Offensive Security Assessments & Compliance Strategy & Resilience Industries Approach FAQ Request Scope

Cybersecurity for firms
confidentiality
is the product.

Adversim provides senior-led penetration testing, risk assessments, and cybersecurity advisory for law firms and professional services firms of every size. Confidentiality is your product. Client trust is your franchise. We protect both with the discipline and discretion this industry requires — without the consulting theater that wastes billable time you can’t recover.

1.6
ABA Model Rule 1.6(c) requires reasonable confidentiality safeguards
100%
of state bars have adopted Rule 1.6 or substantively similar duty
Privilege
Adversim engagements designed to support privilege protection
Discreet
Senior-led delivery; no junior staff handling firm data
Legal & Professional Services Frameworks We Cover
ABA Rule 1.6
NIST CSF 2.0
HIPAA (Law Firms)
GLBA (Law Firms)
GDPR
CCPA / CPRA
State Bar Opinions
// Why Legal & Professional Services Is Different

Confidentiality is the franchise.

Law firms occupy a unique cybersecurity position. The product you sell is, at its core, confidential advice — and a breach doesn’t just expose your firm to regulatory and reputational damage, it potentially compromises every client whose matter touches your systems. The aggregation of client confidences inside a single law firm creates a target profile that sophisticated threat actors recognize and pursue.

Law firms also operate under a regulatory framework that’s genuinely unique. ABA Model Rule 1.6(c) imposes a direct ethical duty to make reasonable efforts to prevent the unauthorized disclosure of client information — a duty that every state bar has adopted in some form. State bar ethics opinions across the country have made it clear that this duty extends to cybersecurity. Recent enforcement actions and disciplinary proceedings have established that “reasonable efforts” is not a hypothetical standard.

Layer on top of that the substantive law clients depend on you for — HIPAA when you represent healthcare clients, GLBA when you represent financial institutions, GDPR and CCPA for international and California-touching matters, and a growing patchwork of state and federal data protection rules that increasingly hold service providers accountable. Many law firms find themselves subject to client cybersecurity requirements that exceed their internal capabilities — and find out about the gap only when a client audit or RFP demands it.

Adversim approaches law firm cybersecurity with the discretion this work demands. Engagements are structured to support privilege where applicable, scoped to deliver substantive value without disrupting practice operations, and performed by senior practitioners who understand both the technical landscape and the professional responsibility framework that defines what “reasonable efforts” actually means.

// Legal & Professional Services Threat Landscape

Six threats defining
legal & professional services cybersecurity
right now.

Observed attacker behavior, not theoretical risk.

// THREAT 01 — DATA THEFT

Client Confidence Exfiltration

Sophisticated threat actors specifically target law firms representing high-value clients — M&A deals, regulatory matters, intellectual property litigation, sovereign work. The data has both direct intelligence value and resale value to adversarial parties. Many compromises remain undisclosed for years.

// THREAT 02 — RANSOMWARE

Law Firm Ransomware

Law firms are repeatedly targeted by ransomware operators because billable hour disruption creates immediate financial pressure, and double-extortion publication threats are especially effective against firms whose franchise depends on confidentiality. Multi-week outages have permanently damaged firms.

// THREAT 03 — BEC

Wire Fraud & Closing Fund Diversion

Real estate, transactional, and trust account practices face persistent wire fraud risk. Closing fund diversion through compromised email or spoofed correspondence has cost firms and clients tens of millions annually. Process and verification controls are the difference between catching and missing these attacks.

// THREAT 04 — THIRD-PARTY

Vendor & Co-Counsel Compromise

Law firm document management, e-discovery, expert witness, and co-counsel relationships create an extended attack surface most firms have limited visibility into. A single co-counsel compromise can expose privileged work product across an entire matter.

// THREAT 05 — INSIDER

Lateral Movement & Departing Attorneys

Attorney mobility is a defining feature of the profession. Departing attorneys, paralegals, and contractors create both insider threat and data governance challenges that traditional security tooling doesn’t address. Departure protocols are repeatedly identified as inadequate.

// THREAT 06 — CLIENT REQUIREMENTS

Client-Driven Cybersecurity Demands

Corporate clients increasingly require their outside counsel to demonstrate cybersecurity controls through outside counsel guidelines, security questionnaires, and contractually required certifications. Firms that can’t demonstrate posture risk losing engagements.

// ABA Model Rule 1.6 Deep Dive

What “reasonable efforts” actually means.

ABA Model Rule 1.6(c) reads, in relevant part: “A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” The rule was amended in 2012 to add the explicit cybersecurity duty, and Comment [18] to the rule lays out the multi-factor analysis state bars use to evaluate compliance.

The Comment [18] factors

Comment [18] identifies five factors lawyers should consider in determining what cybersecurity efforts are reasonable: the sensitivity of the information, the likelihood of disclosure absent additional safeguards, the cost of employing additional safeguards, the difficulty of implementing safeguards, and the extent to which safeguards adversely affect the lawyer’s ability to represent clients. The analysis is fact-specific and risk-based — there is no checklist that satisfies the rule.

What this means practically: a documented, evidence-based cybersecurity program tailored to your firm’s actual risk profile is what state bars and disciplinary authorities increasingly look for. Generic vendor-template assessments don’t demonstrate the multi-factor analysis Comment [18] requires.

State bar ethics opinions and enforcement

Ethics opinions from California, New York, Illinois, Texas, Florida, and dozens of other state bars have addressed cybersecurity duties under Rule 1.6 and adjacent rules. Common themes: lawyers must understand the technology they use, must vet vendors who handle client data, must respond appropriately to breaches and incidents, and must take affirmative steps to keep client information confidential. Several state bar opinions specifically reference penetration testing and risk assessment as elements of reasonable practice for firms of meaningful size.

Adversim’s Rule 1.6-aligned engagements produce the documentation, risk analysis, and testing evidence that a firm can point to in demonstrating reasonable efforts — to clients, to state bars, to insurance underwriters, and (in worst-case scenarios) to disciplinary authorities or opposing counsel in malpractice proceedings.

// Regulatory Landscape

Legal & Professional Services regulation,
mapped.

We work across the relevant regulatory landscape for the industry.

Regulation / Framework
Applicability
Adversim Coverage
ABA Model Rule 1.6
All US-licensed attorneys; adopted by every state bar in some form.
Full coverageReasonable-efforts assessment, documentation, and testing evidence.
State Bar Opinions
State-specific cybersecurity ethics opinions and rules.
Engagement-specificMapping to applicable state bar requirements.
Client OCG Requirements
Outside counsel guidelines from corporate clients requiring cyber controls.
Full coverageOCG-aligned program development and attestation support.
HIPAA (Law Firms)
Law firms representing healthcare clients become BAs and trigger HIPAA.
Full coverageHIPAA BAA-driven risk analyses and technical safeguard validation.
GLBA (Law Firms)
Law firms representing financial institutions trigger downstream GLBA obligations.
Full coverageFinancial-client-driven safeguard assessments.
State Breach Laws
State-specific breach notification rules applicable to law firms.
ReadinessBreach notification readiness for multi-state matter exposure.
GDPR / International
EU client data triggers GDPR; cross-border practice considerations.
Engagement-specificCross-border data flow analysis and technical safeguards.
Cyber Insurance Reqs
Professional liability cyber coverage increasingly imposes specific controls.
Full coverageUnderwriter-aligned controls and evidence development.
// Adversim Services for Legal & Professional Services

All three pillars,
tuned to legal & professional services.

Most engagements in this vertical start with one of these patterns.

01 / OFFENSIVE

Law Firm Penetration Testing

External and internal testing scoped for law firm environments: document management system exposure, remote access infrastructure, attorney workstation security, mobile device compromise paths, and the email systems where wire fraud most often originates.

  • External & internal network testing
  • Document management exposure testing
  • Attorney remote access & mobile
  • Wire fraud & BEC simulation
  • Phishing campaigns
Explore Offensive →
02 / ASSESSMENTS

Rule 1.6 & Compliance

ABA Model Rule 1.6 reasonable-efforts assessments, NIST CSF 2.0 maturity scoring tailored to law firm operations, HIPAA risk analyses for healthcare-client firms, GLBA assessments for financial-client firms, and OCG attestation support.

  • Rule 1.6 reasonable-efforts assessment
  • NIST CSF 2.0 maturity
  • HIPAA risk analysis (healthcare clients)
  • GLBA assessment (financial clients)
  • OCG attestation support
Explore Assessments →
03 / STRATEGIC

Law Firm vCISO

Fractional CISO advisory for law firms ranging from mid-size to BigLaw. Outside counsel guideline response, client security questionnaire support, ransomware readiness, departing-attorney governance, and the senior-level guidance most firms can’t justify hiring full-time.

  • Law firm vCISO advisory
  • Client OCG response support
  • Departing attorney governance
  • Ransomware readiness
  • Wire fraud tabletops
Explore Strategy →
1.6
ABA Model Rule mandating reasonable cybersecurity efforts.
SOURCE: ABA MODEL RULES
All
50 states + DC have adopted Rule 1.6 or substantively similar duty.
SOURCE: STATE BAR ADOPTIONS
OCG
Corporate clients increasingly require cyber controls via outside counsel guidelines.
SOURCE: INDUSTRY SURVEYS

Legal & Professional Services cybersecurity,
done right.

Scope a 30-minute call and we’ll have a fixed-fee proposal back in 48 hours.

// Legal & Professional Services Cybersecurity FAQ

Straight answers
for legal & professional services.

Rule 1.6(c) requires lawyers to make reasonable efforts to prevent inadvertent or unauthorized disclosure of, or unauthorized access to, client information. Comment [18] to the rule identifies five factors used to evaluate whether efforts are reasonable: sensitivity of information, likelihood of disclosure, cost of safeguards, difficulty of implementation, and impact on representation. The analysis is fact-specific. State bars increasingly expect documented risk-based programs, not generic checklists.
Where applicable and at client request, yes. We can structure engagements under attorney-client privilege or work-product doctrine, typically through engagement letters with outside counsel that direct the work. This is most common for sensitive assessments, post-incident readiness work, and situations where the engagement’s findings might be subject to discovery. We’re not your attorneys, but we’re experienced working within the structures attorneys use to protect sensitive work product.
Most law firm penetration testing engagements run $20,000 to $60,000. A focused external and internal test for a small to mid-size firm runs $20,000-$35,000. Comprehensive engagements including document management testing, remote access validation, and phishing campaigns for larger firms run $40,000-$60,000. BigLaw and multi-office firm engagements scale higher. All pricing is fixed-fee.
Yes. Many of our law firm engagements are driven specifically by OCG requirements from corporate clients — particularly financial services, healthcare, and tech clients that have increasingly prescriptive cybersecurity expectations of their outside counsel. We help firms build the documentation and control evidence to satisfy these requirements, respond to client security questionnaires, and prepare for client security reviews.
Yes. When you represent healthcare clients and handle PHI in the course of representation, you may be a HIPAA business associate. We perform HIPAA risk analyses, technical safeguard validation, and the documentation necessary to meet your BAA obligations to client healthcare entities. The same applies to GLBA when you represent financial institutions.
Yes. Client security questionnaires (SIG, SIG Lite, CAIQ, custom) have become a routine part of corporate-client relationships. We help firms develop accurate, complete responses backed by underlying control evidence — and identify the gaps you should close before sending the questionnaire back.
Professional liability cyber coverage for law firms has become substantially more rigorous in underwriting. Most carriers now require evidence of penetration testing, MFA, EDR, backup integrity, and incident response readiness — and renewals frequently require remediation of prior findings. We perform the underlying work and produce reports that satisfy underwriter expectations.
No. Adversim is a proactive cybersecurity practice. We do not perform active incident response, live breach containment, or digital forensics. We focus on readiness — penetration testing, risk assessments, tabletops, and the program-level work that prepares law firms for incidents before they occur. We can help you identify and onboard a qualified DFIR partner in advance and align engagement structures to protect privilege.
// Other Industries We Serve

Specialized depth
across regulated verticals.