“The devil is in the details” — that about sums up my take on the White House Cybersecurity Plan. Many thanks to Lily Newman for including this and some other points from our discussion in her Wired article The High-Stakes Blame Game in the White House Cybersecurity Plan. I appreciate that the Administration is talking…
Tag: law
Come to our session at #PSR18 – Vendor Risk Management: Maintaining Relationships While Limiting Liability
Are you at IAPP – International Association of Privacy Professionals P.S.R. #PSR18 in Austin? If so, please come to our Thursday 10:30 – 11:30 session on Vendor Risk Management: Maintaining Relationships While Limiting Liability in Lone Star Ballroom A, Level 3. It should be great as I get to be with great panelists Tami Dokken and Melissa Krasnow and we will have Mark Smith as our…
5 Key Things In-House Counsel Can Do to Help Their Businesses’ Cybersecurity
Cybersecurity is a team sport and many people within a business must work together to help effectively manage their businesses’ cyber risk. In-house counsel plays a critical role in this process. A recent Law360 article (subscription required) identified the following key things they can do: Develop, implement, and table-top test an incident response plan Advise…
Why do you need a cyber attorney? Shawn Tuma explains in Ethical Boardroom
In my latest article in Ethical Boardroom article, I explain some of the not-so-obvious reasons why you need an experienced cyber attorney on your team: Why you need a cyber attorney (Spring 2018) Here are other Ethical Boardroom (@EthicalBoard) articles that I have written or contributed to that are also available for free: Cybersecurity: A Fiduciary Duty…
Down the Security Rabbithole Podcast #DtSR with Los and Tuma talking all things #cybersecurity
This week’s #DtSR Podcast featured Raf Los and guest Shawn Tuma talking about all things cybersecurity. Check out more of what was covered and listen to the podcast here! Check out some of the past episodes with Tuma as a guest. Share on social media and join in the discussion! This week on #DtSR…
Security Weekly guest Shawn Tuma discusses “what is reasonable cybersecurity?”
Share on social media and join in the discussion! LinkedIn Post I really enjoyed joining my good friend @catalyst on Security Week today to talk about "what is reasonable cybersecurity?" — Business Security Weekly Episode #76 https://t.co/bINnEhrlkQ — Shawn E. Tuma (@shawnetuma) March 3, 2018
What is “reasonable cybersecurity” and how do courts view it? (SecureWorld interviews)
What is “reasonable cybersecurity” and how do courts view “reasonable cybersecurity”? See KnowB4’s discussion of these interviews These are two excellent questions that I was asked and I answered, as succinctly as I could, in two short interviews with SecureWorld. Tell me what you think about my answers. What Is Reasonable Cybersecurity? – SecureWorld article…
Uber’s CISO Makes Case for Uniform National Data Breach Notification Law
Uber’s Chief Information Security Officer (CISO), John Flynn, made a case for a uniform national data breach notification law in his testimony to members of Congress (see penultimate paragraph of full written testimony): I would like to conclude by stating that we strongly support a unified, national approach to data security and breach standards. We are…
3 Legal Points for InfoSec Teams to Consider Before an Incident
As a teaser to my presentation at SecureWorld – Dallas last week, I did a brief interview with SecureWorld and talked about three of the points I would make in my lunch keynote, The Legal Case for Cybersecurity. If you’re going to SecureWorld – Denver next week, join me for the lunch keynote on Thursday (11/2)…
What do we in the United States really want from our cyber laws?
In my newsfeed are articles in prominent publications discussing the problems with the federal Computer Fraud and Abuse Act from very different perspectives. In the “the CFAA is dangerous for security researchers” corner we have White Hat Hackers and the Internet of Bodies, in Law360, discussing how precarious the CFAA (and presumably, the state hacking laws…
You must be logged in to post a comment.