
Cybersecurity for lawyers
- 21 Sections
- 187 Lessons
- 7 Quizzes
M1 | The lawyer’s cyber mandate
- Why cybersecurity is now your job too
- Diagnostic quiz | Are you the weak link?
- Your secrets are easier to steal than you think
- The big picture: Why cybersecurity isn’t optional
- Actions to take first: Don’t buy another gadget
- Guard-guide-govern model: The “3 Gs” of lawyer survival
- Reflection activity (G-G-G)
- Deep Dive A: Duties and expectations
- Deep Dive B: Why Lawyers Are Targets
- Branching Scenario: The First Hour of a Breach
- Deep Dive C: From Reactive to Proactive
- Social and peer reflection: Nobody changes alone
- Spaced reinforcement: Memory as a service
M2 | Cybersecurity 101
M3 | Threats that target legal work
- Lawyers, you’re a juicy target
- Threats with a human face
- Ransomware: hostage negotiations for client files
- Insider threats: The devil you know
- Third-party risks: Your vendors are your attack surface
- The fancy new stuff (Emerging threats)
- Why this hits lawyers harder
- Case studies: The cautionary tales
- Practical takeaways (aka Tiny nudges that save you)
- Interactive game: Spot the scam
- End thought: Cybersecurity as theatre
M4 | Cyber hygiene for legal practice
M5 | Metadata and redaction risks
- Introduction: The invisible ink problem
- Diagnostic quiz
- Why metadata is the lawyer’s uninvited witness
- Redaction theatre versus redaction reality
- Actions to take first (the behavioural hacks)
- Deep Dive A: Metadata’s behavioural economics
- Deep Dive B: Famous failures and near-misses
- Branching Scenario: The deposition disaster
- Deep Dive C: Tools, tactics, and taboos
- Social and peer reflection
- Spaced reinforcement
M6 | Remote and mobile security for hybrid teams
M7 | Technology competence and professional responsibility
- Act I: The ridiculous double standard
- Act II: Competence as theatre
- Act III: Why the regulators sound boring but are secretly right
- Act IV: The comedy of delegation
- Act V: The hidden upside
- Act VI: The horror stories (with punchlines)
- Act VII: What “competence” actually looks like (spoiler: it’s easier than you think)
- Act VIII: The scenario
- Finale: The professional paradox
M8 | Global breach laws and notification playbooks
Module 9 | Cyber insurance: coverage, exclusions, claims strategy
- 9.1 | The set-up: “A safety net is only useful if it’s under the trapeze”
- 9.2 | Why cyber insurance is both indispensable and misunderstood
- 9.3 | Anatomy of a cyber-insurance policy (or, the magician’s deck of cards)
- 9.4 | The behavioural traps of coverage and exclusions
- 9.5 | Claims strategy as courtroom drama
- Branching scenario – The firm that thought it was covered
- 9.6 | Strategic use of insurance as leverage
- 9.7 | From claims to culture — building a cyber-resilient legal practice
- 9.8 | Market intelligence and the future of cyber-insurance
- 9.9 | Designing your firm’s cyber-resilience dashboard
- Cyber-insurance MCQs
M10 | Sectoral rules: finance, health, public sector, critical infrastructure
- Setting the scene
- Diagnostic quiz
- The big picture
- Deep Dive A: Finance (the paranoid accountant)
- Deep Dive B: Health (the nervous surgeon)
- Deep Dive C: Public sector (the suspicious bureaucrat)
- Deep Dive D: Critical infrastructure (the fragile giant)
- Branching scenario: The cascade effect
- Social and peer reflection
- Spaced reinforcement
M11 | AI, privacy & cyber: shadow AI, model risk, data governance
- The AI intern nobody hired
- Shadow AI – the unseen associate
- Model risk – confidence tricksters in silicon
- Data governance – the unglamorous hero
- Deep Dive A: The psychology of “AI as colleague”
- Deep Dive B: Regulatory rumblings
- Branching Scenario: The shadow memo
- From reactive to reframing
- Social & peer reflection
- Spaced reinforcement
Module 12 | Anatomy of an incident and counsel’s role
Module 13 | Building the incident response plan
- 13.1 | Why You Need an Incident Response Plan (IRP): The Business of Staying Calm in a Crisis
- 13.2 | Governance by Design: The Charter, the Roles, the RACI, and the Power to Act
- 13.3 | Legal Architecture of the IRP: Privilege, Deadlines, and Regulatory Chess
- 13.4 | Behavioural Science in the War Room: Biases, Brains, and the Cost of Overconfidence
- 13.5 | The Technical Symphony: Containment, Eradication, and the Pursuit of Clean Recovery
- 13.6 | Cross-Disciplinary Coordination: Command, Communication, and the War Room Orchestra
- 13.7 | Post-Incident Review and Maturity Modelling: Turning Chaos into Competence
- 13.8 | Testing and Validation: From Tabletops to War Games — Making Readiness Real
- 13.9 | The Cultural Endgame: From Binder to Behaviour — Embedding the IRP into Organisational DNA
- 13.10 | The Lawyer’s Closing Playbook: How Counsel Leads the Response, Protects Privilege, and Restores Trust
M14 | Vendor/third-party and AI risk — DDQs, testing, contractual controls
- Trust outsourced, risk imported
- The illusion of safety in checklists
- Contracts as cargo cults
- Testing and the problem of Schrödinger’s vendor
- AI as your new vendor (but weirder)
- Behavioural hacks for vendor governance
- Deep Dive A: The DDQ dissection
- Deep Dive B: Contracts as social signalling devices
- Scenario: The vendor who smiled too much
- Who do you trust when you outsource trust?
M15 | Working with CISOs/IT — reading reports, shared vocab, decision rights
- The two tribes problem
- Diagnostic quiz
- The big picture: shared but different incentives
- Deep dive A: Reading reports without glaze-eyed boredom
- Deep dive B: Building a shared vocabulary
- Deep dive C: Decision rights and who owns the red button
- Branching scenario: The midnight alert
- Social and peer reflection
- Spaced reinforcement
M16 | Board reporting — metrics, heatmaps, scenario briefings
- Setting the boardroom scene
- The art of translation
- Metrics that matter (and metrics that don’t)
- Heatmaps as behavioural theatre
- Scenario briefings: the lawyer’s edge
- Telling the risk story with elegance
- The lawyer’s role in board reporting
- Branching exercise: the boardroom test
- Peer reflection
- Spaced reinforcement
M17 | Contract redlining lab — audit rights, warranties, liability caps
- The art of colouring outside the lines
- Audit rights — the X-ray clause
- Warranties — promises with placebo effects
- Liability caps — the poker chip of negotiation
- The redlining game
- Deep dive: What the ink colour hides
- Scenario briefing: The liability crisis
- Reflection: the behavioural contract lawyer
- Spaced reinforcement
Module 18 | Breach simulation — counsel as breach coach
- 18.1 | The Counsel as Breach Coach — From Firefighter to Architect
- 18.2 | Building the Dual-Track Privilege Protocol
- 18.3 | Cognitive Bias and the Breach Mind — Debiasing the Decision Room
- 18.4 | Crisis Communication and Litigation Dynamics — Counsel as Narrative Gatekeeper
- 18.5 | Cross-Border and Multi-Agency Complexity — Counsel as Jurisdiction Navigator
- 18.6 | The Live Simulation — Scripted Chaos and Performance Coaching
- 18.7 | Debrief and Governance Integration — Turning Simulation into Evidence of Readiness
- 18.8 | Institutionalising Resilience — The Breach Coach as Cultural Architect
M19 | Digital forensics & e-discovery security — privilege, chain of custody
- The lawyer as detective in a crime scene made of zeros and ones
- Why this matters (and why lawyers underestimate it)
- Privilege in the age of terabytes
- Chain of custody as theatre and truth
- Common pitfalls and behavioural blind spots
- Counsel’s playbook
- Branching scenario: The tainted hard drive
- Reflection and peer exchange
- Spaced reinforcement
M20 | Emerging threats: supply chain, quantum, deepfakes, geopolitics
- Why the future always looks silly at first
- Supply chain — efficiency as vulnerability
- Quantum — the lock that might not fit the key
- Deepfakes — when seeing isn’t believing
- Geopolitics — law collides with shifting borders
- Practical toolkit for lawyers
- Interactive scenario — “A week of emerging threats”
- Closing reflection
M21 | The lawyer as cyber leader — capstone reflection & personal roadmap
- Opening gambit: The magician reveals the trick
- The nudge audit: how far you’ve travelled (and where you still trip)
- Reframing leadership: lawyers as unlikely but perfect cyber guides
- The capstone case: your own firm in five years
- Your personal cyber roadmap (because generic checklists are for auditors)
- Ritual closure: the oath, the story, the invitation
- Postcard
A 21-module global programme for in-house counsel, GRC professionals, and senior law-firm practitioners
Cybercrime cost the global economy more than US$8 trillion in 2023, and legal teams are increasingly the “soft targets.” A mis-redacted PDF, a careless click, or a weak vendor contract can expose clients, regulators, and boards to risk.
This course equips lawyers to meet their evolving cyber mandate:
- to guard client data and privilege;
- guide contracts and governance structures; and
- govern in the boardroom and with regulators when incidents occur.
Designed by ITLawCo with contributions from leading CISOs and senior lawyers across jurisdictions, this 21-module, 7-week programme combines self-paced lessons, live simulations, and practical toolkits. Participants graduate with not just knowledge, but working artefacts: an incident response plan, board briefing templates, vendor due diligence checklists, and redlined clauses ready for immediate use.
Outcomes
By the end of the programme, participants will be able to:
- Interpret and apply global ethical and regulatory duties in cybersecurity (ABA, SRA, GDPR, POPIA, sectoral rules).
- Identify and mitigate cyber threats that specifically target legal practice.
- Draft and deploy policies, IRPs, and vendor agreements that withstand scrutiny.
- Communicate cyber risks credibly to boards, regulators, and clients.
- Lead during incidents, preserving privilege, guiding evidence handling, and steering lawful responses.
- Anticipate emerging risks (AI, supply chain, quantum, deepfakes) and position their teams strategically.
Structure
- 21 modules delivered over 7 weeks.
- Self-paced lessons: concise videos, transcripts, job aids, quizzes.
- Live intensives: breach simulation, contract redlining lab, board briefing exercise.
- Toolkits: incident response templates, policy packs, vendor questionnaires, clause libraries.
- Capstone: personal leadership roadmap + certificate of completion.
Audience
- General Counsel, Chief Legal Officers, Deputy GCs.
- Heads of Legal, Compliance, and GRC professionals.
- Senior law firm partners and associates advising on technology, privacy, or regulated industries.
Time commitment
- 2–3 hours per week (three modules, plus optional live workshop participation).
- Delivered in flexible formats designed for busy professionals.
Certification
Participants who complete all modules and the capstone exercise will receive a Certificate of Completion from ITLawCo, documenting professional development in cybersecurity, governance, and legal risk management.
⚖️ This course positions you not as a technician, but as the strategic counsel who can stand steady in the boardroom when the silence comes.
Want to submit a review? Login
- FAQs
Who is this course for?
- Who is this course for?
This course is designed for practising lawyers, in-house counsel, legal advisors, and compliance professionals who want to strengthen their cybersecurity fluency. You don’t need to be a technologist — but you do need to care about protecting client data, safeguarding privilege, and staying on the right side of ethical duties.
Do I need a technical background?
- Do I need a technical background?
No. The course assumes zero prior technical knowledge. Think of it less like learning to code and more like learning how to read a balance sheet: you won’t become an accountant, but you’ll know enough to ask the right questions, spot red flags, and protect yourself.
What makes this course different from other cybersecurity trainings?
- What makes this course different from other cybersecurity trainings?
Most cybersecurity courses are built for IT people. This one is built for lawyers. It blends black-letter law, ethical duties, and practical risk management with behavioural insights, storytelling, and real legal scenarios — the things that actually move the needle in practice.
How long will it take to complete?
- How long will it take to complete?
The full course is designed to be completed in around 20–24 hours of structured learning across 21 modules. Each module takes roughly 2 hours and includes exercises, scenarios, and reflection prompts.
Can I do it at my own pace?
- Can I do it at my own pace?
Yes. The course is self-paced and available online. You can binge it in a week or spread it over a few months. Your progress is tracked, and you can revisit materials anytime. However, please note that you only have access ot the course for six months from your enrolment date.
Will this count towards my CPD / CLE hours?
- Will this count towards my CPD / CLE hours?
Yes, in most jurisdictions the course qualifies for Continuing Professional Development (CPD) or Continuing Legal Education (CLE) credit. We provide completion certificates and can assist with jurisdiction-specific accreditation queries.
How practical is it?
- How practical is it?
Very. This isn’t a lecture-only course. You’ll work through branching scenarios (e.g., “The first hour of a breach”), contract redlining labs, board-room simulations, and mock client situations. You’ll leave with templates, playbooks, and checklists you can use the next day.
What will I be able to do at the end of the course?
- What will I be able to do at the end of the course?
By the end you will:
- Recognise cyber risks unique to legal practice
- Advise clients confidently on legal and governance duties
- Draft stronger contracts and breach playbooks
- Communicate cyber risks to boards and executives
- Position yourself as the “cyber-savvy lawyer” in your firm or organisation
How do I access the course materials?
- How do I access the course materials?
All materials are delivered through our secure learning portal.
Is there a certificate?
- Is there a certificate?
Yes. Upon completion you’ll receive a Certificate in Cybersecurity for Lawyers, which you can showcase on LinkedIn, your firm bio, or CPD/CLE filings.
What if cybersecurity isn’t part of my current role?
- What if cybersecurity isn’t part of my current role?
It soon will be. Regulators, clients, and professional bodies increasingly expect lawyers to demonstrate tech and cybersecurity competence. Even if you never touch a firewall, you are a custodian of data — and that makes you a frontline actor.
Can my whole team take the course?
- Can my whole team take the course?
Absolutely. We offer firm licences and group pricing so that teams can build a shared vocabulary and capability. In fact, that’s where the biggest benefits lie — when the whole legal function speaks “cyber” fluently.
Is there support if I get stuck?
- Is there support if I get stuck?
Yes. You can ask questions in the private community, access periodic live Q&A sessions, and reach out for help if you need guidance applying the material to your specific practice.
What’s the return on investment?
- What’s the return on investment?
Think of it this way: one preventable breach, one mis-redlined clause, or one regulator fine could dwarf the course fee. This is insurance for your practice, your licence, and your reputation.