Shawn Tuma authored a section for an eBook published by Fortinet Security. You can read Tuma’s section, Cover the Basics, as well as download the complete eBook at this link: Cover the Basics- by Shawn E. Tuma | MightyGuides.com
Tag: Cybersecurity
Excellus Blue Cross Blue Shield’s big data breach and the security lessons we all need to learn
Guest Post by Debbie Fletcher There are two possible conversations that could be kicked off by the news of the major data breach at Excellus Blue Cross Blue Shield in which more than 10 million customer accounts were exposed. The first possible conversation is about internet security and what businesses and organizations of all sizes…
Would increasing CFAA penalties via the CISA Amendment really even help? I don’t think so.
As the Cybersecurity Information Sharing Act (CISA) is making its way through the Senate, it has stirred up more controversy with Senator Sheldon Whitehouse’s proposed amendment to the Computer Fraud and Abuse Act (CFAA), that he argues, would give law enforcement more tools to fight hackers. The Amendment would provide for increased sentences (up to…
Rocky Dhir Interviews Shawn Tuma About Cybersecurity for Lawyers at State Bar of Texas 2015 Annual Meeting
I had the wonderful opportunity to visit with and get to know Rocky Dhir (@rockydhir) at the State Bar of Texas 2015 Annual Meeting in San Antonio. Rocky is the Founder and CEO of Atlas Legal Research, LP (@atlaslegal), “the world’s leading legal outsourcing company.” Rocky and I did a brief interview where we talked…
Cybersecurity & Data Breach: You Don’t Drown From Falling Into the Water
“You don’t drown from falling into the water, you drown from not getting out.” Think about that — and think about how that applies to cyber security and data breach issues facing companies in today’s cyber world. Here, in my first ever video blog post, I explain this issue with more detail.
What is ‘cybersecurity law’? Orin Kerr’s 4 Categories
Regular readers know I have a tremendous amount of respect for Orin Kerr as a — if not the — true scholar on cyber law issues. Kerr recently wrote an article in which he explained his view of cybersecurity law and broke it down into four distinct categories: The law governing steps that potential or…
Cybersecurity Presentation at ACFE 25th Annual DFW Fraud Conference
I am really looking forward to speaking to the 400+ attendees at the Association of Certified Fraud Examiners’ (ACFE) 25th Annual DFW Fraud Conference event on Friday, May 15, 2015. My address is titled Addressing the Most Current Cybersecurity Threats: Don’t Be the Next Victim. You can learn more about this event at this LINK…
Cybersecurity Keynote Address at International Association of Insurance Professionals Event
I am really looking forward to delivering the Keynote Address at the International Association of Insurance Professionals IAIP DFW NAIW Week event on May 12, 2015. My address, which will follow 2 hours of CE/CLE education on Cyber Liability, is titled Cyber Risk Reality Check but, the more I think about it, perhaps it should be…
Useful Info on Cyber Security Definitions for Common Jargon & Acronyms
The world of cybersecurity is full of all kinds of cool and exotic sounding acronyms that, just as lawyers do, cybersecurity pros use to (1) communicate valuable information but, perhaps more importantly, (2) sound really cool! If you want to be in the club, here’s a great post where you go to get the basics:…
Practical ways your company’s contracts can help improve its cybersecurity odds
I am sharing two articles with you because, as you well know, cybersecurity is a really hot topic right now due to the threat it poses to virtually all businesses. I hope you find these helpful. I was recently interviewed by CSO Magazine and asked to give one suggestion that companies could do to…
You must be logged in to post a comment.