some are brilliant, and some are rubbish. At the worst they can just be old-fashioned managed services with a veneer of cloud (“cloud-washing”).
  • #12: One key new(ish) trend that is having a big impact is AI and ML. Your iPhone uses ML to change it’s behaviour to match yours. Poor learning sets can lead to poor outcomes – e.g. facial recognition that doesn’t work for ethnic minorities.
  • #13: Brilliant if done right – but hard to do well. While it is not only about the tools, you can’t do it without a sophisticated toolset. Can massively improve efficiency and quality.
  • #14: Anyone who says “this system is secure” is lying. It is only ever: this system is secure enough for this organisation, with this risk appetite, for this purpose at this point in time. If any of these change, it may no longer be secure enough, and it could always be compromised by a determined enough attacker.
  • #15: BEC = business email compromise.
  • #16: Some of your vendors or suppliers have lots of your important or sensitive data (e.g. your accountants, your lawyers) even if they aren’t IT suppliers. Do you know how good their cybersecurity is?