Selected Presentations
Since the late ’90s, I have had the pleasure of being invited to speak on a variety of legal topics, many of which have included legal issues related to developing technology. These topics have included the creation and enforceability of electronic contracts and signatures, issues surrounding the Y2K concerns (that never really came to pass), employee Internet use policies for businesses and other organizations, and methods for using the Internet and other technology for increasing the profitability of existing businesses. More recently, I have given several presentations on cybersecurity, data protection, cyber risk, data breaches, cyber insurance, and computer fraud. The following are some of my recent presentations with links to the presentation slides (where available):
2023 Presentations, Webinars & Podcasts
- Twists and Turns: Cybersecurity and Privacy Update, WorkSmarts Half-Day Seminar, Spencer Fane Webinar
- Ransomware & Cybersecurity — Risk Management Planning to Better Protect Against and Response to These and Other Cyber Attacks, Association of Corporate Counsel – Colorado Chapter (with Jeremy Rucker)
- Protecting Your Firm and Clients Against Cyber Attacks and Ransomware, Collin County Bar Association
- What’s Next in the Tech Industry, Weaver – Technology Industry Practice Group Annual Meeting
- Ethical Use of Technology, 9th Annual Oil and Gas Disputes Course, TexasBar CLE
- Elevate Xchange DFW Community New Year Roundtable Forum, Data Protection / Cyber Insurance
2022 Presentations, Webinars & Podcasts
- Implementing Recognized Security Practices is Important to Your Practice, Texas Medical Liability Trust (TMLT) Webinar (video)
- Using Cyber Insurance as Part of Your Incident Response Preparation, Gallagher Cyber Risk Services Team
- Enhancing Your Cybersecurity with Cyber Insurance, A Fireside Chat with Critical Start, Microsoft, and Spencer Fane (video 1, video 2, video 3)
- Expert Panel: Cyber Risk Insurance Trends, Microsoft Security Team (with Steve Anderson, Sean Scranton)
- The Dark Side of Digital Engagement, SMU Digital Marketing and Branding Class (guest lecturer, with Natalie Washington)
- Highlights from the State Bar of Texas’ 2022 Year in Review, State Bar of Texas Podcast (with Rocky Dhir, Emily Black, and Roland Love)
- Cyber Due Diligence in Mergers and Acquisitions: Finding Risks, 6th Annual Technology and Justice for All CLE, Computer and Technology Section, State Bar of Texas
- Vita-Learn’s Vermont Fest, K12 SIX Incident Response Planning Workshop for Vermont School Districts
- Northern Trust’s (St. Louis) Cybersecurity Luncheon, with SpearTip and United States Secret Service
- Cyber Risk Insurance Trends, 2022 Global Resilience Federation’s GRF Summit on Security & Third-Party Risk (with Nick Jennings (AON), Mark Orsi (GRF), and Sean Scranton (WTW))
- Cover Your Cyber Assets, SecureWorld Dallas (with Steve Anderson, Sean Scranton)
- Expert Panel: Cyber Risk Insurance Trends, SETDA (with Steve Anderson, Sean Scranton)
- How Does Cyber Insurance Impact Your Incident Response Preparation? (Session 1) and Panel Discussion – What Technologies Assist in Obtaining Cyber Insurance? (Session 2), Ultimate IT Security’s Cyber Insurance Summit
- Best Practices for Cyber Liability Insurance Renewals: A Roundtable Discussion with IDMWORKS and CyberRes (Webinar)
- Ransomware & Cybersecurity – Risk Management Planning to Better Protect Against and Respond to These and Other Cyber Attacks (Presentation & Workshop) (Spencer Fane LLP CLE, Phoenix, AZ)
- Cybersecurity & Privacy, International Show Caves Association & National Caves Association Congress 2022 (with Matt Ross)
- Ransomware & Cybersecurity – Risk Management Planning to Better Protect Against and Respond to These and Other Cyber Attacks (Presentation & Workshop), Kansas City Manufacturing Network
- The Weakest Link? Legal Malpractice Exposure for Cybersecurity Incidents, Cybersecurity and Data Privacy Law Conference, The Center for American and International Law (with Jason R. Jobe, Professor Vincent R. Johnson, Joyvan Malbon-Griffin)
- Can Cyber Investigations Be Canned? Unauthorized Access Podcast
- Data Privacy and Cybersecurity Issues GCs Should Know, General Counsel & Chief Legal Officer Summit: Legal Leadership 2022 (with Dan Lantry, Ian C. Ballon, Paul Lanois)
- Practical Steps to Build a Knockout Personal Brand, EDRM Webinar (with Helen Geib, Cristin Traylor, Doug Austin & Kaylee Walstad) (video)
- Incident Response Workshop: What Schools Need to Know and Do Before and After a Cyber Attack, Education Service Center Region 11 and K12SIX
- Incident Response Workshop: What Your School Needs to Know and Do After a Cyber Attack, Connect by Veracross (event page)
- Cybersecurity Risks for Tribal Lending Entities, Wolf River Development Company 1st Annual Tribal Lending Summit
- Cyber Breach Crisis Management Workshop, 57th Academy of American and International Law, Southwestern Institute for International and Comparative Law
- Ransomware & Cybersecurity – Risk Management Planning to Better Protect Against and Respond to These and Other Cyber Attacks (Presentation & Workshop) (Spencer Fane LLP CLE, Springfield, MO)
- The Evolving Roles of Claims Professionals & Breach Coaches in Incident Response, NetDiligence Cyber Risk Summit – Philadelphia (on-demand Presentation)
- Law & Order – Cybersecurity, EVANTA Dallas CISO Executive Summit (slides)
- Ransomware – Resilience Planning to Better Protect Your Practice and Your Clients, State Bar of Arizona’s Tech Tuesday Series 2022 (on-demand CLE)
- A Discussion in Cyber Law: Advancing an Open, Reliable & Secure Digital Economy — Global Ties Arizona & U.S. Dept. of State International Visitor Leadership Program
- The Problem with Email? Texas Medical Liability Trust (TMLT) Webinar Series (video)
- The Above Board Show: Security Incidents and Your Board (Videos – Part 1, Part 2, Part 3)
- Breaches: Is Anyone Learning Anything? Down the Security Rabbithole Podcast
- Panel: Anatomy of a Cyber Incident, 10th Annual Cyber Liability Insurance ExecuSummit (with David Rock, Richard Sheridan, Greg Kelley)
- Expert Panel: Cyber Risk Insurance Trends, Second Annual K-12 Six Cybersecurity Leadership Symposium (with Steve Anderson, Nick Jennings, Jeff Johnston, Jeff Shaffer) On-Demand Video
- Who’s In Charge, You or Your Cyber Insurance Carrier? (with Jaime Simpson)
- Texas Cybersecurity Legislation and Law Panel (with Giovanni Capriglione, Eric Lankford, and Mike Saylor)
- Master Class: Data Protection, Cybersecurity, and Cyber Risk Management Programs, UT LAW CLE’s Nonprofit Organizations Institute (slides) (written materials)
2021 Presentations, Webinars & Podcasts
- Cyber Insurance: Driving the Future of Cybersecurity Improvements, SecureWorld West Coast (with Steve Anderson and Sean Scranton)
- Keynote: Cyber Insurance: Driving the Future of Cybersecurity Improvements, SecureWorld Rockies (with Steve Anderson and Sean Scranton)
- Understanding the Need for Cyber Insurance and How It Impacts Incident Response Preparation, Bank Legal Risk Management Conference Virtual Series, Missouri Bankers Association (with Travis Holt, Brush Creek Partners)
- Shawn Tuma moderated the Incident Response Discussion of SecureWorld Advisory Council Roundtable at SecureWorld Texas Virtual Conference.
- Protecting Your Practice Against and Responding to Ransomware Attacks, TMLT Webinar Series (slides)
- Cyber Insurance Is A Must-Have, But What Must Companies Do To Get Coverage And How Is The Process Helping Improve Their Cybersecurity? An Insurtech, Underwriter, And Lawyer Explain (with Steve Anderson and Sean Scranton), 5th Annual Institute of Law and Technology’s Cybersecurity and Data Privacy Law Conference
- The Legal, Financial and Reputational Impact of Ransomware Against the OMS Practice, OMSNIC Webinar
- Introduction to Cybersecurity & Data Privacy, Privacy in 2021 CLE Jointly organized by the Civil Liberties & Civil Rights, Corporate Counsel, and Computer and Technology Sections (with Elizabeth Rogers)
of the State Bar of Texas - Protecting Your Organization Against Ransomware Attacks (and Other Cyber Risks), Corporate Counsel Section, Collin County Bar Association (Cybersecurity & Ransomware Presentation Materials)
- Cybersecurity with Shawn Tuma, The Insiders on Real Estate & Marketing Podcast (video)
- Can You Do Business With Only a Tablet and Pencil? What You Must Know About Ransomware, Cybersecurity & Data Breaches, Bare Comp 2021 (Kansas City, MO) (Bare Comp 2021 slides)
- Cybersecurity, Cyber Risk Management, Cyber Incident Response, and Ransomware Attacks, Texas Bar CLE’s In-House Counsel 101 Course (with Yolanda Brown)
- Mitigate: Know Where Your Team Is Tied Into The Compliance Program, Cybersecurity Collaborative Webinar: Integrating Compliance Programs Across the Organization
- Ransomware Response and Recovery Efforts, 2021 Essential Cybersecurity Law, University of Texas School of Law CLE
- Cyber Insurance Fact vs Fiction (video on YouTube), #DtSR Podcast Episode 454 – Down the Security Rabbithole (with Sean Scranton and Raf Los)
- Protecting Your Firm and Clients Against Cyber-Attacks and Ransomware, Texas Bar College 23rd Annual Summer School (Slides)
- Cyber Insurance and Law, Washington University Cybersecurity Roundtable, Security Advisor Alliance
- So You’ve Been Hacked, Now What?, Reimagining Cyber Podcast (blog / direct audio)
- You Got Hacked, Now What? Armor Cloud Security Webinar (with Carlin Dornbusch, CISSP and Joone Jijjar)
- Crisis Management: Responding to a Data Breach, Institute for Law and Technology (with Mark Michels, Alex de Alvarez, CISM, Robert Glaser, Shawn Morgan, and Micah Skidmore)
- TPA Tuma on A Watershed Moment for US Cyber with the Colonial Pipeline Ransomware Attack, #DtSR Podcast Episode 449 – Down the Security Rabbithole
- Anatomy of a Data Breach Panel (with Michael Phillips, Chief Claims Officer, Resilience Cyber Insurance Solutions), 9th Annual Cyber Liability Insurance ExecuSummit, Uncasville, CT
- Hot Cyber Litigation Issues Panel (with John H. Goselin II and Tim Zeilman), 9th Annual Cyber Liability Insurance ExecuSummit, Uncasville, CT
- Digital Extortion Drama: Deconstructing the Ransomware Response Lifecycle (Closing Keynote), SecureWorld – Central (audio Podcast / slides)
- The Internet of Things (IoT) Panel (with Peter Vogel, Victoria E. Beckman, and Elizabeth Rogers), Tech Summit II, Institute for Law and Technology
- Digital Extortion Drama: Deconstructing the Ransomware Response Lifecycle (Closing Keynote), SecureWorld – Boston (audio Podcast / slides)
- Critical Planning: Timeline and Lifecycle of Responding to a Ransomware Attack, INTERFACE Dallas Oklahoma 2021
- Guest Lecturer, Data Privacy & Cybersecurity class, SMU Dedman School of Law
- Cybersecurity and the Law- Expert Panel Discussion, Data Connectors Boston Cybersecurity Summit (panel with Vanessa Henri, Jake Bernstein, Scott Giordano, Diane Reynolds)
- Guest Lecturer, InfoSec Laws & Compliance, Georgetown University Graduate Program, Cybersecurity Risk Management
- 5 Things Your Breach Response Attorney Needs You to Know Before an Incident, Webinar sponsored by Lightstream (with Raf Los) (registration to access video recording)
2020 Presentations and Webinars
- Ransomware – a True Existential Threat to Your Practice!, 4th Annual Technology and Justice for All CLE: Vaccinating Your Technology Tools for Practice in a Pandemic (with Lavonne Hopkins, Sr. Legal Director – Cybersecurity, Product & App Security, IT Security at Dell Technologies
Brett Leatherman, Supervisory Special Agent at the Federal Bureau of Investigation) - Guest Lecturer, Incident Response Planning – Lifecycle of Responding to and Recovering from a Ransomware Attack, Technology and the Law, Columbia University Executive Master of Technology Management (slides forthcoming)
- Cybersecurity is a Team Sport, Northwestern State University’s Fall Continuing Legal Education Conference (slides)
- Reimagine Your Company Operating Again After a Ransomware Attack — The Lifecycle of a Ransomware Attack and Recovery, Dallas Baptist University, Reimagine – Technology Conference (slides)
- Guest Lecturer, Cyber Incident Response – Recovering from a Ransomware Attack, Cybersecurity Management Master’s Program, Sever Institute, McKelvey School of Engineering, Washington University of St. Louis
- Lawyers’ Ethical Obligations for Cybersecurity & Privacy, Tarrant County Family Law Bar Association
- Cyber Law Panel. Cyber Future Foundation’s 5th Annual Cyber Future Summit (with Alex Urbelis, Robert Carolina, Peter Vogel, Linda Klein, and Bob Seeman)
- Unboxing a phishing email from the World Health Organization with Shawn Tuma, “Can I Be Phished? Podcast”
- Guest Lecturer, The Dark Side of Digital — What Could Go Wrong in Social Media and Marketing?, SMU Digital Branding Class (slides)
- The Ever-Evolving Threat Landscape, SecureWorld Remote Session (with Roy Wattanasin and Rick Holland)
- Using Cyber Insurance In Incident Response Planning And Preparation, The Center for American and International Law’s 4th Annual Cybersecurity and Data Privacy Law Conference (with Steven Anderson of QBE North America, and Jarrett Kolthoff of SpearTip)
- Down the Security Rabbithole #DtSR Podcast, Episode 410, TPA CISO Accountability Problems
- Cybersecurity Issues for Local Governments, National Business Institute (NBI) Webinar
- Incident Response Lessons Learned – Webinar with CoNetrix (with Russ Horn and Joe Guerrero)
- Down the Security Rabbithole #DtSR Podcast, Episode 408, Shawn Tuma Cyber Superhero
- Understanding Cyber Insurance and How It Impacts Your IR Planning, Advanced In-House Counsel Course 2020, TexasBarCLE (with Kara Altenbaumer-Price, Esq.)
- Integrating Compliance Programs Across the Organization, A Cybersecurity Collaborative Virtual Briefing, Cybersecurity Collaborative (webinar)
- Cybersecurity Forum: Lessons learned in cybersecurity, Tech Titans (with Harvey Ewing, CIO of MoneyGram International, and Jarrett Kolthoff, CEO of SpearTip)
- Privacy Compliance Program Implementation, International Symposium on Data Privacy, Institute for Law and Technology (with Wendy Bozzolasco and Lisa Fredrichs)
- Cybersecurity Legal Issues in the Heart of the Covid-19 Pandemic (Avant Technology Insights with Ken Presti podcast) (see post)
- Understanding How Cyber Insurance Impacts Your Incident Response Planning (SecureWorld Webinar / related article)
- FBI Dallas Citizens Academy Alumni Association (FBIDCAAA) Cyber Risk Update
- When Disaster Strikes Part 3: What Happens Next? After the Event…, North Dallas Chamber of Commerce Small Business Seminar
- Guest Lecturer, Data Privacy & Cybersecurity class, SMU Dedman School of Law
- Data privacy in analytics during the COVID-19 pandemic: How do we balance privacy vs. the need for information?, Tech Titans (with Paola Saibene, CEO, Quartus Factor)
- Corporate Cybersecurity and You: Addressing Cybersecurity & Privacy Threats, Financial Executives International (FEI) – Dallas Chapter (with Michelle Chia, Zurich North America, Jonathan Funderburg, Amegy Bank, Paul King, USI Insurance Services)
- Cybersecurity is a Team Sport, Northwestern State University School of Business
- The Role of Contracts in Privacy, Cybersecurity, and Data Breach, Making and Breaking Ironclad Contracts, Texas Bar CLE (slides)
2019 Presentations and Webinars
- HIPAA Compliance 101: Requirements for Covered Entities, Business Associates, and more, National Business Institute (NBI), Eau Claire, WI (with Jeffery P. Drummond and Jamie Sorley)
- Securing and Protecting the Fort, Your Duty of Technical Competence — 3rd Annual Technology and Justice for All CLE, State Bar of Texas Computer & Technology Section (with Al Harrison, Seth Jaffee, Elizabeth Rogers)
- Adapting in Times of Uncertainty, Cybersecurity Collaboration Forum Best Practice Exchange (with KC Condit, Jason Cowlishaw, Anand Singh)
- Creating & Maintaining Trust — Privacy & Security in Health IT, Medecision Liberation Live! (with Fred Bazzoli, Gerry Miller, Wayne Reynolds)
- Cybersecurity is a Team Sport (Lunch Keynote), SecureWorld – Dallas (slides)
- Incident Response Panel Discussion, SecureWorld – Dallas (with Patrick Benoit, Jon Allen, Jonathan Tock, and Thomas Moore)
- The Dark Side of Digital — What Could Go Wrong in Social Media and Marketing?, SMU Digital Branding Class
- Cybersecurity Risk Panel, Dallas Baptist University Tech Symposium (with Harold Collum, Val Mukherjee, and Chad Thiemann)
- Cyberlaw & Cyber Arbitration, Cyber Future Summit 2019 (with Peter Vogel and Johnny G. Lee)
- Cyber Incident Response and Recovery, Cyber Future Summit 2019 (with Jeff Shaffer and John Browning)
- A Cyber Attack: How it Starts, What to Do, and How to Recover, Technology Summit, Dallas Bar Association (with Chad Pinson, Sara Romine, and Lance Sloves)
- Crisis Management: Responding to a Data Breach (Live Simulation), The Center for American and International Law’s 3rd Cybersecurity and Data Privacy Law Conference
- Making Sure It’s Covered: Cyber Insurance — What are the Practical Things In-House and Outside Attorneys Need to Know?, The Center for American and International Law’s 3rd Cybersecurity and Data Privacy Law Conference (with John Loftus, Senior Vice President — Cyber Security & Privacy Risk, Willis Towers Watson (broker perspective), Steven Anderson, Vice President, Product Leader — Cyber, QBE North America (underwriter and carrier perspective), Matthew Ross, Claims Director, CNA Insurance (claims perspective), and Michelle Mellon-Werch, Assistant General Counsel, Texas Municipal Retirement System (in-house counsel perspective)
- Sharing the Load: What are Chief Privacy Officers, Chief Information Security Officers, and General Counsel Doing in Real Life to Divide Up Roles and Responsibilities?, The Center for American and International Law’s 3rd Cybersecurity and Data Privacy Law Conference (with Manoj Satnaliwala, Dr. Anand Singh, Jillian Welch, Jarrett Kolthoff)
- Current Issues and Trends in Cyber Liability, The Institutes CPCU Society’s All Industry Day 2019 (with Shelly Thomas of RLI Insurance Company)
- Cybersecurity and Data Privacy: Incident Response in the Real World, 18th Annual Advanced In-House Counsel Course (with John Ansbach of AON), San Antonio, Texas
- 15 Tech Cases and Statutes Every Lawyer Should Know About, Annual Meeting of the State Bar of Texas, Austin, Texas
- Cybersecurity Considerations for the Law Office and Your Client, Collections and Creditors Rights Course 2019, Texas Bar CLE
- Lawyers’ Ethical Obligations for Cybersecurity, Collin County Bench Bar Conference
- Lunch Keynote: Why Teams, Strategies, and Processes are Essential for Managing Cyber Risk, SecureWorld Houston
- Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to Manage Cyber Risk, Oklahoma State University’s Spears School of Business Management’s 4th Annual Cyber Security Conference in Oklahoma City, Oklahoma (slides)
- Cybersecurity: Disruption, Risk, and Response, Regent University 2nd Annual Alumni Leadership Forum
- Cybersecurity: Real World Cyber Risk Management for Your Clients, 10th Annual Essentials of Business Law: Practical Considerations, Texas Bar CLE
- Real World Cyber Risk. Understand It. Manage It., Renaissance Executive Forums CEO Summit (slides)
- NextGen Business Email Compromise and How to Defend Against BEC, SecureWorld Webinar (with Eric Kron and Rebecca Rakoski) (article and webinar link)
2018 Presentations and Webinars
- 15 Tech Laws and Cases to Protect Your Clients, Disaster Proofing Your Practice (with Pierre Grosdidier and Lisa Angelo)
- The Legal Case for Cyber Risk Management Programs and What They Should Include, TSCPA 2018 CPE Expo Conference (slides)
- Cybersecurity, 16th Annual Advanced Business Law Course (slides)
- Cybersecurity, 41st Annual Advanced Civil Trial Course
- Vendor Risk Management: Maintaining Relationships While Limiting Liability, International Association of Privacy Professionals (IAPP) Privacy.Security.Risk Conference (with Mark Smith, Tami Dokken, and Melissa Krasnow)
- Cybersecurity is a Team Sport: Why strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams, SecureWorld Dallas (slides)
- Cybersecurity: Cyber Risk Management for Banks & Financial Institutions, Texas Association of Bank Counsel 42nd Annual Convention (slides)
- Regulatory and Ethical Considerations for Handling Sensitive Electronic Information, 13th Annual UT Law Advanced Texas Administrative Law Seminar (with Adrian Senyszyn)
- Data Privacy/GDPR Compliance and Security, 17th Annual Advanced In-House Counsel Conference (with John Trevino)
- The Use of Social Media in the Courtroom, State Bar of Texas Annual Meeting (with Judge Emily Miskel and John Browning)
- 15 Tech Laws and Cases to Protect Your Clients, State Bar of Texas Annual Meeting (with Pierre Grosdidier and Lisa Angelo)
- Something is Phishy: Cyber Security Scams & How to Avoid Them, State Bar of Texas Annual Meeting (with Reginald A. Hirsch)
- Cybersecurity and Trade Secrets (Panel), Center for American and International Law Symposium on Global Markets
- Cybersecurity Fundamentals for Legal Professionals (and every other business), Mid-Year Meeting of the Oklahoma Bar Association Intellectual Property Law Section (slides)
- NYDFS Cybersecurity Regulations – 23 NYCRR Part 500, Webinar with McAfee and CDW (slides)
- Cybersecurity Law Update (with Jeremy Rucker), Collin County Bench Bar Conference (slides)
- The Legal Case for Cyber Risk Management Programs and What They Should Include (with Jay Johnson, Jones Day), ISMG’s Data Breach & Fraud Prevention Summit (video, available with registration)
- Cyber Risk Management and Attorney-Client Privilege in Cybersecurity, Security Weekly Podcast – Episode #81 (video)
- What is Reasonable Cybersecurity? Security Weekly Podcast – Episode #76 (video)
- Cybersecurity Fundamentals for Legal Professionals, Klemchuk LLP’s 14th Annual Ethics CLE Presentation (blog with slides)
- Effective Cybersecurity for Small and Midsize Companies, Center for American & International Law’s Second Annual Cybersecurity & Data Privacy Law Conference, Plano, TX (4/13/18) (slides)
- A Glove’s Off Discovery Fight — What’s the Truth About Attorney-Client Privilege in Cybersecurity (with Jay Johnson, Jones Day), Center for American & International Law’s Second Annual Cybersecurity & Data Privacy Law Conference, Plano, TX (4/13/18)
- What CISO’s Need to Know About the Legal Side of Cyber Risk Management Programs, CISO Summit, Miami, FL (3/26/18)
- The Legal Case for Cyber Risk Management, InfoSec World -Privacy & Risk Summit, Orlando, FL (3/22/18) (slides)
- The Legal Case for Cyber Risk Management Programs and What They Should Include, The American Institute of Architects’ Large Firm Round Table (3/15/18) (slides)
- “What Could Go Wrong?” – We’re Glad You Asked!, Social Media Breakfast – Dallas (2/22/18) (slides)
- Introduction to Cybersecurity, The Alliance – Cybersecurity Converge Tour (Dallas) for the Frisco Independent School District (2/21/18) (more info)
- The Legal Case for Cybersecurity: Implementing and Maturing a Cyber Risk Management Program, State Bar of Texas Women and the Law Section (2/15/18) (slides)
- Cybersecurity: How to Protect Your Firm from a Cyber Attack, Texas Bar CLE Cybersecurity Law Workshop, Houston, Texas (2/7/18) (slides)
- Data Breach Incident Response – Recovering from a Cyber Attack, Texas Bar CLE Cybersecurity Law Workshop (presented with Todd Hindman), Houston, Texas (2/7/18) (slides)
2017 Presentations and Webinars
- Countdown to GDPR – Compliance for Non-EU Companies, Mackrell International Webinar (12/7/17) (more info)
- Contracting for Better Cybersecurity, Texas Bar CLE, (12/5/17) (slides)
- 15 Tech Laws to Protect Your Clients (with Lisa Angelo and Pierre Grosdidier), And Justice for All Seminar, Computer & Technology Section, State Bar of Texas, Austin, Texas (12/1/17)
- Artificial Intelligence in the Legal and Regulatory Realm — Practical Cybersecurity Risk Management Strategies (with Paul Ferrillo), New Jersey State Bar Association (NJSBA) Cybersecurity Institute (11/17/17) (slides)
- “The Exchange” Data Privacy and Cybersecurity Forum, Today’s General Counsel (11/15/17)
- Cybersecurity Fundamentals for Legal Professionals, 55th Annual Conference on Intellectual Property Law, The Institute for Law and Technology (11/13/17) (slides)
- The Essentials of Cyber Insurance: A Panel of Industry Experts (Moderator, Shawn Tuma; Panelists were Patrick Florer, Mark Knepshield, and John Southrey), North Texas ISSA Conference, Plano, Texas (11/10/17) (slides)
- Incident Response Planning (with Seth Jaffe), LEO Cybersecurity Law Conference, Tulsa, Oklahoma (11/8/17)
- What Litigators Need to Know About Cybersecurity & Data Privacy (with Elizabeth Rogers), 41st Annual Page Keeton Civil Litigation Conference (Austin, TX) (11/03/17)
- The Legal Case for Cybersecurity, SecureWorld – Denver (11/02/17) (slides)
- Why Your Organization Must Have a Cyber Risk Management Program and How to Develop It, Association of Continuity Professionals, North Texas (10/19/17) (slides)
- Panel: Guarding the Front Door, SecureWorld – Dallas (10/19/17)
- The Legal Case for Cybersecurity, Lunch Keynote, SecureWorld – Dallas (10/18/17) (video) (slides)
- Cybercrime, Cyber Law, Cyber Risk Insurance, Forum Leader – Cyber Future Summit (10/5/17)
- Legal Issues Associated with Third-Party Cyber Risk, ISACA CSX North America 2017 (Washington D.C.) (10/03/17) (slides)
- How Cybersecurity is Impacting People’s Rights, Regent University School of Law Symposium on The Expansion of Technology in the 21st Century (9/30/17) (materials)
- The Legal Case for Cybersecurity, Interface-Dallas (9/7/17) (slides / video)
- Cybersecurity for Legal Professionals, The Curt B. Henderson American Inn of Court (8/21/17)
- Cybersecurity: What to Do After the Breach, Advanced In-House Counsel (8/17/17)
- Cybersecurity Fundamentals for All Organizations, In-House Counsel 101 (8/16/17)
- Securing IoT Data: Compliance, Privacy, and New Regulations, SecureWorld (webinar panel discussion with Andrew Lance of Thales e-Security, Jay Irwin of Teradata, and Craig Spiezle of the Online Trust Alliance (8/9/17 – Tuma’s slides)
- YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) webinar (8/7/17 – view webinar)
- Doomsday: Aftermath – Dealing with PII Loss, 2017 Financial Services Expo – The Future of Finance, Panel with Peter Vogel, Mike Saylor and Tom Stover (8/3/17)
- Guest Lecturer on The Dark Side of Digital Engagement, SMU Digital Marketing Certificate Program(6/27/17)
- Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm, and Your Law License, State Bar of Texas Annual Meeting 2017 (6/22/17) (slides)
- Cybersecurity Trends, The Finance Forum (5/25/17)
- The Consitution, Cybersecurity & Staying Safe Online, Fifth Grade Class @ Morningside Elementary (5/24/17)
- New York Department of Financial Services Cybersecurity Regulations, Webinar Available Online (view slides) (5/23/17)
- Legal Risks Associated With Failing To Have A Cyber Incident Response Plan,
ING3NIOUS 2017 South Central Information Governance Retreat (San Antonio, TX, 5/22/17) - National Data Breach Notification Laws Panel Discussion, National Technology Security Coalition (NTSC) Inaugural DC Fly-In (Washington, DC, 5/16/17)
- Cybersecurity (and Privacy) Issues – Legal and Compliance Issues Everyone in Business Should Know, 2017 FPA DFW Annual Conference (5/11/17) (slides)
- Privacy and Cybersecurity: How the New Regulations and Guidelines Impact Your Company and You, Women’s In-House Networking – DFW (4/27/17) (download slides)
- Incident Response: Data Security, InnoTech Dallas (Panel) (4/26/17)
- Guest Lecturer, Cybersecurity & Data Privacy Law, UNT College of Law (4/22/17)
- National Data Breach Notification Laws Panel Discussion, National Technology Security Coalition (NTSC) DFW Meeting (4/3/17)
- Cyber Liability Insurance Counseling and Breach Response, 8th Annual CourseEssentials of Business Law by State Bar of Texas’ Texas Bar CLE (3/10/17) (slides)
- Cybersecurity for Your Clients: Business Lawyers Advising Business Clients, 8th Annual Course Essentials of Business Law by State Bar of Texas’ Texas Bar CLE (3/10/17) (slides)
- Cybersecurity for Your Law Firm: Data Security and Data Encryption, 8th Annual Course Essentials of Business Law by State Bar of Texas’ Texas Bar CLE (3/10/17) (slides)
- Protecting Your IP / Data Security for Software Technology, Intellectual Property Workshop: IP Issues With Technology Startups by State Bar of Texas’ Texas Bar CLE (2/22/17) (slides)
- Cybersecurity Issues All Lawyers Should Know–Especially Litigators, Dallas Bar Association’s Litigation Section (2/21/17) (slides)
- Leadership: Legal Counsel’s Role in Guiding Clients Through Cybersecurity and Data Loss, Permian Basin Paralegal Association – (2/17/17) (slides)
- Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know — (ISC)² Dallas/Fort Worth Chapter (1/27/17) (slides)
- Let’s Get This Third Party Started: Cybersecurity Compliance & Third Party Supply Chain Risk Management, Co-presented with Elizabeth Rogers at the Cybersecurity and Data Privacy Law Conference presented by the Institute for Law and Technology (1/15/17) (request slides)
- Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know, Joint Meeting of Information Systems Audit and Control Association (ISACA) and the Institute of Internal Auditors (IIA) North Texas (1/12/17) (slides)
2016 Presentations and Webinars
- Guest Lecturer on The Dark Side of Digital Engagement, SMU Digital Marketing Certificate Program (11/29/16)
- Cyber Law 2016 & Beyond, International Conference on Cyberlaw, Cybercrime & Cybersecurity 2016 (New Delhi, India) (event info) (forthcoming 11/18/16)
- Government Notification of Breach, 14th Annual Advanced Business Law Conference – TexasBarCLE (11/17/16) (slides)
- Cloud Based File Management Systems – Panel Discussion along with Ronald L. Chichester and Jerlyn Mardis, 14th Annual Advanced Business Law Conference – TexasBarCLE (11/17/16)
- Incident Response & Data Security, InnoTech Oklahoma, Oklahoma City (11/1/16)
Cyber Policy and its Impact on the Global Economy, Cyber Future Foundation‘s Cyber Future Summit 2016 (panel discussion with Brian Engle, Executive Director of the Retail Cyber Intelligence Sharing Center (R-CISC), Shamoil Shipchandler, Regional Director, U.S. Securities and Exchange Commission, Richard Murray, Asst. Special Agent in Charge, Cyber Leader, FBI – Dallas, and David Grubbs, Regulatory & Compliance Director of Garland Power & Light) (10/28/16)
- Get the FUD Out of Cybersecurity!, ISACA CSX North America 2016 (Las Vegas) (event info) (10/18/16)
- Cybersecurity Legal Issues Business & IT Leaders Should Know, ISSA North Texas Cyber Security Conference (event info) (slides) (10/8/16)
- Cybersecurity and Data Privacy Law: What Small Businesses Need to Know, Crossroads Regional Cybersecurity Summit (event info) (10/4/16)
- Cybersecurity Legal Issues Business & IT Leaders Should Know, SecureWorld – Dallas (event info) (slides) (9/27/16)
- Cybersecurity Legal Issues: What You Really Need to Know, Tarleton State University Cybersecurity Summit 2016 (event info) (slides) (video)
- Leadership in Managing Cybersecurity and Data Loss, National Barn & Storage Rental Association’s National Conference (9/8/16)
- Cybersecurity: Working with Outside Counsel and Outside Vendors, TexasBar CLE Advanced In-House Counsel Seminar (with Jason Smith and Ronald Chichester)
- Texas Bar TV: State Bar of Texas Annual Meeting, Cybersecurity Law Update (video)
- Federal Computer Fraud and Abuse Act & Texas Computer Hacking Laws, State Bar of Texas Annual Meeting (Intellectual Property Track) (6/17/16) (slides) (article)
- Leadership Through the Firestorm: Legal Counsel’s Role in Guiding Clients Through Cybersecurity and Data Loss, State Bar of Texas Annual Meeting (Paralegal Division) (6/17/16) (slides)
- Corporate Governance Meets Cyber Risk: Not Just the IT Department’s Problem, Questions for Board Members to Ask and Actions to Take, Board Dynamics Breakfast Program Panel Discussion (with John Ansbach, Jarrett Kolthoff, Jack Pfeffer, and Shawn Tuma) (5/4/2016)
- Cybersecurity: What the GC and CEO Need to Know, Dallas Bar Association Corporate Counsel Section (5/3/2016) (slides)
- Cybersecurity Nuts and Bolts- What to do in case of a Breach (panel), US India Chamber of Commerce 2016 Annual Technology Conference (4/21/2016) (event information)
- Cybersecurity & Computer Fraud – The Convergence, Association of Certified Fraud Examiners (ACFE) Fort Worth Chapter Half-Day Seminar (4/20/2016) (slides)
- Emerging Cyber Threats and Worldwide Cybersecurity Trends, 5th Annual Cyber Liabilities Insurance ExecuSummit, Uncasville, Connecticut (4/19/16) (event information)
- Data Security Panel Discussion, InnoTech Dallas (4/6/16) (event information)
- Cybersecurity: What Defense Lawyers Need to Know About Cyberliability, Cybercrime, and Cyber Insurance Coverage, International Association of Defense Counsel (IADC) (3/23/16) (Tuma’s slides)
- Cybersecurity & Data Protection: What the GC & CEO Need to Know, GC Netweavers (3/10/16) (PowerPoint Slides / Slide Show)
2015 Presentations and Webinars
- SecureWorld International Webinar: Data Protection Pitfalls to Avoid, Co-Presenter with Aliki Liadis-Hall (Director of Compliance, North American Bancard), Jason Hart (CTO of Data Protection, Gemalto), Kim L. Jones (SVP & CISO, Vantiv), December 10, 2015
- Privacy Issues in Structured Settlement Transactions, National Association of Settlement Purchasers (NASP) 2015 Conference, Las Vegas, NV (11/11/15)
- Cybersecurity Trends – The Evolving Standard of Care for Companies and Management, SMU Law Review’s 23rd Annual General Counsel Symposium (10/30/15)
- Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and Management, SecureWorld – Dallas Expo (10/28/15) (slides)
- Cybersecurity Panel, sponsored by WhitleyPenn, Lockton Companies, and Scheef & Stone, L.L.P. (10/27/2015)
- Data Security and Privacy by Contract: Hacking Us All Into Business Associates, SMU Science & Technology Law Review’s Cybersecurity Symposium (10/23/15) (slides)
- Above Compliance – Navigating the Cybersecurity Landscape in Financial Services (10/22/15) (slides)
- Cybersecurity: Mission Impossible?, Sachse, Texas Chamber of Commerce (9/8/15)
- The CFAA: Is It in Your Game Plan — It’s the Computer Fraud and Abuse Act, Useful Claim or Legal Oddity?, UT Law CLE, Non-Compete Camp 2015 (9/3/15) (slides)
- Cybersecurity for Middle Market Executives: Bringing Attention to Ways Companies Can Manage Risk Within Their Organization, sponsored by WhitleyPenn, Lockton Companies, and Scheef & Stone, L.L.P. (8/26/2015)
- Protecting Client Data, State Bar of Texas Annual Meeting San Antonio 2015 (6/19/15) (email to request slides)
- Provisions of Cybersecurity Insurance Policies, State Bar of Texas Annual Meeting San Antonio 2015 (6/18/15) (slides)
- Ignite SBOT, State Bar of Texas Annual Meeting San Antonio 2015 (5/18/15) (video)
- Cybersecurity & Data Protection: Thinking About Risk & Compliance, Corporate Counsel Section, Collin County Bar Association (5/29/15) (slides)
- Cybersecurity: Mission Impossible?, Murphy, Texas Chamber of Commerce (5/28/15) (slides)
- Cybersecurity: Strategies for Compliance & Mitigation of Cyber Risk, Collin County Bench Bar Conference 2015 (5/16/15) (slides)
- Keynote Presenter, The Most Current Cybersecurity Threats: Don’t Be the Next Victim, Annual ACFE Fraud Conference, Association of Certified Fraud Examiners (ACFE) (5/15/15) (slides)
- Keynote Speaker: Business Cyber Risk: Threats, Compliance & Cyber Insurance, International Association of Insurance Professionals (DFW Chapter) (5/12/15)
- Social Media Law: Rules, Gotchas, and Key Policies, Hubspot (national webinar) (4/17/15) (slides)
- What’s Changed in Texas Privacy Law, Why It’s Important, and What Your Office Can Do To Ensure Compliance, Texas Dental Association webinar (4/17/15) (contact for slides)
- Cybersecurity Threat Intelligence Sharing Panel Discussion with Congressman Michael McCaul, Chair of Homeland Security Committee, Panelist, University of Texas, Austin, Tx (4/9/15)
- The Dark Net: Healthcare Practice Data at Risk, Texas Dental Association webinar (2/24/15) (contact for slides)
- Simple Ways to Effectively Use Social Media to Help Build Your Law Practice, Legal Marketing Association (LMA) (webinar with Cordell Parvin) (2/15) (link)
- Private Presentation on Overview of My Cybersecurity Practice (2/15) (link)
- Cybersecurity | Data Privacy – The Impact on Your Law Practice, Making Your Practice Work Seminar, Collin County Bar Association (1/29/15) (link)
2014 Presentations and Webinars
- Private Presentation on Cybersecurity Strategy to Annual Board Meeting of major international corporation, Miami, Fla (12/14)
- Walking the Straight and Narrow: Strategies to comply with state, federal, and international privacy laws (lawyers panel), Strengthening the Weak Link: Cyber Security Essentials for the C-Suite Conference, North Texas Crime Commission (10/16/14) (link)
- Keeping Your Healthcare Practice “Off the Hook” – Is Your Practice “On the Hook” Webinar Series for Texas Dental Association and Oklahoma Dental Association, Smart Training LLC (9/10/14) (slides available upon request)
- Social Media Law: It is Real and, Yes, Really Can Impact Your Business, Marketing Executives Networking Group (MENG) (national webinar) (8/14/14) (slides)
- Using Social Media in Your Law Practice, 3rd Annual Outstanding Women Lawyers’ Roundtable (6/6/14) (Prezi)
- Combating Corporate Espionage, Cyber Fraud and Data Breaches: Case Studies and The Law , Dallas CPA Society Convergence 2014 (5/8/14) (slides available upon request)
- Combating Cyber Fraud, Data Breaches & Corporate Espionage, Renaissance Executive Forums (5/8/14) (slides)
- Cyber Fraud, Data Breaches, Corporate Espionage: How They Impact Your Law Practice, Collin County Bench Bar Conference (5/3/14) (Prezi)
- Using Social Media in Your Law Practice, Collin County Bar Association, General Bar (5/16/14) (Prezi)
- Using Social Media in Your Law Practice, Collin County Bar Association, Law Practice Management Section (4/28/14) (Prezi)
- Data Breach! Hacking! Corporate Espionage! — Are You Listening Yet???, Collin County Bar Association, Corporate Counsel Section (4/25/14) (Prezi)
- Digital Information Law & Your Business, The Alternative Board (4/1/14) (slides)
- The Legal Side of Data Breach and Third Party Risk, Institute of Internal Auditors (IIA) 9th Annual Fraud Summit (3/28/14) (slides)
2013 Presentations and Webinars
- Espionage & The Law, Institute of Internal Auditors (IIA) 2nd Annual IIA Super Conference (10/25/13) (slides available upon request)
- Combating Corporate Espionage – Data Breach (and the law) (10/24/13) (Prezi)
- The Law Online – Posting Gone Wild!, Parenting PaperLess (slides)
- Fraud 2.0 – Overview and Update of the Computer Fraud and Abuse Act and a Few Lessons About Data Breaches, Privacy, Data Security, and eCommerce Committee of the State Bar of Texas (8/28/13) (slides)
- Anatomy of a Data Breach – What To Do When The Unthinkable Occurs, Texas Dental Association & Smart Training LLC (7/31/13) (Prezi)
- Fraud 2.0 – Helping Businesses Prepare for Computer Fraud and Data Breaches, The IMA – Association of Accountants and Financial Professionals in Business (5/16/13) (slides)
- The Dark Side of Social Media, 1st Tuesday Connections (4/13)
- Social Media Law, PlayMaker’s Radio Talk Show (3/13) (audio recording)
2012 Presentations and Webinars
- Social Media Law – It is Real and, Yes, Really Can Impact Your Business, MENG – Marketing Executives Networking Group (11/9/12) (slides)
- Fraud 2.0 – An Overview of the Laws that Help Businesses and Individuals Combat Computer Fraud, Association of Certified Fraud Examiners (ACFE) (11/8/12) (slides)
- Social Media Law – It is Real and, Yes, Really Can Impact Your Business, Social Media Breakfast – Dallas (8/30/12) (video)
- Social Media Law – The Legal Do’s and Don’ts of Social Media, TrustPoint Management Group (8/10/12) (slides)
- The Evolving Computer Fraud and Abuse Act – An Overview and Update of Recent Activity, Dallas Bar Association Computer Law Section (4/23/12) (slides)
Older Presentations and Webinars
- Computer Fraud and Abuse Act – A Lunch Sampler With a Little Something for Everyone, Dallas Bar Association Computer Law Section (8/22/11) (slides)
Very early presentations – just for fun!
- Internet Law: An Expedition (2/20/2001) (slides)
- E-Contracting: The Basic Rules (2/2/2001) (slides)
- Contracting Over the Internet, B2B and B2C E Commerce Seminar (Feb. 2000)
- e-Government 2000 Fall Forum – Municipalities & The Internet (Fall 2000) (paper)
- Shifting Paradigms: Practicing Law in the Information Age – A Post-Y2K Analysis of Y2K Litigation (4/1/2000)
- Contracting Over the Internet in Texas, Dallas Bar Association (Feb. 2000)
You must be logged in to post a comment.