StopRansomware.gov – the U.S. Government’s One-Stop Resource for Ransomware

The U.S. Government has launched a new resource to help combat the ransomware pandemic. Below is the relevant information it has shared: The U.S. Government launched a new website to help public and private organizations defend against the rise in ransomware cases. StopRansomware.gov is a whole-of-government approach that gives one central location for ransomware resources …

Ransomware Attacks! The 5 Best Practices the White House Urges all Businesses to Take to Mitigate Them

The threat of ransomware attacks against all American businesses is so great that on June 2, 2021, the White House issued a memo to all corporate executives and business leaders with the subject “What We Urge You To Do To Protect Against The Threat of Ransomware.” This is the first time such a memo has ever been …

Attend Tuma’s Upcoming Webinar: Understanding How Cyber Insurance Impacts Your Incident Response Planning

Shawn Tuma will be hosting a complimentary webinar with SecureWorld on Noon CST on Friday, April 17, 2020. You can register HERE. Why should you attend this webinar? Companies not only need to get the right cyber insurance, but, they must also know how to properly use it once they have it. One of the …

Complimentary SecureWorld Webinar – 2016 Breaches: Lessons Learned

You are welcome to attend a complimentary SecureWorld webinar with these featured presenters: Erich Kron, Security Awareness Advocate, KnowBe4 Aliki Liadis-Hall, Director of Compliance, North American Bancard Craig Spiezle, Executive Director & President, Online Trust Alliance Shawn Tuma, Cybersecurity & Data Privacy Partner, Scheef & Stone, LLP The webinar qualifies for CPE Credits, and will take place …

Cybersecurity Lessons Learned from SecureWorld #SWDAL16 Conference

Following an outstanding SecureWorld Expo – Dallas Conference, Courtney Theim posted a nice wrap up of the lessons learned as of the time of her post: #SWDAL16: What We’ve Learned So Far I am going to give you the gist of it and encourage you to go check out the full post: Surgical Info. Hackers …

Cybersecurity Legal Issues: What you really need to know (slides)

Shawn Tuma delivered the presentation Cybersecurity Legal Issues: What you really need to know at a Cybersecurity Summit sponsored by the Tarleton State University School of Criminology, Criminal Justice, and Strategic Studies’ Institute for Homeland Security, Cybercrime and International Criminal Justice. The presentation was on September 13, 2016 at the George Bush Institue. The following are the slides …

Cybersecurity Incident Response Checklist

Business leaders, when people like me tell you that having a cybersecurity incident in your company is like being in a building on fire, we are not exaggerating. Take a look at the following checklist (note, this is not an incident response plan!) while keeping in mind that over half of the items on that checklist …

Cybersecurity: How Long Should An Incident Response Plan Be?

Last evening I had the pleasure of talking cybersecurity law with a group of CIOs from some pretty sophisticated companies. It was a great discussion and I learned as much as I shared — just the way I like it. During our discussion, the subject of Incident Response Plans came up and I explained why …

3 Important Points on Computer Use Policies

IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today’s businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are …

Why Cybersecurity Incidents Are Legal Events

In this video, cybersecurity and data protection attorney Shawn Tuma explains why cybersecurity incidents are as much legal events as they are information technology and business / public relations events. ______________________ Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity …