Legal resilience against the digital offensive of 2026

Articles21 January 2026
Manuel Asenjo, CIO at ECIJA, analyzes the new landscape of cyber risk, the regulatory pressure of NIS2, and the strategic challenges for law firms.

As 2025 approached, many of us were expecting a technological respite; however, the data from early 2026 confirms that the pressure on our infrastructure not only persists but has become more sophisticated thanks to new tools and AI. As technology and security leaders in law firms, we cannot ignore that cyber risk is now the primary concern for 48% of Spanish companies, ahead of any other operational contingency.


The Critical Infrastructure Alert and the Regulatory Framework

The most significant incident so far this year, the cyberattack on Endesa and Energía XXI, should serve as a warning for all of us (we know we must stay alert). Although it affected the energy sector, the methodology is a wake-up call for everyone: unauthorized access exposed the data of millions of clients, including names, national identification numbers, and IBANs (with just this information, phone fraud or scams can be committed).


It is a reminder of the vulnerability of large ecosystems. In a law firm, a breach of this magnitude not only compromises financial data but also undermines the fundamental pillar of our sector: professional secrecy and client trust.


The challenge is not only operational but also regulatory. We are at a critical moment with the imminent transposition of the NIS2 Directive in Spain. This regulation is not "just another regulation"; it is a paradigm shift that requires us to elevate cybersecurity to the level of corporate governance. For companies serving as critical providers for essential sectors or reaching the threshold of significant entities, NIS2 introduces:

  • Executive responsibility: Managing partners will no longer be able to delegate cybersecurity as a purely IT matter; they will be directly responsible for compliance, which can lead to criminal and personal consequences (millions in fines, disqualifications, among others).
  • Supply chain management: We will need to audit not only our own security but also that of all our technology providers. Failing to do so could result in liability, even if our provider is at fault.
  • Strict notification: 24-hour deadlines for the advance notification of significant incidents. Compared to GDPR, this is much shorter.


Profile of the "Threat" in 2026

The current environment is characterized by three critical vectors that NIS2 aims to mitigate and that we must urgently address:

  • Increase in ransomware: With a global year-on-year increase of 60% and an average of 1,883 attacks per week in Spain, groups like Qilin and LockBit5 are demonstrating unprecedented disruption capabilities. Ransomware is, in fact, the most feared threat by 60% of organizations due to its effectiveness and success rate both in infection and in economic return.
  • Identity compromise: January has been marked by attacks that use legitimate credentials to move laterally within organizations. In the legal sector, where remote access to files is the norm, protecting digital identity is our most critical link. Our lawyers are increasingly working in remote locations, at clients' homes, in stations, and airports. This makes the perimeter increasingly larger and more complicated to defend.
  • Exfiltration and identity spoofing (phishing): More than just data encryption, credential theft and the exfiltration of sensitive information are becoming the preferred tactics to extort companies. At this point, we must not forget about internal actors. In the Zero Trust paradigm, the maxim is that we should trust no one. Threats can come from the outside or from the inside, and the latter are the most dangerous. Credential theft without notice, employees who accidentally (mass downloading of information for convenience or to work offline) or out of anger against the company can put us in critical and unexpected situations are elements to consider.

Here, NDR (Network Detection and Response) systems, tools that learn user patterns by detecting, reporting, and responding to unusual actions, and DLP (Data Loss Prevention) systems, specifically designed to detect information leaks, will be our best allies.


Roadmap for the Legal CIO/CISO

Given this scenario, our strategy for this year cannot be reactive and must be dual: protect the 'data' and comply with regulations.


  • Governance and training (NIS2 requirement): It is imperative to train management bodies. Cybersecurity is now a significant legal and financial risk.
  • Adoption of Zero Trust: Validate each access, especially in remote work, to prevent the lateral movements we have seen in attacks at the beginning of the year.
  • Operational resilience: prevention is not enough; it is necessary to be prepared to recover the company in hours, not days, in the event of a system encryption.

Conclusion: From Reactivity to Operational Excellence

2026 has begun with relentless cyber pressure and a regulatory framework, NIS2, that will demand excellence from us. It is no longer enough to be "reactive" or to rely on traditional perimeter solutions. The fact that nearly half of Spanish companies consider cyber risk their main threat reflects a maturity in the perception of danger, but now this perception must be transformed into investment and institutional culture.


For a law firm, cybersecurity is not an IT cost but the safeguard of our reputation and professional secrecy. Complying with NIS2 and mitigating the 9% increase in the frequency of attacks is not just a legal obligation; it is a competitive advantage.


Those companies that manage to integrate security into the DNA of their legal practice will not only survive this year's ransomware wave but will also establish themselves as the trusted partners the market demands in a hostile digital environment. Our mission as CIOs and CISOs is to lead this change, ensuring that as the digital world becomes more complex, the trust of our clients remains unchanged.


Access the complete article published in Law & Trends here.

Una imagen en blanco y negro de un puente con cables tensados contra un cielo nublado.
  • Artificial Intelligence

LATEST FROM #ECIJA