Selected Presentations, Podcasts, and Webinars

photo-apr-19-1-47-47-pmSince the late ’90s, I have had the pleasure of being invited to speak on a variety of legal topics, many of which have included legal issues related to developing technology. These topics have included the creation and enforceability of electronic contracts and signatures, issues surrounding the Y2K concerns (that never really came to pass), employee Internet use policies for businesses and other organizations, and methods for using the Internet and other technology for increasing the profitability of existing businesses. More recently, I have given several presentations on cybersecurity, data protection, cyber risk, data breaches, cyber insurance, and computer fraud. The following are some of my recent presentations with links to the presentation slides (where available):

2025 Presentations, Webinars & Podcasts

  • Strategic Use & Governance of Artificial Intelligence (AI) for Faith Based Organizations
  • Aligning Cyber and AI with Business Operations: Fireside Chat with Janie Aggas, BISO of CBRE, UT Law CLE’s Essential Cybersecurity, Privacy, and AI Law (with Janie Aggas)
  • Fireside Chat – Beyond the Hype: Building a Responsible and Resilient AI Roadmap, Mindfluence (with Amy Chaney, Christer Swartz, Naveen Kolli)
  • Ransomware & Incident Response, North Texas ISSA & Infragard Event (with Anthony M. Freed, Charly Bun, Nader Zaveri)
  • Battle Preparation: Training with the T-800’s Legal Arsenal for Constraining AI, CISO XC (Closing Keynote)
  • Governing Artificial Intelligence (AI) for Faith Based Non-Profits (private event)
  • What Is AI Governance and What Does It Mean to You?, SecureWorld Dallas (with Christine Chasse)
  • Working with the Board of Directors on Cyber Risk — A Strategic Imperative for Security Leaders, SecureWorld Dallas
  • Cyber Resilience and Risk Management: Critical Insights for Business Lawyers, Annual Meeting of the State Bar of Missouri (Branson, MO)
  • 🎙Defenders in Lab Coats | S2:E16 The Legal POV Playbook, Podcast with Reanna Schultz
  • Cyber & AI Governance, Compliance & Risk Management Training, Spencer Fane’s Annual Employee Benefits Seminar (Overland Park, KS)
  • Navigating Data Privacy and Cybersecurity Requirements in Multifamily Housing, Multi-Family Market Webinar
  • Cracking the Legal Code for AI, State Bar of Texas Podcast
  • Smishing & Phishing: Cyber Threats in the Digital Age, TexasBarCLE’s 24th Annual Advanced In-House Counsel Course (with Dena Stroh and Edward Contreras)
  • Protecting Your Business from AI & Cyber Risk: Perspectives from a Cyber Attorney, Veteran Practitioners, Incident Responders, and Breach QBs (with Mike Saylor)
  • Uniting the Cyber Risk Defenders with Shawn Tuma and Raf Los, Extrahop Webinar
  • Embracing Artificial Intelligence (AI) in Florida’s Private Clubs: Legal Compliance, Data Privacy & Strategic Governance, Club Management Association of America – Florida Chapter (with Robyn Nordin Stowell)
  • Cybersecurity Incident Response & Mitigation Strategies for Banks and Credit Unions, FinEd Webinar Network (with Shelli Clarkston)
  • Navigating the Cyber Battlefield: Insights on Cyber Resilience from a Breach Quarterback, Annual Meeting of the Oklahoma Bar Association
  • Cybersecurity: Healthcare Edition, Health Law Section, Dallas Bar Association (with Christine Chasse)
  • Uncovering Insider Threats in AI & Data Security, ISMG Data Security Summit (Dallas)
  • Cyber Risk & Resilience: A Breach QB’s Perspective on The GC+CISO Relationship, The Role of Contracts, and Key Areas of Risk, The General Counsel Session, American Hotel & Lodging Association Conference
  • General Counsel and CISO Working Together in Cyber, United States Secret Service Dallas Field Office’s North Texas Cyber Fraud Task Force (with Dena Stroh and Ian Schneller)
  • Using Artificial Intelligence for Trusts and Estate Planning, Collin County Bar Association – Probate/Estate Planning Section
  • Building Cyber Resilience Through Leadership and the Power of Perspective, Protect Your Business Annual Cybersecurity Forum, Community National Bank, Midland, Texas
  • Building Cyber Resilience Through Leadership and the Power of Perspective, Guest Lecturer, St. Mary’s School of Law, Law Office Technology class
  • Building Cyber Resilience Through Leadership and the Power of Perspective, Texas Bar CLE’s Paralegal Forum
  • Faith in the Digital Age: Navigating the Crossroads of Generative AI, Cybersecurity, and Privacy, Dallas Baptist University School of Business
  • Building Cyber Resilience Through Leadership and the Power of Perspective, InfraGard Texas Webinar
  • Navigating Third-Party Risk and Vendor Resilience, SecureWorld Financial Services
  • Fragile Connections: Understanding the Full Scope of Cyber Business Interruption Risks and Resiliency, USI Webinar (with James Reed)
  • Data Privacy 2024 Year in Review: Key Cases, Regulatory Updates, and Industry Trends, Law & Forensics Westlaw Webinar (with Daniel B. Garrie, K. Royal, Nichole L. Sterling)

2024 Presentations, Webinars & Podcasts

  • The Legal Future of AI, Elevate Xchange Epic Broadcast (video)
  • AI Ethics and AI Security, Corporate Counsel Section of the State Bar of Texas (with Darron Flagg)
  • Understanding CISO Legal Risk with Joe Sullivan and David Malicoat, CISO XC
  • Navigating Complex Data in the Age of AI, Mindfluence AI Cybersecurity Leadership Forum, Dallas (with Priya Reddy, Brian Tate, Rameshwar Balanagu)
  • Ransomware & Negotiations, ISSA North Texas (with Ben Carr, Michael Kingsley, Allison Schultz)
  • Building Cyber Resilience Through Leadership and the Power of Perspective, Lunch Keynote, SecureWorld Denver
  • The GC+CISO Connection – A GC’s Tips for How CISOs can Better Work with Legal Teams, CISO XC (with Dena Stroh)
  • Opening Keynote – The Hidden Costs of Cybersecurity: Unveiling the True Price of Protection, SecureWorld Dallas (with Bryce Carter and Brandi Johnson)
  • Navigating Third-Party Risk and Vendor Resilience, SecureWorld Dallas (with Shelly Thomas)
  • Cybersecurity Training for the Board of Directors, Private Directors Association Cybersecurity Conference, The Private Director’s Association Dallas Fort Worth
  • Navigating the Cyber Battlefield – Insights on Cyber Resilience for Oncology Practices, Texas Society of Clinical Oncology (TxSCO) Annual Conference 2024
  • Using Artificial Intelligence for Trusts and Estate Planning, Estate Planning Council of North Texas
  • Navigating the Cyber Battlefield – Insights on Cyber Resilience from a Breach Quarterback, Texas Bankers Association Legal Conference
  • Insight and Updates Regarding Data Privacy Compliance, 23rd Advanced In-House Counsel Conference (with William Smigh)
  • The GC and CTO/CIO/CISO Relationship, 23rd Advanced In-House Counsel Conference (with Dena Stroh)
  • Elevating your Data Strategy: From Data Discovery & Classification to Protection, North Texas ISSA
  • The Critical Connection: CISOs and General Counsels in Cybersecurity, The Professional CISO Show (YouTube)
  • XChange Keynote – Navigating the Cyber Battlefield: Insights from a Breach Quarterback, XChange Security 2024
  • Implementing Privacy and Cyber Compliance, Adaptable Lawyer Track, Annual Meeting of the State Bar of Texas
  • Cyber & Privacy Risk Mitigation for CISOs (private event)
  • The Future is Here: Navigating AI in the Workplace, Spencer Fane’s Advantage CLE Series
  • Legal & Regulatory, Data Governance, Cyber Insurance Update (private event)
  • Navigating the Privacy and Data Protection Maze: A Roadmap for Investment Managers, D/FW Financial Services Counsel Roundtable
  • A Year In: Navigating SEC Cyber Rules and an Increased Risk in Individual Liability, West Legal Education Webinar
  • Importance of the Human Element in AI Era of Ransomware, Humans Vs. AI in Threat Response, Cyber and Legal in Incident Response (Ransomware), St. Louis Gateway to Innovation
  • Importance of the Human Element in AI Era of BEC, St. Louis Gateway to Innovation
  • Emerging Compliance & Legal Issues with Generative Artificial Intelligence, CISO XC 2024
  • Cybersecurity for the Mortgage Banking Industry, Dallas Mortgage Bankers Association
  • Building Cyber Resilience Through Leadership and the Power of Perspective, Keynote, SecureWorld Kansas City
  • Real-World Cyber Risk Management and Resilience Planning, Enterprise University Course
  • Generative AI Presents Opportunities and Risks: Elevate Xchange Roundtable
  • Being a Good Steward in a World of Cyber Crime: Protecting Your House of Worship From Phishing, Scams, and Cyber Attacks (PHOW Series)
  • Guardians of Confidentiality: Navigating Cybersecurity & Data Privacy in Oncology, 2024 Community Oncology Conference (Orlando, FL)
  • Crisis Management: Strategies When Communicating with Multiple Stakeholders, Minorities in Cybersecurity Annual Conference (Dallas, TX)
  • Crisis Management: Strategies When Communicating with Multiple Stakeholders, Redefining Cybersecurity Podcast
  • Current Cyber Threat Landscape, 12th Annual Cyber Liability Insurance ExecuSummit (Uncasville, CT)
  • A Cyber First-Responder / Breach Quarterback Talks Real World Cyber Incidents, MES IT Security Conference (Indianapolis, Ind.)
  • Securing Business Against The Latest Cyber Threat Trends: Incident Responses & Insurance Essentials, ITSP Magazine, Redefining Cybersecurity Podcast (YouTube video)
  • Cyber Security and Cyber Law – Identity Governance Matters, (LinkedIn video)
  • Trade Secrets, Restrictive Covenants & Cybersecurity Conference 2024 (Sandpiper Partners LLC Program)
  • Securing Your Business Against the Latest Cyber Threat Trends: Incident Response and Cyber Insurance Essentials (ITSP Magazine Podcast Network)
  • Demystifying the Texas Data Privacy and Security Act, State Bar of Texas Podcast (audio)

2023 Presentations, Webinars & Podcasts

  • AI, Cyber & Enterprise Risk Management | Annual Technology Breakfast, FEI – Financial Executives International (with Johnny Lee)
  • Your Organization Has Been Breached … Now What?, Tech Titans Cybersecurity Seminar
  • Fortifying the Firewall: Cybersecurity Best Practices for Law Firms and Their Clients, ABA Litigation Section
  • Implications of ChatGPT and other Generative AI, SecureWorld Dallas
  • Real-World Cyber Risk Management and Resilience Planning, SecureWorld PLUS Course, SecureWorld Dallas
  • Cover Your Cyber Assets, SecureWorld Dallas
  • Building A Resilient Organization Through Cybersecurity Optimization, IAA Super Conference
  • Ballin’ On A Budget: Establishing a Cybersecurity Baseline on a Budget, NetDiligence Cyber Risk Summit Beverly Hills
  • The Power of Perspective for Better Cybersecurity, Keynote, UD Cyber Summit, University of Dallas
  • Cyber Risk in Financial Services, 2023 Annual Legal Conference, Texas Bankers Association (Denver, CO)
  • Breaches | Cyber Insurance | White Castle and the SEC!, DtSR Podcast (YouTube)
  • Update on the SEC’s Cyber Disclosure Requirements, Washington University Roundtable (St. Louis, MO)
  • Cyber Risk and the Ethical Use of Technology in the Practice of Law, National Association of Patent Practitioners (NAPP) (Washington DC)
  • Twists and Turns: Cybersecurity and Privacy Update, WorkSmarts Half-Day Seminar, Spencer Fane Webinar
  • Ransomware & Cybersecurity — Risk Management Planning to Better Protect Against and Response to These and Other Cyber Attacks, Association of Corporate Counsel – Colorado Chapter (with Jeremy Rucker)
  • Protecting Your Firm and Clients Against Cyber Attacks and Ransomware, Collin County Bar Association
  • What’s Next in the Tech Industry, Weaver – Technology Industry Practice Group Annual Meeting
  • Ethical Use of Technology, 9th Annual Oil and Gas Disputes Course, TexasBar CLE
  • Elevate Xchange DFW Community New Year Roundtable Forum, Data Protection / Cyber Insurance

2022 Presentations, Webinars & Podcasts

2021 Presentations, Webinars & Podcasts

2020 Presentations and Webinars

2019 Presentations and Webinars

2018 Presentations and Webinars

  • 15 Tech Laws and Cases to Protect Your Clients, Disaster Proofing Your Practice (with Pierre Grosdidier and Lisa Angelo)
  • The Legal Case for Cyber Risk Management Programs and What They Should Include, TSCPA 2018 CPE Expo Conference (slides)
  • Cybersecurity, 16th Annual Advanced Business Law Course (slides)
  • Cybersecurity, 41st Annual Advanced Civil Trial Course
  • Vendor Risk Management: Maintaining Relationships While Limiting Liability, International Association of Privacy Professionals (IAPP) Privacy.Security.Risk Conference (with Mark Smith, Tami Dokken, and Melissa Krasnow)
  • Cybersecurity is a Team Sport: Why strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams, SecureWorld Dallas (slides)
  • Cybersecurity: Cyber Risk Management for Banks & Financial Institutions, Texas Association of Bank Counsel 42nd Annual Convention (slides)
  • Regulatory and Ethical Considerations for Handling Sensitive Electronic Information, 13th Annual UT Law Advanced Texas Administrative Law Seminar (with Adrian Senyszyn)
  • Data Privacy/GDPR Compliance and Security, 17th Annual Advanced In-House Counsel Conference (with John Trevino)
  • The Use of Social Media in the Courtroom, State Bar of Texas Annual Meeting (with Judge Emily Miskel and John Browning)
  • 15 Tech Laws and Cases to Protect Your Clients, State Bar of Texas Annual Meeting (with Pierre Grosdidier and Lisa Angelo)
  • Something is Phishy: Cyber Security Scams & How to Avoid Them, State Bar of Texas Annual Meeting (with Reginald A. Hirsch)
  • Cybersecurity and Trade Secrets (Panel), Center for American and International Law Symposium on Global Markets
  • Cybersecurity Fundamentals for Legal Professionals (and every other business), Mid-Year Meeting of the Oklahoma Bar Association Intellectual Property Law Section (slides)
  • NYDFS Cybersecurity Regulations – 23 NYCRR Part 500, Webinar with McAfee and CDW (slides)
  • Cybersecurity Law Update (with Jeremy Rucker), Collin County Bench Bar Conference (slides)
  • The Legal Case for Cyber Risk Management Programs and What They Should Include (with Jay Johnson, Jones Day), ISMG’s Data Breach & Fraud Prevention Summit (video, available with registration)
  • Cyber Risk Management and Attorney-Client Privilege in Cybersecurity, Security Weekly Podcast – Episode #81 (video)
  • What is Reasonable Cybersecurity? Security Weekly Podcast – Episode #76 (video)
  • Cybersecurity Fundamentals for Legal Professionals, Klemchuk LLP’s 14th Annual Ethics CLE Presentation (blog with slides)
  • Effective Cybersecurity for Small and Midsize Companies, Center for American & International Law’s Second Annual Cybersecurity & Data Privacy Law Conference, Plano, TX (4/13/18) (slides)
  • A Glove’s Off Discovery Fight — What’s the Truth About Attorney-Client Privilege in Cybersecurity (with Jay Johnson, Jones Day), Center for American & International Law’s Second Annual Cybersecurity & Data Privacy Law Conference, Plano, TX (4/13/18)
  • What CISO’s Need to Know About the Legal Side of Cyber Risk Management Programs, CISO Summit, Miami, FL (3/26/18)
  • The Legal Case for Cyber Risk Management, InfoSec World -Privacy & Risk Summit, Orlando, FL (3/22/18) (slides)
  • The Legal Case for Cyber Risk Management Programs and What They Should Include, The American Institute of Architects’ Large Firm Round Table (3/15/18) (slides)
  • “What Could Go Wrong?” – We’re Glad You Asked!, Social Media Breakfast – Dallas (2/22/18) (slides)
  • Introduction to Cybersecurity, The Alliance – Cybersecurity Converge Tour (Dallas) for the Frisco Independent School District (2/21/18) (more info)
  • The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Management Program, State Bar of Texas Women and the Law Section (2/15/18) (slides)
  • Cybersecurity: How to Protect Your Firm from a Cyber Attack, Texas Bar CLE Cybersecurity Law Workshop, Houston, Texas (2/7/18) (slides)
  • Data Breach Incident Response – Recovering from a Cyber Attack, Texas Bar CLE Cybersecurity Law Workshop (presented with Todd Hindman), Houston, Texas (2/7/18) (slides)

2017 Presentations and Webinars

  • Countdown to GDPR – Compliance for Non-EU Companies, Mackrell International Webinar (12/7/17) (more info)
  • Contracting for Better Cybersecurity, Texas Bar CLE, (12/5/17) (slides)
  • 15 Tech Laws to Protect Your Clients (with Lisa Angelo and Pierre Grosdidier), And Justice for All Seminar, Computer & Technology Section, State Bar of Texas, Austin, Texas (12/1/17)
  • Artificial Intelligence in the Legal and Regulatory Realm — Practical Cybersecurity Risk Management Strategies (with Paul Ferrillo), New Jersey State Bar Association (NJSBA) Cybersecurity Institute (11/17/17) (slides)
  • “The Exchange” Data Privacy and Cybersecurity Forum, Today’s General Counsel (11/15/17)
  • Cybersecurity Fundamentals for Legal Professionals, 55th Annual Conference on Intellectual Property Law, The Institute for Law and Technology (11/13/17) (slides)
  • The Essentials of Cyber Insurance: A Panel of Industry Experts (Moderator, Shawn Tuma; Panelists were Patrick Florer, Mark Knepshield, and John Southrey), North Texas ISSA Conference, Plano, Texas (11/10/17) (slides)
  • Incident Response Planning (with Seth Jaffe), LEO Cybersecurity Law Conference, Tulsa, Oklahoma (11/8/17)
  • What Litigators Need to Know About Cybersecurity & Data Privacy (with Elizabeth Rogers), 41st Annual Page Keeton Civil Litigation Conference (Austin, TX) (11/03/17)
  • The Legal Case for Cybersecurity, SecureWorld – Denver (11/02/17) (slides)
  • Why Your Organization Must Have a Cyber Risk Management Program and How to Develop It, Association of Continuity Professionals, North Texas (10/19/17) (slides)
  • Panel: Guarding the Front DoorSecureWorld – Dallas (10/19/17)
  • The Legal Case for Cybersecurity, Lunch Keynote, SecureWorld – Dallas (10/18/17) (video) (slides)
  • Cybercrime, Cyber Law, Cyber Risk Insurance, Forum Leader – Cyber Future Summit (10/5/17)
  • Legal Issues Associated with Third-Party Cyber Risk, ISACA CSX North America 2017  (Washington D.C.) (10/03/17) (slides)
  • How Cybersecurity is Impacting People’s Rights, Regent University School of Law Symposium on The Expansion of Technology in the 21st Century (9/30/17) (materials)
  • The Legal Case for Cybersecurity, Interface-Dallas (9/7/17) (slides / video)
  • Cybersecurity for Legal Professionals, The Curt B. Henderson American Inn of Court (8/21/17)
  • Cybersecurity: What to Do After the Breach, Advanced In-House Counsel (8/17/17)
  • Cybersecurity Fundamentals for All Organizations, In-House Counsel 101 (8/16/17)
  • Securing IoT Data: Compliance, Privacy, and New Regulations, SecureWorld (webinar panel discussion with Andrew Lance of Thales e-Security, Jay Irwin of Teradata, and Craig Spiezle of the Online Trust Alliance (8/9/17 – Tuma’s slides)
  • YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) webinar (8/7/17 – view webinar)
  • Doomsday: Aftermath – Dealing with PII Loss, 2017 Financial Services Expo – The Future of Finance, Panel with Peter Vogel, Mike Saylor and Tom Stover (8/3/17)
  • Guest Lecturer on The Dark Side of Digital EngagementSMU Digital Marketing Certificate Program(6/27/17)
  • Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm, and Your Law License, State Bar of Texas Annual Meeting 2017 (6/22/17) (slides)
  • Cybersecurity Trends, The Finance Forum (5/25/17)
  • The Consitution, Cybersecurity & Staying Safe Online, Fifth Grade Class @ Morningside Elementary (5/24/17)
  • New York Department of Financial Services Cybersecurity Regulations, Webinar Available Online (view slides) (5/23/17)
  • Legal Risks Associated With Failing To Have A Cyber Incident Response Plan,
    ING3NIOUS 2017 South Central Information Governance Retreat (San Antonio, TX, 5/22/17)
  • National Data Breach Notification Laws Panel Discussion, National Technology Security Coalition (NTSC) Inaugural DC Fly-In (Washington, DC, 5/16/17)
  • Cybersecurity (and Privacy) Issues – Legal and Compliance Issues Everyone in Business Should Know, 2017 FPA DFW Annual Conference (5/11/17) (slides)
  • Privacy and Cybersecurity: How the New Regulations and Guidelines Impact Your Company and You, Women’s In-House Networking – DFW (4/27/17) (download slides)
  • Incident Response: Data Security, InnoTech Dallas (Panel) (4/26/17)
  • Guest Lecturer, Cybersecurity & Data Privacy Law, UNT College of Law (4/22/17)
  • National Data Breach Notification Laws Panel Discussion, National Technology Security Coalition (NTSC) DFW Meeting (4/3/17)
  • Cyber Liability Insurance Counseling and Breach Response, 8th Annual CourseEssentials of Business Law by State Bar of Texas’ Texas Bar CLE (3/10/17) (slides)
  • Cybersecurity for Your Clients: Business Lawyers Advising Business Clients, 8th Annual Course Essentials of Business Law by State Bar of Texas’ Texas Bar CLE (3/10/17) (slides)
  • Cybersecurity for Your Law Firm: Data Security and Data Encryption, 8th Annual Course Essentials of Business Law by State Bar of Texas’ Texas Bar CLE (3/10/17) (slides)
  • Protecting Your IP / Data Security for Software Technology, Intellectual Property Workshop: IP Issues With Technology Startups by State Bar of Texas’ Texas Bar CLE (2/22/17) (slides)
  • Cybersecurity Issues All Lawyers Should Know–Especially Litigators, Dallas Bar Association’s Litigation Section (2/21/17) (slides)
  • Leadership: Legal Counsel’s Role in Guiding Clients Through Cybersecurity and Data Loss, Permian Basin Paralegal Association –  (2/17/17) (slides)
  • Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know — (ISC)² Dallas/Fort Worth Chapter (1/27/17) (slides)
  • Let’s Get This Third Party Started: Cybersecurity Compliance & Third Party Supply Chain Risk Management, Co-presented with Elizabeth Rogers at the Cybersecurity and Data Privacy Law Conference presented by the Institute for Law and Technology (1/15/17) (request slides)
  • Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know, Joint Meeting of Information Systems Audit and Control Association (ISACA) and the Institute of Internal Auditors (IIA) North Texas (1/12/17) (slides)

2016 Presentations and Webinars

  • Guest Lecturer on The Dark Side of Digital Engagement, SMU Digital Marketing Certificate Program (11/29/16)
  • Cyber Law 2016 & Beyond, International Conference on Cyberlaw, Cybercrime & Cybersecurity 2016 (New Delhi, India) (event info) (forthcoming 11/18/16)
  • Government Notification of Breach, 14th Annual Advanced Business Law Conference – TexasBarCLE (11/17/16) (slides)
  • Cloud Based File Management Systems – Panel Discussion along with Ronald L. Chichester and Jerlyn Mardis, 14th Annual Advanced Business Law Conference – TexasBarCLE (11/17/16)
  • Incident Response & Data Security, InnoTech Oklahoma, Oklahoma City (11/1/16)
  • cff-panel-discussionCyber Policy and its Impact on the Global Economy, Cyber Future Foundation‘s Cyber Future Summit 2016 (panel discussion with Brian Engle, Executive Director of the Retail Cyber Intelligence Sharing Center (R-CISC), Shamoil Shipchandler, Regional Director, U.S. Securities and Exchange Commission, Richard Murray, Asst. Special Agent in Charge, Cyber Leader, FBI – Dallas, and David Grubbs, Regulatory & Compliance Director of Garland Power & Light) (10/28/16)
  • Get the FUD Out of Cybersecurity!, ISACA CSX North America 2016  (Las Vegas) (event info) (10/18/16)
  • Cybersecurity Legal Issues Business & IT Leaders Should Know, ISSA North Texas Cyber Security Conference (event info) (slides) (10/8/16)
  • Cybersecurity and Data Privacy Law: What Small Businesses Need to Know, Crossroads Regional Cybersecurity Summit (event info) (10/4/16)
  • Cybersecurity Legal Issues Business & IT Leaders Should Know, SecureWorld – Dallas (event info) (slides) (9/27/16)
  • Cybersecurity Legal Issues: What You Really Need to Know, Tarleton State University Cybersecurity Summit 2016 (event info) (slides) (video)
  • Leadership in Managing Cybersecurity and Data Loss, National Barn & Storage Rental Association’s National Conference (9/8/16)
  • Cybersecurity: Working with Outside Counsel and Outside Vendors, TexasBar CLE Advanced In-House Counsel Seminar (with Jason Smith and Ronald Chichester)
  • Texas Bar TV: State Bar of Texas Annual Meeting, Cybersecurity Law Update (video)
  • Federal Computer Fraud and Abuse Act & Texas Computer Hacking Laws, State Bar of Texas Annual Meeting (Intellectual Property Track) (6/17/16) (slides) (article)
  • Leadership Through the Firestorm: Legal Counsel’s Role in Guiding Clients Through Cybersecurity and Data Loss, State Bar of Texas Annual Meeting (Paralegal Division) (6/17/16) (slides)
  • Corporate Governance Meets Cyber Risk: Not Just the IT Department’s Problem, Questions for Board Members to Ask and Actions to Take, Board Dynamics Breakfast Program Panel Discussion (with John Ansbach, Jarrett Kolthoff, Jack Pfeffer, and Shawn Tuma) (5/4/2016)
  • Cybersecurity: What the GC and CEO Need to Know, Dallas Bar Association Corporate Counsel Section (5/3/2016) (slides)
  • Cybersecurity Nuts and Bolts- What to do in case of a Breach (panel), US India Chamber of Commerce 2016 Annual Technology Conference (4/21/2016) (event information)
  • Cybersecurity & Computer Fraud – The Convergence,  Association of Certified Fraud Examiners (ACFE) Fort Worth Chapter Half-Day Seminar (4/20/2016) (slides)
  • Emerging Cyber Threats and Worldwide Cybersecurity Trends, 5th Annual Cyber Liabilities Insurance ExecuSummit, Uncasville, Connecticut (4/19/16) (event information)
  • Data Security Panel Discussion, InnoTech Dallas (4/6/16) (event information)
  • Cybersecurity: What Defense Lawyers Need to Know About Cyberliability, Cybercrime, and Cyber Insurance Coverage, International Association of Defense Counsel (IADC) (3/23/16) (Tuma’s slides)
  • Cybersecurity & Data Protection: What the GC & CEO Need to Know, GC Netweavers (3/10/16) (PowerPoint Slides / Slide Show)

2015 Presentations and Webinars

  • SecureWorld International Webinar: Data Protection Pitfalls to Avoid, Co-Presenter with Aliki Liadis-Hall (Director of Compliance, North American Bancard), Jason Hart (CTO of Data Protection, Gemalto), Kim L. Jones (SVP & CISO, Vantiv), December 10, 2015
  • Privacy Issues in Structured Settlement Transactions, National Association of Settlement Purchasers (NASP) 2015 Conference, Las Vegas, NV (11/11/15)
  • Cybersecurity Trends – The Evolving Standard of Care for Companies and Management, SMU Law Review’s 23rd Annual General Counsel Symposium (10/30/15)
  • Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and Management, SecureWorld – Dallas Expo (10/28/15) (slides)
  • Cybersecurity Panel, sponsored by WhitleyPenn, Lockton Companies, and Scheef & Stone, L.L.P. (10/27/2015)
  • Data Security and Privacy by Contract: Hacking Us All Into Business Associates, SMU Science & Technology Law Review’s Cybersecurity Symposium (10/23/15) (slides)
  • Above Compliance – Navigating the Cybersecurity Landscape in Financial Services (10/22/15) (slides)
  • Cybersecurity: Mission Impossible?, Sachse, Texas Chamber of Commerce (9/8/15)
  • The CFAA: Is It in Your Game Plan — It’s the Computer Fraud and Abuse Act, Useful Claim or Legal Oddity?, UT Law CLE, Non-Compete Camp 2015 (9/3/15) (slides)
  • Cybersecurity for Middle Market Executives: Bringing Attention to Ways Companies Can Manage Risk Within Their Organization, sponsored by WhitleyPenn, Lockton Companies, and Scheef & Stone, L.L.P. (8/26/2015)
  • Protecting Client Data, State Bar of Texas Annual Meeting San Antonio 2015 (6/19/15) (email to request slides)
  • Provisions of Cybersecurity Insurance Policies, State Bar of Texas Annual Meeting San Antonio 2015 (6/18/15) (slides)
  • Ignite SBOT, State Bar of Texas Annual Meeting San Antonio 2015 (5/18/15) (video)
  • Cybersecurity & Data Protection: Thinking About Risk & Compliance, Corporate Counsel Section, Collin County Bar Association (5/29/15) (slides)
  • Cybersecurity: Mission Impossible?, Murphy, Texas Chamber of Commerce (5/28/15) (slides)
  • Cybersecurity: Strategies for Compliance & Mitigation of Cyber Risk, Collin County Bench Bar Conference 2015 (5/16/15) (slides)
  • Keynote Presenter, The Most Current Cybersecurity Threats: Don’t Be the Next Victim, Annual ACFE Fraud Conference, Association of Certified Fraud Examiners (ACFE) (5/15/15) (slides)
  • Keynote Speaker: Business Cyber Risk: Threats, Compliance & Cyber Insurance, International Association of Insurance Professionals (DFW Chapter) (5/12/15)
  • Social Media Law: Rules, Gotchas, and Key Policies, Hubspot (national webinar) (4/17/15) (slides)
  • What’s Changed in Texas Privacy Law, Why It’s Important, and What Your Office Can Do To Ensure Compliance, Texas Dental Association webinar (4/17/15) (contact for slides)
  • Cybersecurity Threat Intelligence Sharing Panel Discussion with Congressman Michael McCaul, Chair of Homeland Security Committee, Panelist, University of Texas, Austin, Tx (4/9/15)
  • The Dark Net: Healthcare Practice Data at Risk, Texas Dental Association webinar (2/24/15) (contact for slides)
  • Simple Ways to Effectively Use Social Media to Help Build Your Law Practice, Legal Marketing Association (LMA) (webinar with Cordell Parvin) (2/15) (link)
  • Private Presentation on Overview of My Cybersecurity Practice (2/15) (link)
  • Cybersecurity | Data Privacy – The Impact on Your Law Practice, Making Your Practice Work Seminar, Collin County Bar Association (1/29/15) (link)

2014 Presentations and Webinars

  • Private Presentation on Cybersecurity Strategy to Annual Board Meeting of major international corporation, Miami, Fla (12/14)
  • Walking the Straight and Narrow: Strategies to comply with state, federal, and international privacy laws (lawyers panel), Strengthening the Weak Link: Cyber Security Essentials for the C-Suite Conference, North Texas Crime Commission (10/16/14) (link)
  • Keeping Your Healthcare Practice “Off the Hook”  – Is Your Practice “On the Hook” Webinar Series for Texas Dental Association and Oklahoma Dental Association, Smart Training LLC (9/10/14) (slides available upon request)
  • Social Media Law: It is Real and, Yes, Really Can Impact Your Business, Marketing Executives Networking Group (MENG) (national webinar) (8/14/14) (slides)
  • Using Social Media in Your Law Practice, 3rd Annual Outstanding Women Lawyers’ Roundtable (6/6/14) (Prezi)
  • Combating Corporate Espionage, Cyber Fraud and Data Breaches: Case Studies and The Law , Dallas CPA Society Convergence 2014 (5/8/14) (slides available upon request)
  • Combating Cyber Fraud, Data Breaches & Corporate Espionage, Renaissance Executive Forums (5/8/14) (slides)
  • Cyber Fraud, Data Breaches, Corporate Espionage: How They Impact Your Law Practice, Collin County Bench Bar Conference (5/3/14) (Prezi)
  • Using Social Media in Your Law Practice, Collin County Bar Association, General Bar (5/16/14) (Prezi)
  • Using Social Media in Your Law Practice, Collin County Bar Association, Law Practice Management Section (4/28/14) (Prezi)
  • Data Breach! Hacking! Corporate Espionage! — Are You Listening Yet???, Collin County Bar Association, Corporate Counsel Section (4/25/14) (Prezi)
  • Digital Information Law & Your Business, The Alternative Board (4/1/14) (slides)
  • The Legal Side of Data Breach and Third Party Risk, Institute of Internal Auditors (IIA) 9th Annual Fraud Summit (3/28/14) (slides)

2013 Presentations and Webinars

  • Espionage & The Law, Institute of Internal Auditors (IIA) 2nd Annual IIA Super Conference (10/25/13) (slides available upon request)
  • Combating Corporate Espionage – Data Breach (and the law) (10/24/13) (Prezi)
  • The Law Online – Posting Gone Wild!, Parenting PaperLess (slides)
  • Fraud 2.0 – Overview and Update of the Computer Fraud and Abuse Act and a Few Lessons About Data Breaches, Privacy, Data Security, and eCommerce Committee of the State Bar of Texas (8/28/13) (slides)
  • Anatomy of a Data Breach – What To Do When The Unthinkable Occurs, Texas Dental Association & Smart Training LLC (7/31/13) (Prezi)
  • Fraud 2.0 – Helping Businesses Prepare for Computer Fraud and Data Breaches, The IMA – Association of Accountants and Financial Professionals in Business (5/16/13) (slides)
  • The Dark Side of Social Media, 1st Tuesday Connections (4/13)
  • Social Media Law, PlayMaker’s Radio Talk Show (3/13) (audio recording)

2012 Presentations and Webinars

  • Social Media Law – It is Real and, Yes, Really Can Impact Your Business, MENG – Marketing Executives Networking Group (11/9/12) (slides)
  • Fraud 2.0 – An Overview of the Laws that Help Businesses and Individuals Combat Computer Fraud, Association of Certified Fraud Examiners (ACFE) (11/8/12) (slides)
  • Social Media Law – It is Real and, Yes, Really Can Impact Your Business, Social Media Breakfast – Dallas (8/30/12) (video)
  • Social Media Law – The Legal Do’s and Don’ts of Social Media, TrustPoint Management Group (8/10/12) (slides)
  • The Evolving Computer Fraud and Abuse Act – An Overview and Update of Recent Activity, Dallas Bar Association Computer Law Section (4/23/12) (slides)

Older Presentations and Webinars

  • Computer Fraud and Abuse Act – A Lunch Sampler With a Little Something for Everyone, Dallas Bar Association Computer Law Section (8/22/11) (slides)

Very early presentations – just for fun!

  • Internet Law: An Expedition (2/20/2001) (slides)
  • E-Contracting: The Basic Rules (2/2/2001) (slides)
  • Contracting Over the Internet, B2B and B2C E Commerce Seminar (Feb. 2000)
  • e-Government 2000 Fall Forum – Municipalities & The Internet (Fall 2000) (paper)
  • Shifting Paradigms: Practicing Law in the Information Age – A Post-Y2K Analysis of Y2K Litigation (4/1/2000)
  • Contracting Over the Internet in Texas, Dallas Bar Association (Feb. 2000)