Store Legal / NEW RELEASES Cybersecurity & the Courthouse: Safeguarding the Judicial Process
Cybersecurity & the Courthouse: Safeguarding the Judicial Process by GORDON GARRIE

Cybersecurity & the Courthouse: Safeguarding the Judicial Process

By Leo M. Gordon, Daniel B. Garrie


Available: Ships in 3-5 Business Days
Add to Cart
* For general delivery times, please see our Shipping Policy

The landscape of court technology has changed rapidly. As digital tools help facilitate the business and administrative process, multiple entry points for data breaches have also significantly increased in the judicial branch at all levels. Cybersecurity & the Courthouse: Safeguarding the Judicial Process explores the issues surrounding cybersecurity for the court and court systems. 

This unique resource provides the insight to:

  • Increase your awareness of the issues around cybersecurity
  • Properly defend client and case information
  • Understand the steps needed to mitigate and control the risk of and fallout from a data breach
  • Identify possible pathways to address strengths and weaknesses in individual proceedings as they are presented to the courts
  • Learn how to address the risk of a significant data breach

Key Highlights Include:

  • A detailed survey of cybersecurity threats and vulnerabilities
  • Discussion of essential data protection practices including password policies, perimeter security controls and encryption
  • Common-sense explanations of key cybersecurity standards and frameworks including ISO data security standards and the NIST Framework for Improving Critical Infrastructure Cybersecurity
Pages 158
Publish Date 11/22/2019
Product Line Wolters Kluwer Legal & Regulatory U.S.
ISBN 9781543809756
SKU 10071357-0001
Table of Contents
  • Chapter 1 Overview of Cybersecurity and the Courts
  • Chapter 2 Essential Commandments of Cybersecurity
  • Chapter 3 A Survey of Cyber Threats and Their Context
  • Chapter 4 What It Takes to Frustrate the Hacker Knocking at Your Door
  • Chapter 5 Cryptography
  • Chapter 6 ISO Standards
  • Chapter 7 Defending Against Threats Through Information Sharing
  • Chapter 8 How Courts Can Use the Cybersecurity Framework for Critical Infrastructure
  • Chapter 9 Structure Your Court to Make It Hacker-Proof