UPDATE (FBI admits): #AppleVsFBI – Just 1 iPhone? In 1977 it was Just 1 Pen Register

The law develops by the process of incrementalism. That is, it is a slow, gradual development, step by tiny step. In the United States, judicial decisions that fill the gaps in between the constitutional and statutory law and helps those bodies of law evolve. Each case sets a precedent, or foundation, upon which the reasoning for …

The #1 Reason NIST Cybersecurity Framework is Becoming the Standard

An article in eCommerce Times offers a well-reasoned argument for why the NIST (National Institute of Standards and Technology) Cybersecurity Framework is the guiding force in shaping the United States’ federal cybersecurity strategy: NIST Risk-Assessment Framework Shapes Federal Cybersecurity Strategy You should read it — but only after you read the following explanation because it is …

EU – U.S. Privacy Shield Summary & Fact Sheet for Businesses

UPDATE: The House and Senate have passed the Judicial Redress Act which gives EU citizens the right to seek redress in US courts for the misuse of their personal data. The EU – U.S. Privacy Shield signals greater cooperation between the EU Data Protection Authorities and the Federal Trade Commission, according to a Fact Sheet …

Cybersecurity Legal Year in Review – #DtSR Podcast

Do not miss this podcast discussing key cybersecurity legal events from 2015. Shawn Tuma joined the DtSR Gang [Rafal Los (@Wh1t3Rabbit), James Jardine (@JardineSoftware), and Michael Santarcangelo (@Catalyst)] on the Down the Security Rabbit Hole podcast. In this episode… Most important cybersecurity-related legal developments of 2015 Tectonic Shift that occurred with “standing” in consumer data …

Dear Santa: Shawn Tuma’s Cybersecurity Christmas Wish

Shawn Tuma asks Santa for one cybersecurity Christmas wish — what is yours?

SecureWorld Webinar: Data Protection Pitfalls to Avoid

You are welcome to attend a complimentary SecureWorld webinar with these featured presenters: Aliki Liadis-Hall, Director of Compliance, North American Bancard Jason Hart, CTO of Data Protection, Gemalto Shawn Tuma, Cybersecurity & Data Protection Partner, Scheef & Stone, LLP Kim L. Jones (moderator), Sr. Vice President & CISO, Vantiv The webinar is sponsored by Gemalto, qualifies for CPE …

Cover the Basics for Securing Your Network — Shawn Tuma’s Book Contribution

Shawn Tuma authored a section for an eBook published by Fortinet Security. You can read Tuma’s section, Cover the Basics, as well as download the complete eBook at this link: Cover the Basics- by Shawn E. Tuma | MightyGuides.com

Is your business prepared to respond this quickly to a data breach?

Customers and the public expect a very quick response to a data breach — within a matter of a few days. That is the new standard. If your business is not prepared ahead of time for such a response, it will be impossible. Your business needs a response plan in place with all of the key …

Excellus Blue Cross Blue Shield’s big data breach and the security lessons we all need to learn

Guest Post by Debbie Fletcher There are two possible conversations that could be kicked off by the news of the major data breach at Excellus Blue Cross Blue Shield in which more than 10 million customer accounts were exposed. The first possible conversation is about internet security and what businesses and organizations of all sizes …

Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)

Wow, this article seriously just made my day. I will apologize in advance to my friend and CSO writer and Michael Santarcangelo (@catalyst), but this may very well be my favorite article — anywhere — of all time! And, thank you, Tom Hulsey (@TomHulsey), for sharing it with me! As for you, Ms. Kacy Zurkus (@KSZ714), all I can …