SlideShare a Scribd company logo
1 of 8
Download to read offline
1
APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net
Legal
Vendor Network
Powered by
A New, Standardized Approach to
Risk Reduction for the Legal Industry
WHITE PAPER
information anywhere, security everywhere
A New, Standardised Approach to
Risk Reduction for the Legal Industry
A New, Standardised Approach to
Risk Reduction for the Legal Industry
2
APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net
Background
In the 2015 ILTATechnology Survey,over 420 law firms of all sizes
were asked what their top 3 technology issues or annoyances
were within their firm. The number one answer they gave was
security/risk management. In fact, security and risk management
concerns have significantly increased over the last 4 years, from
24% in 2012 to 42% in 2015.¹
The participants in the ILTA survey were also asked how often
they have an outside security assessment performed. 90% of
the law firms surveyed that have 700 or more attorneys have
an outside security assessment performed annually. 61% of law
firms with 350-699 attorneys do the same and this number has
only increased for both sized firms over the past 4 years by more
than 20%.¹
¹ Ilta Technology Survey, 2015
2
April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 			 +44 (0) 161 476 8700			 www.dvvs.co.uk
3
APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net
If more outside security assessments as well as client assessments are being performed and the number one technology
issue concerning law firms today is security/risk management, then that must equate to an increase in IT budgets and
spend for security and risk management, right? According to participants in the ILTA study, the answer is no.
When participants were asked whether their firm’s technology budget for operating expenses changed from 2014-2015,
the majority of the responses showed that budgets had remained the same, year after year, with 10% of firms with 700
attorneys or more recording a decrease in their technology operating budget.
What are the top 3
technology issues or
annoyances within
your firm?1
(up to 3 selections allowed)
1
Ilta Technology Survey, 2015
² Wall Street Journal, March 30, 2016
Security/Risk Management
Change: Managing Expectations
(Users and Management)
Change: Users’ Acceptance of Change
Email Management
Trending Data 2015-2012
42%
39%
33%
33%
33%
35%
28%
31%
36%
41%
2012201320142015
32%
34%
37%
32%
28%
24%
Cybersecurity attacks are a continuous threat to firms,
with law enforcement agencies issuing alerts on a monthly
or sometimes weekly basis.² Clients are becoming more
attentive to these threats and are becoming proactive when
choosing a firm by conducting their own assessments of
the firm they want to hire.They want assurances that their
personal and confidential data will be secure behind the
walls of the firm they choose.
April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 			 +44 (0) 161 476 8700			 www.dvvs.co.uk
4
APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net
Law firms are being tasked with protecting themselves
and their clients from increased security concerns
and risks while having to do so with stagnant or even
decreasing technology budget. This is causing both
firms and their technology service providers to think
outside the box and come up with new, innovative
strategies to help reduce security and risk concerns
while also reducing their overall cost to implement
and maintain.
How does your firm’s
technology budget for
operating expenses
compare to last year?1
Stayed the Same
Increased
Decreased
Trending Data 2015-2012
46%
46%
45%
2012201320142015
51%
44%
41%
42%
38%
11%
11%
14%
12%
1
Ilta Technology Survey, 2015
April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 			 +44 (0) 161 476 8700			 www.dvvs.co.uk
5
APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net
Introducing...
Legal Vendor Network™
(LVN)
In mid-2015, a steering committee was formed that was comprised of
members from 25 of the top global law firms and Prevalent – a leader
in third-party vendor risk management and cyber threat intelligence.
This committee wanted to develop a new, smarter way to protect law
firms and their clients from third-party risk – the risk associated with
doing business with outside vendors or suppliers. They also wanted a
solution to help them reduce their overall IT spending in connection
with third-party risk management. This need resulted in the creation
and launch of the Legal Vendor Network™ (LVN).
LVN is a membership-based program designed specifically for global
law firms of all sizes to perform smarter risk management through a
standardised model for risk assessments and global threat monitoring
of their third and fourth-party vendors.
LVN helps firms to manage and respond quickly to inbound
requests with the ability to perform a self assessment and
provide access to that request through our secure network.
5
April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 			 +44 (0) 161 476 8700			 www.dvvs.co.uk
6
APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net
• VRM creates a standard tiering structure within an
organisation, a standardised assessment workflow,
SharedAssessments content,evidence collection,risk
scoring, and reporting. It manages each vendor
independently, offering the user the ability to
understand the impact of doing business with a
particular vendor. Additionally, the solution can offer
an aggregated view to understand vendor risk by tier
or across all vendors.
• VTM is an additional security layer that works with
VRM to continuously monitor key relationship risk
areas, including: Data, Operational, Financial, Brand,
Regulatory, and Geographic.
The core technology powering LVN is Prevalent
Synapse™ - the first-of-its-kind third and fourth-party
risk collaborative assessment & threat intelligence SaaS
platform. It enables smarter risk management through a
shared assessment model that leverages standardised
content, automation, and threat intelligence. It is
the only purpose-built platform on the market with
integrated capabilities that support both contributions
and relationships in a secure, members-only network.
It was architected to support Prevalent’s Vendor Risk
Management (VRM) and Vendor Threat Monitor (VTM)
software solutions.
Response
Risk Review
Mitigation
VRM CORE
Collaborative
Assessment Vault
Threat Intelligence &
Monitoring (VTM)
Contributory
Assessment DB
Contributor
to VaultConsumer
of Vault
Secure
Assessment
Content/Data
April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 			 +44 (0) 161 476 8700			 www.dvvs.co.uk
7
APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net
On finding the targeted vendor, the
member sends a request to Prevalent to
load vendor evidence. Prevalent will then
perform the collection of evidence from
the vendors on behalf of the requesting
members.
This will ensure the anonymity of the data
and avoid members completing multiple
assessments of a vendor at the same time.
Upon completion of the survey, the
evidence is stored in the repository and can
be shared with the requesting members.
Members will access the evidence from
their own instance of VRM. Once the
evidence is loaded in VRM, the member
can conduct their risk assessment.
For example, members wishing to conduct a risk assessment
on a particular vendor can search against the vendor database
which contains more than 125,000+ different entities.
LVN delivers value to members by reducing both the time
and cost associated with vendor risk management as well
as significantly reducing risk to the law firm and its clients.
Members are able to see the value right away by gaining
access to a vendor repository where they can view vendor
information, assessment results, and populate vendor
information into the vendor repository.
Benefits of Being an
LVN Member
Vendor Repository
THREAT INTELLIGENCE AND NETWORK AVAILABLE TO ALL MEMBERS
PROGRAM OFFICE
PRE-ASSESSMENT
Determine Vendor
Importance
1
Types of assessment
REMOTE AssessmentA
• Self Assessment
• Self Assessment + Evidence Review
On-SITE ASSESsMENTB
• AUP Based
• Non-CPA Firm• Independent
ON-SITE (CONSULTANT)
• AUP Based
• Attestation By CPA
ON-SITE (CPA)
• AUP Superset
• Attestation By CPA
ON-SITE (FINANCIAL COA)
ASSESSment
2
ALLOWS LAW FIRMS TO ASSESS
THIRD-PARTY SERVICE PROVIDERS
FOR SECURITY AND DATA RISKS.
Want to learn more about LVN?
LVN membership is growing and is anticipated to grow to over 100 global law firms by the end of 2016. If you would like
to learn more about how your firm can join the fight against third-party risks, contact us today.
This network is a great way for law firms
to help build better security maturity and
visibility across our industry with the goal
to reduce risk, reduce cost, and improve
our ability to support our clients.
- Peter Lesser, Director of Global Technology Skadden
April 2016 +44 (0) 161 476 8700 www.dvvs.co.uk
LVN membership is growing globally and the network now covers 100’s of common third and fourth parties, with their
risk assessments available on-demand. If you would like to learn more about how your firm can join the fight against
third-party risks, contact us today.
April 2016 			 +44 (0) 161 476 8700			 www.dvvs.co.uk
LVN membership is growing globally and the network now covers 100’s of common third and fourth parties, with their
risk assessments available on-demand. If you would like to learn more about how your firm can join the fight against
third-party risks, contact us today.
8
APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net
Prevalent is an industry-leading vendor risk and cyber threat intelligence innovator.
Since 2004, Prevalent has worked diligently with leaders in information security, compliance, and risk
management to develop solutions that are proven to help organizations reduce, manage and monitor the
security threats and risks associated with third-party business relationships. This close collaboration has led to
the development of award-winning technologies, enabling Prevalent to create value for their customers.
Today, Prevalent remains the leading innovator in the third-party risk management and cyber-threat monitoring
market, creating powerful software and service solutions like Prevalent Vendor Risk Manager and Prevalent
Vendor Threat Monitor, while delivering compliance and risk solutions.
For more information regarding Prevalent, please visit www.prevalent.net, email info@prevalent.net or
call 877-PREVALENT.
Follow us on:   
About Prevalent, Inc.
40 Technology Drive • Warren, NJ 07059
Phone: (908) 781-5555 • Toll Free: (877) PREVALENT
Copyright 2016 by Prevalent, Inc. All Rights Reserved
information anywhere, security everywhere
April 2016 +44 (0) 161 476 8700 www.dvvs.co.uk
Prevalent is an industry-leading vendor risk and cyber threat intelligence innovator. Since 2004, Prevalent has worked with
leaders in information security, compliance, and risk management to develop solutions that are proven to help organizations
reduce, manage and monitor the security threats and risks associated with third-party business relationships.
Today, Prevalent remains the leading innovator in the third-party risk management, creating powerful software and service
solutions that have earned Prevalent the recognition as a “Leader” in the Gartner 2017 Magic Quadrant for IT Vendor Risk
Management Software.
DVV Solutions was established in 1999, and has become one of the UK’s leading providers in the design, implementation and
management of Third Party Risk Management (TPRM) and IT Security services.
We enable companies to significantly reduce the time and resource burdens of their existing Third Party risk reduction programs
by leveraging our expertise in delivering Third Party risk assessments and, more vitally, the identification and mitigation of Third
Party risk.
We work with you to scrutinize your Third Party relationships – service by service, supplier by supplier- and develop a rigorous
Third Party risk management program that secures your extended enterprise.
Getting up and running on the LVN is easy. DVV Solutions can help you understand the membership option that is best for your
organization and then arrange your access to the Network.
We offer consultative and managed services to ensure you get the most out of your investment and membership in the LVN and
improve your ability to manage increasing numbers and complexity of outsourced supplier risk.
About Prevalent, Inc.
About DVV Solutions
Joining the Legal Vendor Network
Call us today
on +44 (0) 161 476 8700
or email sales@dvvs.co.uk
Please note: This White Paper contains excerpts used, with kind permission, from Prevalent Inc.
Registered trademarks and copyrights acknowledged. All rights reserved.
April 2016 +44 (0) 161 476 8700 www.dvvs.co.uk
Prevalent is an industry-leading vendor risk and cyber threat intelligence innovator. Since 2004, Prevalent has worked with
leaders in information security, compliance, and risk management to develop solutions that are proven to help organisations
reduce, manage and monitor the security threats and risks associated with third-party business relationships.
Today, Prevalent remains the leading innovator in the third-party risk management, creating powerful software and service
solutions that have earned Prevalent the recognition as a “Leader” in the Gartner 2017 Magic Quadrant for IT Vendor Risk
Management Software.
DVV Solutions was established in 1999, and has become one of the UK’s leading providers in the design, implementation and
management of Third Party Risk Management (TPRM) and IT Security services.
We enable companies to significantly reduce the time and resource burdens of their existing Third Party risk reduction programs
by leveraging our expertise in delivering Third Party risk assessments and, more vitally, the identification and mitigation of Third
Party risk.
We work with you to scrutinize your Third Party relationships – service by service, supplier by supplier- and develop a rigorous
Third Party risk management program that secures your extended enterprise.
About Prevalent, Inc.
About DVV Solutions
Joining the Legal Vendor Network
Call us today
on +44 (0) 161 476 8700
or email sales@dvvs.co.uk
Please note: This White Paper contains excerpts used, with kind permission, from Prevalent Inc.
Registered trademarks and copyrights acknowledged. All rights reserved.
Getting up and running on the LVN is easy. DVV Solutions can help you understand the membership option that is best for your
organisation and then arrange your access to the Network.
We offer consultative and managed services to ensure you get the most out of your investment and membership in the LVN and
improve your ability to manage increasing numbers and complexity of outsourced supplier risk.
scrutinise

More Related Content

What's hot

15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutionsLaurent Pacalin
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Bsi supply-chain-solutions-overview-brochure
Bsi supply-chain-solutions-overview-brochureBsi supply-chain-solutions-overview-brochure
Bsi supply-chain-solutions-overview-brochureUdomsak Suntithikavong
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor Roll2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor RollCASCouncil
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notCheapSSLsecurity
 
Secure Web Gateway Market PPT: Trends and Dynamics, Drivers, Competitive land...
Secure Web Gateway Market PPT: Trends and Dynamics, Drivers, Competitive land...Secure Web Gateway Market PPT: Trends and Dynamics, Drivers, Competitive land...
Secure Web Gateway Market PPT: Trends and Dynamics, Drivers, Competitive land...IMARC Group
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Laurent Pacalin
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016Laurent Pacalin
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud PreventionGuardian Analytics
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsNormShield
 
Media-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsMedia-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsKenan Marks
 
Cyber security as a strategic imperative web
Cyber security as a strategic imperative webCyber security as a strategic imperative web
Cyber security as a strategic imperative webSevenOf9
 
An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...Kristal Snider
 

What's hot (18)

15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutions
 
Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
Bsi supply-chain-solutions-overview-brochure
Bsi supply-chain-solutions-overview-brochureBsi supply-chain-solutions-overview-brochure
Bsi supply-chain-solutions-overview-brochure
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor Roll2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor Roll
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if not
 
Secure Web Gateway Market PPT: Trends and Dynamics, Drivers, Competitive land...
Secure Web Gateway Market PPT: Trends and Dynamics, Drivers, Competitive land...Secure Web Gateway Market PPT: Trends and Dynamics, Drivers, Competitive land...
Secure Web Gateway Market PPT: Trends and Dynamics, Drivers, Competitive land...
 
Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016Guardian analytics vs. actimize 2016
Guardian analytics vs. actimize 2016
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016
 
New Requirements of Fraud Prevention
New Requirements of Fraud PreventionNew Requirements of Fraud Prevention
New Requirements of Fraud Prevention
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
 
Media-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsMedia-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-Tags
 
Cyber security as a strategic imperative web
Cyber security as a strategic imperative webCyber security as a strategic imperative web
Cyber security as a strategic imperative web
 
An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...
 

Similar to DVV Solutions Legal Vendor Network White Paper April 2016

A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103DVV Solutions Third Party Risk Management
 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceCharles Steve
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureDave James
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance RecommendationsMeg Weber
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Re-shaping Assurance
Re-shaping AssuranceRe-shaping Assurance
Re-shaping AssurancePaul Wenman
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016rsouthal2003
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
IASA eSummit Nov 15 - signposts for security investment in a cloud world
IASA eSummit Nov 15 - signposts for security investment in a cloud worldIASA eSummit Nov 15 - signposts for security investment in a cloud world
IASA eSummit Nov 15 - signposts for security investment in a cloud worldWayne Anderson
 
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...Dataconomy Media
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security reportGabe Akisanmi
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
RTIA Insurance and Financial Services 5.11.16
RTIA Insurance and Financial Services 5.11.16RTIA Insurance and Financial Services 5.11.16
RTIA Insurance and Financial Services 5.11.16Carl Gerson
 

Similar to DVV Solutions Legal Vendor Network White Paper April 2016 (20)

A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
 
Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligence
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
World-Check One Brochure
World-Check One BrochureWorld-Check One Brochure
World-Check One Brochure
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Re-shaping Assurance
Re-shaping AssuranceRe-shaping Assurance
Re-shaping Assurance
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
IASA eSummit Nov 15 - signposts for security investment in a cloud world
IASA eSummit Nov 15 - signposts for security investment in a cloud worldIASA eSummit Nov 15 - signposts for security investment in a cloud world
IASA eSummit Nov 15 - signposts for security investment in a cloud world
 
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security report
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
RTIA Insurance and Financial Services 5.11.16
RTIA Insurance and Financial Services 5.11.16RTIA Insurance and Financial Services 5.11.16
RTIA Insurance and Financial Services 5.11.16
 

More from DVV Solutions Third Party Risk Management

More from DVV Solutions Third Party Risk Management (8)

Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
 
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
 
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
 
Third Party Network Webinar Slide Deck 110718 FINAL
Third Party Network Webinar Slide Deck 110718 FINALThird Party Network Webinar Slide Deck 110718 FINAL
Third Party Network Webinar Slide Deck 110718 FINAL
 
Data Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service OverviewData Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service Overview
 
DVV Solutions About Us Datasheet
DVV Solutions About Us DatasheetDVV Solutions About Us Datasheet
DVV Solutions About Us Datasheet
 
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeThird Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

DVV Solutions Legal Vendor Network White Paper April 2016

  • 1. 1 APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net Legal Vendor Network Powered by A New, Standardized Approach to Risk Reduction for the Legal Industry WHITE PAPER information anywhere, security everywhere A New, Standardised Approach to Risk Reduction for the Legal Industry A New, Standardised Approach to Risk Reduction for the Legal Industry
  • 2. 2 APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net Background In the 2015 ILTATechnology Survey,over 420 law firms of all sizes were asked what their top 3 technology issues or annoyances were within their firm. The number one answer they gave was security/risk management. In fact, security and risk management concerns have significantly increased over the last 4 years, from 24% in 2012 to 42% in 2015.¹ The participants in the ILTA survey were also asked how often they have an outside security assessment performed. 90% of the law firms surveyed that have 700 or more attorneys have an outside security assessment performed annually. 61% of law firms with 350-699 attorneys do the same and this number has only increased for both sized firms over the past 4 years by more than 20%.¹ ¹ Ilta Technology Survey, 2015 2 April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 +44 (0) 161 476 8700 www.dvvs.co.uk
  • 3. 3 APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net If more outside security assessments as well as client assessments are being performed and the number one technology issue concerning law firms today is security/risk management, then that must equate to an increase in IT budgets and spend for security and risk management, right? According to participants in the ILTA study, the answer is no. When participants were asked whether their firm’s technology budget for operating expenses changed from 2014-2015, the majority of the responses showed that budgets had remained the same, year after year, with 10% of firms with 700 attorneys or more recording a decrease in their technology operating budget. What are the top 3 technology issues or annoyances within your firm?1 (up to 3 selections allowed) 1 Ilta Technology Survey, 2015 ² Wall Street Journal, March 30, 2016 Security/Risk Management Change: Managing Expectations (Users and Management) Change: Users’ Acceptance of Change Email Management Trending Data 2015-2012 42% 39% 33% 33% 33% 35% 28% 31% 36% 41% 2012201320142015 32% 34% 37% 32% 28% 24% Cybersecurity attacks are a continuous threat to firms, with law enforcement agencies issuing alerts on a monthly or sometimes weekly basis.² Clients are becoming more attentive to these threats and are becoming proactive when choosing a firm by conducting their own assessments of the firm they want to hire.They want assurances that their personal and confidential data will be secure behind the walls of the firm they choose. April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 +44 (0) 161 476 8700 www.dvvs.co.uk
  • 4. 4 APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net Law firms are being tasked with protecting themselves and their clients from increased security concerns and risks while having to do so with stagnant or even decreasing technology budget. This is causing both firms and their technology service providers to think outside the box and come up with new, innovative strategies to help reduce security and risk concerns while also reducing their overall cost to implement and maintain. How does your firm’s technology budget for operating expenses compare to last year?1 Stayed the Same Increased Decreased Trending Data 2015-2012 46% 46% 45% 2012201320142015 51% 44% 41% 42% 38% 11% 11% 14% 12% 1 Ilta Technology Survey, 2015 April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 +44 (0) 161 476 8700 www.dvvs.co.uk
  • 5. 5 APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net Introducing... Legal Vendor Network™ (LVN) In mid-2015, a steering committee was formed that was comprised of members from 25 of the top global law firms and Prevalent – a leader in third-party vendor risk management and cyber threat intelligence. This committee wanted to develop a new, smarter way to protect law firms and their clients from third-party risk – the risk associated with doing business with outside vendors or suppliers. They also wanted a solution to help them reduce their overall IT spending in connection with third-party risk management. This need resulted in the creation and launch of the Legal Vendor Network™ (LVN). LVN is a membership-based program designed specifically for global law firms of all sizes to perform smarter risk management through a standardised model for risk assessments and global threat monitoring of their third and fourth-party vendors. LVN helps firms to manage and respond quickly to inbound requests with the ability to perform a self assessment and provide access to that request through our secure network. 5 April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 +44 (0) 161 476 8700 www.dvvs.co.uk
  • 6. 6 APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net • VRM creates a standard tiering structure within an organisation, a standardised assessment workflow, SharedAssessments content,evidence collection,risk scoring, and reporting. It manages each vendor independently, offering the user the ability to understand the impact of doing business with a particular vendor. Additionally, the solution can offer an aggregated view to understand vendor risk by tier or across all vendors. • VTM is an additional security layer that works with VRM to continuously monitor key relationship risk areas, including: Data, Operational, Financial, Brand, Regulatory, and Geographic. The core technology powering LVN is Prevalent Synapse™ - the first-of-its-kind third and fourth-party risk collaborative assessment & threat intelligence SaaS platform. It enables smarter risk management through a shared assessment model that leverages standardised content, automation, and threat intelligence. It is the only purpose-built platform on the market with integrated capabilities that support both contributions and relationships in a secure, members-only network. It was architected to support Prevalent’s Vendor Risk Management (VRM) and Vendor Threat Monitor (VTM) software solutions. Response Risk Review Mitigation VRM CORE Collaborative Assessment Vault Threat Intelligence & Monitoring (VTM) Contributory Assessment DB Contributor to VaultConsumer of Vault Secure Assessment Content/Data April 2016 +44 (0) 161 476 8700 www.dvvs.co.ukApril 2016 +44 (0) 161 476 8700 www.dvvs.co.uk
  • 7. 7 APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net On finding the targeted vendor, the member sends a request to Prevalent to load vendor evidence. Prevalent will then perform the collection of evidence from the vendors on behalf of the requesting members. This will ensure the anonymity of the data and avoid members completing multiple assessments of a vendor at the same time. Upon completion of the survey, the evidence is stored in the repository and can be shared with the requesting members. Members will access the evidence from their own instance of VRM. Once the evidence is loaded in VRM, the member can conduct their risk assessment. For example, members wishing to conduct a risk assessment on a particular vendor can search against the vendor database which contains more than 125,000+ different entities. LVN delivers value to members by reducing both the time and cost associated with vendor risk management as well as significantly reducing risk to the law firm and its clients. Members are able to see the value right away by gaining access to a vendor repository where they can view vendor information, assessment results, and populate vendor information into the vendor repository. Benefits of Being an LVN Member Vendor Repository THREAT INTELLIGENCE AND NETWORK AVAILABLE TO ALL MEMBERS PROGRAM OFFICE PRE-ASSESSMENT Determine Vendor Importance 1 Types of assessment REMOTE AssessmentA • Self Assessment • Self Assessment + Evidence Review On-SITE ASSESsMENTB • AUP Based • Non-CPA Firm• Independent ON-SITE (CONSULTANT) • AUP Based • Attestation By CPA ON-SITE (CPA) • AUP Superset • Attestation By CPA ON-SITE (FINANCIAL COA) ASSESSment 2 ALLOWS LAW FIRMS TO ASSESS THIRD-PARTY SERVICE PROVIDERS FOR SECURITY AND DATA RISKS. Want to learn more about LVN? LVN membership is growing and is anticipated to grow to over 100 global law firms by the end of 2016. If you would like to learn more about how your firm can join the fight against third-party risks, contact us today. This network is a great way for law firms to help build better security maturity and visibility across our industry with the goal to reduce risk, reduce cost, and improve our ability to support our clients. - Peter Lesser, Director of Global Technology Skadden April 2016 +44 (0) 161 476 8700 www.dvvs.co.uk LVN membership is growing globally and the network now covers 100’s of common third and fourth parties, with their risk assessments available on-demand. If you would like to learn more about how your firm can join the fight against third-party risks, contact us today. April 2016 +44 (0) 161 476 8700 www.dvvs.co.uk LVN membership is growing globally and the network now covers 100’s of common third and fourth parties, with their risk assessments available on-demand. If you would like to learn more about how your firm can join the fight against third-party risks, contact us today.
  • 8. 8 APRIL 2016 877-PREVALENT (773-8253) www.prevalent.net Prevalent is an industry-leading vendor risk and cyber threat intelligence innovator. Since 2004, Prevalent has worked diligently with leaders in information security, compliance, and risk management to develop solutions that are proven to help organizations reduce, manage and monitor the security threats and risks associated with third-party business relationships. This close collaboration has led to the development of award-winning technologies, enabling Prevalent to create value for their customers. Today, Prevalent remains the leading innovator in the third-party risk management and cyber-threat monitoring market, creating powerful software and service solutions like Prevalent Vendor Risk Manager and Prevalent Vendor Threat Monitor, while delivering compliance and risk solutions. For more information regarding Prevalent, please visit www.prevalent.net, email info@prevalent.net or call 877-PREVALENT. Follow us on:    About Prevalent, Inc. 40 Technology Drive • Warren, NJ 07059 Phone: (908) 781-5555 • Toll Free: (877) PREVALENT Copyright 2016 by Prevalent, Inc. All Rights Reserved information anywhere, security everywhere April 2016 +44 (0) 161 476 8700 www.dvvs.co.uk Prevalent is an industry-leading vendor risk and cyber threat intelligence innovator. Since 2004, Prevalent has worked with leaders in information security, compliance, and risk management to develop solutions that are proven to help organizations reduce, manage and monitor the security threats and risks associated with third-party business relationships. Today, Prevalent remains the leading innovator in the third-party risk management, creating powerful software and service solutions that have earned Prevalent the recognition as a “Leader” in the Gartner 2017 Magic Quadrant for IT Vendor Risk Management Software. DVV Solutions was established in 1999, and has become one of the UK’s leading providers in the design, implementation and management of Third Party Risk Management (TPRM) and IT Security services. We enable companies to significantly reduce the time and resource burdens of their existing Third Party risk reduction programs by leveraging our expertise in delivering Third Party risk assessments and, more vitally, the identification and mitigation of Third Party risk. We work with you to scrutinize your Third Party relationships – service by service, supplier by supplier- and develop a rigorous Third Party risk management program that secures your extended enterprise. Getting up and running on the LVN is easy. DVV Solutions can help you understand the membership option that is best for your organization and then arrange your access to the Network. We offer consultative and managed services to ensure you get the most out of your investment and membership in the LVN and improve your ability to manage increasing numbers and complexity of outsourced supplier risk. About Prevalent, Inc. About DVV Solutions Joining the Legal Vendor Network Call us today on +44 (0) 161 476 8700 or email sales@dvvs.co.uk Please note: This White Paper contains excerpts used, with kind permission, from Prevalent Inc. Registered trademarks and copyrights acknowledged. All rights reserved. April 2016 +44 (0) 161 476 8700 www.dvvs.co.uk Prevalent is an industry-leading vendor risk and cyber threat intelligence innovator. Since 2004, Prevalent has worked with leaders in information security, compliance, and risk management to develop solutions that are proven to help organisations reduce, manage and monitor the security threats and risks associated with third-party business relationships. Today, Prevalent remains the leading innovator in the third-party risk management, creating powerful software and service solutions that have earned Prevalent the recognition as a “Leader” in the Gartner 2017 Magic Quadrant for IT Vendor Risk Management Software. DVV Solutions was established in 1999, and has become one of the UK’s leading providers in the design, implementation and management of Third Party Risk Management (TPRM) and IT Security services. We enable companies to significantly reduce the time and resource burdens of their existing Third Party risk reduction programs by leveraging our expertise in delivering Third Party risk assessments and, more vitally, the identification and mitigation of Third Party risk. We work with you to scrutinize your Third Party relationships – service by service, supplier by supplier- and develop a rigorous Third Party risk management program that secures your extended enterprise. About Prevalent, Inc. About DVV Solutions Joining the Legal Vendor Network Call us today on +44 (0) 161 476 8700 or email sales@dvvs.co.uk Please note: This White Paper contains excerpts used, with kind permission, from Prevalent Inc. Registered trademarks and copyrights acknowledged. All rights reserved. Getting up and running on the LVN is easy. DVV Solutions can help you understand the membership option that is best for your organisation and then arrange your access to the Network. We offer consultative and managed services to ensure you get the most out of your investment and membership in the LVN and improve your ability to manage increasing numbers and complexity of outsourced supplier risk. scrutinise