Card image cap

Ransomware 101 for Lawyers: Protection, Response and Recovery

Level: Beginner
Runtime: 61 minutes
Recorded Date: September 17, 2020
Click here to share this program
Printer-Friendly Version
Closed Caption


  • Ransomware Target Law Firms
  • Exposure Threats
  • Duty to Safeguard
  • Ransomware in Action
  • Duty to Report
  • Prevention
Runtime: 1 hour
Recorded: September 17, 2020


Ransomware is a growing threat for businesses and organizations of all sizes, including law firms. Attackers encrypt the victim's data and require payment by cryptocurrency for the decryption key. Some attackers now also steal the data before encrypting it and demand ransom to prevent disclosure.

This program was recorded on September 17th, 2020.

Provided By

American Bar Association
Card image cap


Card image cap

Sherri Davidoff

Founder & CEO
LMG Security

Sherri is the CEO of LMG Security and the author of the recently released book “Data Breaches.” As a recognized expert in cybersecurity and data breach response, Sherri has been called a “security badass” by The New York Times. She has conducted cybersecurity training for many distinguished organizations, including the Department of Defense, the American Bar Association, FFIEC/FDIC, and many more. She is a faculty member at the Pacific Coast Banking School, and an instructor for Black Hat, where she teaches her “Data Breaches” course. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), a noted security text in the private sector and a college textbook for many cybersecurity courses. Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN), and holds her degree in Computer Science and Electrical Engineering from MIT. She has also been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien”.

Card image cap

Dave Ries

Of Counsel
Clark Hill, PLC

David G. Ries has devoted his legal career to helping organizations traverse complex environmental, technology, and data protection challenges.

David focuses on supporting data security and privacy clients by providing innovative solutions, designing a strategy for implementing comprehensive compliance programs and for responding to security incidents and regulatory actions and court claims relating to confidential business, employee, and customer data.

Information governance, including document storage and destruction, is multifaceted and constantly changing as individual regulatory bodies redefine the rules and court rulings place new responsibilities on businesses. David earned a distinguished reputation among his clients for his ability to understand the intricacies of governance and to provide actionable and sustainable recommendations.

David’s extensive experience and understanding of the evolution in cybersecurity law, as well as his position as a member of the American Bar Association's Cybersecurity Legal Task Force, make him a sought-after speaker in cybersecurity circles. He is the co-author of Locked Down: Practical Information Security for Lawyers, Second Edition, and Encryption Made Simple for Lawyers. He is also the editor of eDiscovery, Fourth Edition, and a contributing author to Information Security and Privacy: A Legal, Business and Technical Handbook, Second Edition.

Card image cap

Similar Courses

Card image cap
64 minutes
"I Am Not a Cat" Proceedings in a Virtual World
Besides becoming a pop-culture catchphrase, how has the shift to a virtual environment impacted proceedings over the last year, and what changes do you believe are here to stay? Our panel of experts will examine some of the greatest challenges, faux pas, and successes in virtual proceedings over the course of this transformative time.

Women, Influence & Power in Law Conference


Add to Cart
Card image cap
63 minutes
2021: The Year of the ELM
Panelists will clarify what constitutes an ELM platform, examine its unique and compelling capabilities, and discuss its strategic and tactical advantages, particularly those stemming from data-driven insights and machine-driven decision making. Attendees will gain a clear understanding of the significance of the emergence of ELM solutions, what firms and law departments can achieve with ELM platform, and practical and ethical considerations related to adopting an ELM solution.



Add to Cart
Card image cap
97 minutes
26 Words that Created the Internet - Basics of the Communications Decency Act Section 230 Safe Harbor
This program will examine the basics of CDA 230 and its day to day affect for those who advise internet businesses as well as those who litigate against them. It will give practical guidance as to what extend internet companies can or should edit or censor the information their users contribute to their sites and to what extent those users will actually be liable.

New Media Rights


Add to Cart
Card image cap
63 minutes
360-Degree View on How to Navigate a Crisis
During this session, our panel of experts will explore the following topics to arm you with a plan to protect the company and minimize long-term problems: - Building a crisis management team and understanding each person’s unique role -Preparedness – advance planning and assessing potential risk areas - First Response – responding in the critical first hours and days to minimize the long-term impact - Resolution Strategy – managing various actions stemming from the crisis to enable the best resolution for the company.

Women, Influence & Power in Law Conference


Add to Cart
Previous Next