Last evening I had the pleasure of talking cybersecurity law with a group of CIOs from some pretty sophisticated companies. It was a great discussion and I learned as much as I shared -- just the way I like it. During our discussion, the subject of Incident Response Plans came up and I explained why … Continue reading Cybersecurity: How Long Should An Incident Response Plan Be?
IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today's businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are … Continue reading 3 Important Points on Computer Use Policies
In this video, cybersecurity and data protection attorney Shawn Tuma explains why cybersecurity incidents are as much legal events as they are information technology and business / public relations events. ______________________ Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity … Continue reading Why Cybersecurity Incidents Are Legal Events
In his latest Ethical Boardroom article, Shawn Tuma explains why it is important for board members to have an active role in their company's cybersecurity preparation and tells them several key steps they can take to do so. Tuma also explains why cybersecurity is as much a legal issue and business issue as it is … Continue reading Managing Cybersecurity Risks for Boards of Directors
You are welcome to attend a complimentary SecureWorld webinar with these featured presenters: Aliki Liadis-Hall, Director of Compliance, North American Bancard Jason Hart, CTO of Data Protection, Gemalto Shawn Tuma, Cybersecurity & Data Protection Partner, Scheef & Stone, LLP Kim L. Jones (moderator), Sr. Vice President & CISO, Vantiv The webinar is sponsored by Gemalto, qualifies for CPE … Continue reading SecureWorld Webinar: Data Protection Pitfalls to Avoid