Skip to main content

Nixon Peabody LLP

  • People
  • Capabilities
  • Insights
  • About
Trending Topics
    • People
    • Capabilities
    • Insights
    • About
    • Locations
    • Events
    • Careers
    • Alumni
    • Contact Us
    Practices

    View All

    • Affordable Housing
    • Community Development Finance
    • Corporate & Finance
    • Cybersecurity & Privacy
    • Entertainment & Sports
    • Environmental
    • Franchising & Distribution
    • Government Investigations & White Collar Defense
    • Healthcare
    • Intellectual Property
    • International Services
    • Labor, Employment, and Benefits
    • Litigation
    • Private Wealth & Advisory
    • Project Finance
    • Public Finance
    • Real Estate
    • Regulatory & Government Relations
    Industries

    View All

    • Advanced Manufacturing and Industrials
    • Art and Cultural Property
    • Aviation
    • Cannabis
    • Consumer
    • Energy
    • Entertainment & Sports
    • Financial Institutions
    • Healthcare
    • Higher Education
    • Infrastructure
    • Nonprofit Organizations
    • Real Estate
    • Sports & Stadiums
    • Technology
    Value-Added Services

    View All

    • Alternative Fee Arrangements

      Developing innovative pricing structures and alternative fee agreement models that deliver additional value for our clients.

    • Continuing Education

      Advancing professional knowledge and offering credits for attorneys, staff and other professionals.

    • Crisis Advisory

      Helping clients respond correctly when a crisis occurs.

    • eDiscovery

      Leveraging law and technology to deliver sound solutions.

    • Environmental, Social, and Governance (ESG)

      We help clients create positive return on investments in people, products, and the planet.

    • Global Services

      Delivering seamless service through partnerships across the globe.

    • Innovation

      Leveraging leading-edge technology to guide change and create seamless, collaborative experiences for clients and attorneys.

    • IPED

      Industry-leading conferences focused on affordable housing, tax credits, and more.

    • Legal Project Management

      Providing actionable information to support strategic decision-making.

    • Legally Green

      Teaming with clients to advance sustainable projects, mitigate the effects of climate change, and protect our planet.

    • Nixon Peabody Trust Company

      Offering a range of investment management and fiduciary services.

    • NP Capital Connector

      Bringing together companies and investors for tomorrow’s new deals.

    • NP Second Opinion

      Offering fresh insights on cases that are delayed, over budget, or off-target from the desired resolution.

    • NP Trial

      Courtroom-ready lawyers who can resolve disputes early on clients’ terms or prevail at trial before a judge or jury.

    • Social Impact

      Creating positive impact in our communities through increasing equity, access, and opportunity.

    • Women in Dealmaking

      We provide strategic counsel on complex corporate transactions and unite dynamic women in the dealmaking arena.

    1. Home
    2. Insights
    3. Videos
    4. Reducing cyber and tech risk

      Videos

    Reducing cyber and tech risk

    April 30, 2026

    LinkedInX (Twitter)EmailCopy URL
    Jason Kravitz, Jenny Holmes discussing today’s biggest cyber risks

    A Little Privacy, Please!

    McKinsey cyber partner Charlie Lewis unpacks today’s cyber risks and the priorities businesses need now.

    In this episode, we’re joined by Charlie Lewis, a partner at McKinsey & Company who leads its cyber practice across North America and Europe. Charlie advises organizations on reducing cyber and technology risk in an increasingly complex threat environment. And yes, he’s also Jenny’s brother, so expect a little sibling energy in today’s conversation. 

    Before McKinsey, Charlie spent more than 13 years in the US Army and continues to serve in the Army Reserves as an assistant professor at the United States Military Academy. He brings a unique blend of military, academic, and private-sector experience to today’s cyber challenges.

    What does your day-to-day look like?

    I like to explain what I do using the story of an ice cream sandwich.

    If you think about an ice cream sandwich, it’s made of fairly simple parts: a chocolate wafer, ice cream, and a wrapper. On the surface, that’s all you need. But what I actually spend my time worrying about is whether all of those parts show up when you need them.

    I worked with a client whose wafer supplier was hit by ransomware. Suddenly, they had to think about business continuity, vendor risk, and supply chain resilience just to keep ice cream sandwiches on shelves. It sounds funny, but it’s a real example of how cyber risk shows up in everyday business.

    Day to day, I’m on the phone with large financial institutions, utilities across the US and Europe, and life sciences companies, helping them think about their most critical technology risks. That can mean foundational issues like IT asset management and identity and access management, emerging areas like quantum security and agentic AI, or broader ecosystem questions like third- and nth-party risk.

    What excites me is that the work feels societal. In the Army, the mission was narrow and targeted. Now, it’s about helping reduce risk across systems we all rely on. Breaches will happen, but how do we do a better job of making society more secure in a world that depends so heavily on digital platforms?

    Do you see overlap between the cyber threats you saw in the Army and what businesses face today?

    It’s honestly frightening how much overlap there is.

    In some ways, I think it’s worse in the private sector. The military operates with a clear battlefield and an offensive mindset. In the private sector, what we protect matters to everyone—healthcare, food supply, energy, financial systems, data.

    We’ve seen this with Colonial Pipeline, with JBS and meat prices, and even with companies like Hasbro being targeted. It’s not just nation-state actors anymore. It’s criminals who now have scale, access, and the ability to disrupt entire industries remotely. They don’t need to steal something physically—they can shut down operations and extract millions of dollars from anywhere in the world.

    And it’s happening every single day.

    Have you seen an increase in cyberattacks tied to global events? What should we be watching for?

    I wouldn’t say there’s been a dramatic increase yet, but I do think it’s about to happen.

    Geopolitical cyber activity has been consistent for years, whether in utilities or telecom, or in conflicts involving Ukraine, Russia, or the Middle East. What’s really changing the game now is the use of agents in cyberattacks.

    Researchers and, increasingly, attackers are using agents to identify vulnerabilities, determine attack paths, and execute attacks much faster. Often, these are old-school techniques, like SQL injection, but delivered through a novel attack path. Because the agents can adapt and move quickly, traditional alerting and web application firewall rules often miss them.

    This means vulnerabilities that used to be considered low risk are suddenly much more serious. At RSA, I mentioned an overly verbose endpoint vulnerability, and a CISO (chief information security officer) literally left the room to call his team and make sure they didn’t have it exposed. That’s the shift we’re seeing.

    Organizations now have to fight speed with speed. Detect, contain, respond, and recover faster than ever before.

    If you could give business owners three cybersecurity priorities for the coming year, what would they be?

    First, continue to focus on the fundamentals. You need to know where your assets are, where your data lives, and what your critical applications are. You can’t restore your business if you don’t know what you’re restoring. Identity and access management remains foundational, as does strong third- and nth-party risk management.

    Second, start building agentic workflows now, especially in the security operations center. Organizations should seriously consider making their first agentic use case a SOC (security operations center) use case. There’s cost efficiency in automating tier-one triage and response, but more importantly, you’ll soon need agents to fight agents. In three to six months, many organizations will be targeted this way.

    Finally, teams need to keep learning. Security leaders and practitioners should understand how agents are built, how governance changes with AI, and how to integrate AI risk into existing compliance and security programs.

    And through all of this, it’s important to remain human. Pressure on security teams and business owners is only going to grow. Leadership, context, and empathy still matter, especially as the world fills up with more automation and more robots.

    This conversation has been edited for clarity and length. Thank you, Charlie Lewis, for sharing your insights.

    Practices

    Cybersecurity & Privacy

    Key contacts:

    Jason C. Kravitz

    Partner / Leader, Cybersecurity & Privacy

    • jkravitz@nixonpeabody.com

    Jenny L. Holmes

    Partner / Deputy Leader, Cybersecurity & Privacy

    • jholmes@nixonpeabody.com
    The foregoing has been prepared for the general information of clients and friends of the firm. It is not meant to provide legal advice with respect to any specific matter and should not be acted upon without professional counsel. If you have any questions or require any further information regarding these or other related matters, please contact your regular Nixon Peabody LLP representative. This material may be considered advertising under certain rules of professional conduct.

    Subscribe to stay informed of the latest legal news, alerts, and business trends.Subscribe

    • People
    • Capabilities
    • Insights
    • About
    • Locations
    • Events
    • Careers
    • Alumni
    • Contact Us
    • Cookie Preferences
    • Privacy Policy
    • Terms of Use
    • Accessibility Statement
    • Statement of Client Rights
    • Supplier Code of Conduct
    • Nixon Peabody International LLP
    • PAL
    © 2026 Nixon Peabody. All rights reserved