
Governance & Compliance
Cyber Security Lawyers
We are Punter Southall Law, compliance lawyers with expertise in matters relating to cyber security in the UK, Europe and beyond.
Our respected team of experienced compliance lawyers is committed to the resolution of complex legal issues in the UK & abroad.
If you require advice, Contact Us to arrange an appointment.
A Pleasure to Partner and Work With
I have had the opportunity to work with Lilian for a number of years. Her insights and guidance are always well balanced, she is extremely responsive, highly knowledgeable and most importantly a pleasure to partner and work with.
Anonymous
Unparalleled Knowledge
I am incredibly grateful for the outstanding and always fast service provided by Lilian. Her unparalleled knowledge, practical approach and unwavering dedication have been instrumental in navigating complex regulatory matters with ease. I wholeheartedly recommend her to anyone seeking top-tier legal counsel in the UK financial services industry.
Anonymous
Pragmatic and Commercial Approach
Lilian is a highly skilled regulatory lawyer who has excellent client relationship skills and has a pragmatic and commercial approach to issues. Having been instructed on short notice to assist on an ongoing project she impressed the whole team with her approach and input. Her support was invaluable.
Anonymous
A Tower of Strength and Support
Lilian has been a tower of strength and support. She is incredibly bright and knowledgeable. She is also pragmatic and determined. A rock to have by your side as a first-class lawyer and as a very thoughtful person.
Anonymous
Cyber security legal services in the UK, EU, USA & beyond
Cyber Security is still the number one concern for many organisations with cyberattacks still on the rise. The volume and complexity of attacks going up the legislative requirements are increasing too.
We have extensive experience of advising on new cybersecurity legislation including:
We keep up-to-date with the latest forms of threats including AI-based threats & ransomware. We also keep up-to-date with regulatory trends including shareholder activity, class actions and personal liability of directors and officers.
The rapidly evolving cyber security environment
We’re acutely aware of the rapidly changing environment where increasing numbers of organisations fall victim to attacks from activists, competitors and even other countries’ governments.
These attacks are growing in frequency, complexity and ferocity. Enterprises both large and small, are increasingly a target of sophisticated attempts to steal their data and compromise their systems; exposing them to data loss, fraud, litigation and regulatory sanctions.
Two decades of cyber security experience
Members of our team have more than two decades of experience of detecting, containing and responding to these attacks. We have assembled a dedicated group of lawyers with vast industry-specific experience and extensive knowledge of the technology, regulatory compliance, media relations, public perception and potential liability issues that come with these attacks.
From preventative planning, through discovering a breach and dealing with its aftermath, we help our clients protect themselves, their data, their customers and employees and, most of all, their future.
Our cyber security lawyers’ experience
Recent work from members of our team (which includes work prior to them joining Punter Southall Law) includes:
- Dealing with possibly one of the world’s largest ransomware attacks to date.
- Dealing with a third-party vendor breach involving one of the world’s largest technology businesses.
- Handling a ransomware attach for Deluxe Corporation. Deluxe Corporation have spoken publicly about this incident and their response on a podcast which you can watch at Ethicsverse: Deluxe ransomware response.
- Looking into allegations of defects in the security architecture for an app.
- Dealing with a data breach at a client’s payroll provider. The work involved an independent investigation into the breach including interviews and exercising audit rights to conduct an on-site visit to the vendor’s premises.
- Handling the effects of a payment fraud including looking at the method of attack and the culpability of various individuals involved in the client’s business.
- Assisting a client in connection with a data breach at a key supplier providing security services (including using biometrics) at key locations.
- Providing assurance on a company’s systems and procedures to demonstrate compliance to its board and investors.
- Dealing with a significant compromise of a well-known health related website.
- Advising a Financial Services business on their cyber security strategy. This included preparing a data breach plan and assistance in connection with a data breach response simulation.
- Advising a client in connection with a breach from one of its vendors of data initially regarded as non-sensitive – the subsequent investigation revealed it as being more concerning. We became the contact point for the vendor in mitigating the breach.
- Helping clients put in place data breach plans.
- Dealing with the aftermath of a successful phishing attack which led to significant financial loss for our client. We worked with our client on a remediation strategy which resulted in a payment from a contractor’s insurer to cover some of the losses involved.
- Helping a client engage with regulators after a breach of employee data by one of their HR team.
Speak with a cyber security lawyer
For bespoke legal advice on all cyber security matters, speak with one of our lawyers. We are ready to assist you with your cyber security needs and work with you to protect your business and achieve your objectives.
Contact Us to arrange a consultation with a cyber security lawyer.
Read our governance & compliance articles
EU DORA Regulation & Operational Resilience Requirements
One of the most talked about topics currently in legal, financial services and cyber security circles is on the implementation of DORA, or to give it its formal name the…
21 Min Read
Read More EU DORA Regulation & Operational Resilience RequirementsGDPR Glossary: EU data protection key terms & acronyms
We’ve put together this glossary to help explain some of the terms used in data protection and in GDPR. If there’s a term you think we should add, or you’d…
17 Min Read
Read More GDPR Glossary: EU data protection key terms & acronymsThe EU’s NIS2 Directive
What’s this all about? NIS2 is about cybersecurity. The NIS2 Directive entered into force on 16 January 2023. The deadline for Member States to transpose this into national law was…
14 Min Read
Read More The EU’s NIS2 Directive