3 Important Points on Computer Use Policies

IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE

Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today’s businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are and are not permissible ways to use and safeguard the businesses’ digital assets, as well as third parties’ information that it may be holding. Continue reading “3 Important Points on Computer Use Policies”

Why Cybersecurity Incidents Are Legal Events

In this video, cybersecurity and data protection attorney Shawn Tuma explains why cybersecurity incidents are as much legal events as they are information technology and business / public relations events.

Continue reading “Why Cybersecurity Incidents Are Legal Events”

Managing Cybersecurity Risks for Boards of Directors

Ethical Boardroom Winter 2016In his latest Ethical Boardroom article, Shawn Tuma explains why it is important for board members to have an active role in their company’s cybersecurity preparation and tells them several key steps they can take to do so. Tuma also explains why cybersecurity is as much a legal issue and business issue as it is an IT issue. Continue reading “Managing Cybersecurity Risks for Boards of Directors”

SecureWorld Webinar: Data Protection Pitfalls to Avoid

You are welcome to attend a complimentary SecureWorld webinar with these featured presenters:

  • Aliki Liadis-Hall, Director of Compliance, North American Bancard
  • Jason Hart, CTO of Data Protection, Gemalto
  • Shawn Tuma, Cybersecurity & Data Protection Partner, Scheef & Stone, LLP
  • Kim L. Jones (moderator), Sr. Vice President & CISO, Vantiv

The webinar is sponsored by Gemalto, qualifies for CPE Credits, and will take place on Thursday, December 10 at 12 pm CST but if you are unable to attend, you can access the recording as well.

You can learn more about, and register for, the webinar at this LINK.

Cover the Basics for Securing Your Network — Shawn Tuma’s Book Contribution

Securing Your NetworkShawn Tuma authored a section for an eBook published by Fortinet Security. You can read Tuma’s section, Cover the Basics, as well as download the complete eBook at this link: Cover the Basics- by Shawn E. Tuma | MightyGuides.com