You are welcome to attend a complimentary SecureWorld webinar with these featured presenters: Erich Kron, Security Awareness Advocate, KnowBe4 Aliki Liadis-Hall, Director of Compliance, North American Bancard Craig Spiezle, Executive Director & President, Online Trust Alliance Shawn Tuma, Cybersecurity & Data Privacy Partner, Scheef & Stone, LLP The webinar qualifies for CPE Credits, and will take place … Continue reading Complimentary SecureWorld Webinar – 2016 Breaches: Lessons Learned
Following an outstanding SecureWorld Expo - Dallas Conference, Courtney Theim posted a nice wrap up of the lessons learned as of the time of her post: #SWDAL16: What We've Learned So Far I am going to give you the gist of it and encourage you to go check out the full post: Surgical Info. Hackers … Continue reading Cybersecurity Lessons Learned from SecureWorld #SWDAL16 Conference
Shawn Tuma delivered the presentation Cybersecurity Legal Issues: What you really need to know at a Cybersecurity Summit sponsored by the Tarleton State University School of Criminology, Criminal Justice, and Strategic Studies' Institute for Homeland Security, Cybercrime and International Criminal Justice. The presentation was on September 13, 2016 at the George Bush Institue. The following are the slides … Continue reading Cybersecurity Legal Issues: What you really need to know (slides)
Business leaders, when people like me tell you that having a cybersecurity incident in your company is like being in a building on fire, we are not exaggerating. Take a look at the following checklist (note, this is not an incident response plan!) while keeping in mind that over half of the items on that checklist … Continue reading Cybersecurity Incident Response Checklist
Last evening I had the pleasure of talking cybersecurity law with a group of CIOs from some pretty sophisticated companies. It was a great discussion and I learned as much as I shared -- just the way I like it. During our discussion, the subject of Incident Response Plans came up and I explained why … Continue reading Cybersecurity: How Long Should An Incident Response Plan Be?