SlideShare a Scribd company logo
www.solidcounsel.com
Shawn Tuma
Cybersecurity Partner
Scheef & Stone, L.L.P.
214.472.2135
shawn.tuma@solidcounsel.com
@shawnetuma
blog: www.shawnetuma.com
web: www.solidcounsel.com
This information provided is
for educational purposes only,
does not constitute legal
advice, and no attorney-client
relationship is created by this
presentation.
ShawnTuma is a business lawyer with an internationally recognized
reputation in cybersecurity, computer fraud and data privacy law. He is a
Cybersecurity & Data Protection Partner at Scheef & Stone, LLP, a full-
service commercial law firm inTexas that represents businesses of all
sizes throughout the United States and around the world.
 Board of Directors, NorthTexas Cyber Forensics Lab
 Board of Directors & General Counsel, Cyber Future Foundation
 Texas SuperLawyers 2015-16 (IP Litigation)
 Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law)
 Council, Computer &Technology Section, State Bar ofTexas
 Chair, Civil Litigation & Appellate Section, Collin County Bar
Association
 College of the State Bar ofTexas
 Privacy and Data Security Committee, Litigation, Intellectual
Property Law, and Business Sections of the State Bar ofTexas
 Information Security Committee of the Section on Science &
Technology Committee of the American Bar Association
 NorthTexas Crime Commission,Cybercrime Committee
 Infragard (FBI)
 International Association of Privacy Professionals (IAPP)
 Information Systems Security Association (ISSA)
 Board of Advisors, Optiv Security
 Editor, Business Cybersecurity Business Law Blog
“There are only two types of companies: those that have
been hacked, and those that will be.” –Robert Mueller
“It’s not a matter of if, but a matter of when”
62% of Cyber Attacks  SMBs
Odds: Security @100% / Hacker @ 1
TargetHome DepotNeiman MarcusMichael’sSpecsTJ MaxxeBaySally BeautyPF Chang’sUPSDairy QueenJimmy John’sJP Morgan ChaseKmartStaplesSonyAshley Madison
Yes, Legal
www.solidcounsel.com
“Security and IT protect companies’ data;
Legal protects companies from their data.”
-Shawn E. Tuma
KEEP CALM
I’M A
FIRST
RESPONDER
KEEP CALM
I’M A
FIRST
RESPONDER
KEEP CALM
I’M A
FIRST
RESPONDER
Immediate Priorities
• Assess the situation
• Be a counselor
• Instill confidence
• Bring peace
• Facilitate rational
thought & behavior
www.solidcounsel.com
Who are targets?
Key Point: We are all targets
 Your clients’ businesses
 Your law firms
 Big firms (give examples)
 James Shelton Example
 Rural Texas solo practitioner
 Employee left, didn’t change password or disable acct
 Hackers accessed, spoofed email, sent “pleadings” all over,
including other countries
www.solidcounsel.com
Privilege / Work Product
KEY POINT: Attorney’s may have privilege
“Target has demonstrated . . . that the work of the
Data Breach Task Force was focused not on
remediation of the breach . . . but on informing
Target’s in-house and outside counsel about the
breach so that Target’s attorneys could provide
the company with legal advice and prepare to
defend the company in litigation that was already
pending and was reasonably expected to follow.”
In re Target Corp. Customer Data Breach
Litigation
www.solidcounsel.com
ACC Study (Sept ‘15)
What concerns keep
Chief Legal Officers
awake at night?
#2 = Data Breaches
82% consider as
somewhat, very, or
extremely important
www.solidcounsel.com
Cost of a Data Breach – US
2013 Cost
• $188.00 per record
• $5.4 million = total average cost paid by organizations
2014 Cost
• $201 per record
• $5.9 million = total average cost paid by organizations
2015 Cost
• $217 per record
• $6.5 million = total average cost paid by organizations
(Ponemon Institute Cost of Data Breach Studies)
www.solidcounsel.com
Legal Obligations
 International Laws
 Safe Harbor
 Privacy Shield
 Federal Laws & Regs
 HIPAA, GLBA, FERPA
 FTC, FCC, SEC
 State Laws
 47 states (Ala, NM, SD)
 Fla (w/in 30 days)
 OH & VT (45 days)
 Industry Groups
 PCI, FINRA, etc.
 Contracts
 Vendors & Suppliers
 Business Partners
 Data Security Addendum
www.solidcounsel.com
Ancient Cybersecurity
Wisdom
 Water shapes its course
according to the nature of the
ground over which it flows;
the soldier works out his
victory in relation to the foe
whom he is facing.”
 “In all fighting the direct
method may be used for
joining battle, but indirect
methods will be needed to
secure victory.”
“An ounce of prevention is cheaper than
the first day of litigation.”
Litigation
www.solidcounsel.com
Consumer Litigation
Peters v. St. Joseph Services, 74 F.Supp.3d 847
(S.D. Tex. Feb. 11, 2015)
Remijas v. Neiman Marcus Group, LLC, 794 F.3d
688, 693 (7th Cir. 2015)
Whalen v. Michael Stores Inc., 2015 WL 9462108
(E.D.N.Y. Dec. 28, 2015)
In re SuperValu, Inc., 2016 WL 81792
(D. Minn. Jan. 7, 2016)
In re Anthem Data Breach Litigation, 2016 WL
589760 (N.D. Cal. Feb. 14, 2016) (J. Lucy Koh)
Regulatory & Administrative
www.solidcounsel.com
Regulatory & Administrative - FTC
KEY POINT: You must have basic IT security
F.T.C. v. Wyndham Worldwide Corp., 799 F.3d 236 (3rd Cir. Aug. 24,
2015).
 The FTC has authority to regulate cybersecurity under the
unfairness prong of § 45(a) of the Federal Trade Commission
Act.
 Companies have fair notice that their specific cybersecurity
practices could fall short of that provision.
 3 breaches / 619,000 records / $10.6 million in fraud
 Rudimentary practices v. 2007 guidebook
 Website Privacy Policy misrepresentations
 Jurisdiction v. set standard?
www.solidcounsel.com
The Basics
“Some people try
to find things in
this game that
don’t exist but
football is only two
things – blocking
and tackling.”
-Lombardi
www.solidcounsel.com
The Basics
Best Practices
 Documented
 Basic IT Security
 Basic Physical Security
 Security Focused P&P
 Company
 Workforce
 Network
 Website / Privacy / TOS
 Business Associates
 Social Engineering
 Implementation
 Training
www.solidcounsel.com
Regulatory & Administrative – FTC
KEY POINT: You must evaluate business partners’ security
In re GMR Transcription Svcs, Inc., 2014 WL 4252393 (Aug. 14,
2014). FTC’s Order requires business to follow 3 steps when
contracting with third party service providers:
1. Investigate before hiring data service providers.
2. Obligate their data service providers to adhere to the
appropriate level of data security protections.
3. Verify that the data service providers are complying with
obligations (contracts).
www.solidcounsel.com
Addendum to Business Contracts
KEY POINT: Know your contractual obligations
 Common names for the Addendum:
 Data Security & Privacy; Data Privacy; Cybersecurity; Privacy;
Information Security.
 Common features
 Defines subject “Data” being protected in categories.
 Describes acceptable and prohibited uses for Data.
 Describes standards for protecting Data.
 Describes requirements for deleting Data.
 Describes obligations if a breach of Data.
 Allocates responsibility if a breach of Data.
 Requires binding third parties to similar provisions.
www.solidcounsel.com
Regulatory & Administrative – SEC
KEY POINT: You must have written (1) Policies &
Procedures and (2) Incident Response Plan
S.E.C. v. R.T. Jones Capital Equities Management, Consent
Order (Sept. 22, 2015).
 “Firms must adopt written policies to protect their clients’
private information”
 “they need to anticipate potential cybersecurity events
and
 have clear procedures in place rather than waiting to
react once a breach occurs.”
 violated this “safeguards rule
 100,000 records (no reports of harm)
 $75,000 penalty
www.solidcounsel.com
Responding: Execute Response Plan
This is only a
checklist – not a
Response Plan
How Fast?
• 45 days (most states)
• 30 days (some states)
• 3 days (fed contracts)
• 2 days (bus expectation)
• Immediately (contracts)
Officer & Director Liability
www.solidcounsel.com
Officer & Director Liability
KEY POINT: “boards that choose to ignore, or minimize,
the importance of cybersecurity oversight responsibility,
do so at their own peril.” SEC Commissioner Luis A. Aguilar, June
10, 2014.
 Heartland Payment Systems, TJ Maxx, Target, Home Depot, Wyndham
 Derivative claims premised on the harm to the company from data breach.
 Caremark Claims:
 Premised on lack of oversight = breach of the duty of loyalty and good faith
 Cannot insulate the officers and directors = PERSONAL LIABILITY!
 Standard:
 (1) “utterly failed” to implement reporting system or controls; or
 (2) “consciously failed” to monitor or oversee system.
www.solidcounsel.com
Officer & Director Liability
Palkon v. Holmes, 2014 WL 5341880, *5-6 (D. NJ Oct. 20,
2014).
 Derivative action for failing to ensure Wyndham implemented
adequate security policies and procedures.
 Order Dismissing: The board satisfied the business judgement rule
by staying reasonably informed of the cybersecurity risks and
exercising appropriate oversight in the face of the known risks.
 Well-documented history of diligence showed Board
 Discussed cybersecurity risks, company security policies and
proposed enhancements in 14 quarterly meetings; and
 Implemented some of those cybersecurity measures.
Cyber Insurance
www.solidcounsel.com
Cyber Insurance – Key Questions
 Even know if you have it?
 What period does the
policy cover?
 Are Officers & Directors
Covered?
 Cover 3rd Party Caused
Events?
 Social Engineering
coverage?
 Cover insiders intentional
acts (vs. negligent)
 Contractual liability?
 What is the triggering
event?
 What types of data are
covered?
 What kind of incidents are
covered?
 Acts of war?
 Required carrier list for
attorneys & experts?
 Other similar risks?
Virtually all companies will be
breached.Will they be liable?
It’s not the breach; it’s their diligence
and response that matter most.
Companies have a duty to be
reasonably informed of and take
reasonable measures to protect
against cybersecurity risks.
Cyber Risk
Assessment
Strategic
Planning
Deploy
Defense
Assets
Develop,
Implement
&Train on
P&P
Tabletop
Testing
Reassess &
Refine
Cybersecurity Risk
Management Program
3 Must-Haves for Every Organization
1. Basic IT Security
2. Written Policies & Procedures
3. Written Incident Response Plan
***Document3***
“You don’t drown by falling in the water;
You drown by staying there.”

More Related Content

What's hot

Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Shawn Tuma
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
Shawn Tuma
 
Digital Information Law & Your Business - The Alternative Board
Digital Information Law & Your Business - The Alternative BoardDigital Information Law & Your Business - The Alternative Board
Digital Information Law & Your Business - The Alternative Board
Shawn Tuma
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Shawn Tuma
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Shawn Tuma
 
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
dmenken60
 
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
Employers Association of New Jersey
 
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Zapproved
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
duffeeandeitzen
 
Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016
Jennifer Sharf Adler
 
Non-competition and Non-solicitation Provisions
Non-competition and Non-solicitation ProvisionsNon-competition and Non-solicitation Provisions
Non-competition and Non-solicitation Provisions
Kevin Learned
 
Whitepaper: The Enlightened Legal Hold 2014
Whitepaper: The Enlightened Legal Hold 2014Whitepaper: The Enlightened Legal Hold 2014
Whitepaper: The Enlightened Legal Hold 2014
Zapproved
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Shawn Tuma
 

What's hot (13)

Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
 
Digital Information Law & Your Business - The Alternative Board
Digital Information Law & Your Business - The Alternative BoardDigital Information Law & Your Business - The Alternative Board
Digital Information Law & Your Business - The Alternative Board
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
 
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
 
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
2011 Garden State Council SHRM Conference "Ethics in Human Resource Management"
 
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
Preservation and Proportionality: Lowering the Burden of Preserving Data in C...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016
 
Non-competition and Non-solicitation Provisions
Non-competition and Non-solicitation ProvisionsNon-competition and Non-solicitation Provisions
Non-competition and Non-solicitation Provisions
 
Whitepaper: The Enlightened Legal Hold 2014
Whitepaper: The Enlightened Legal Hold 2014Whitepaper: The Enlightened Legal Hold 2014
Whitepaper: The Enlightened Legal Hold 2014
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
 

Viewers also liked

Para 01 (Misbah ul Quran)
Para 01 (Misbah ul Quran)Para 01 (Misbah ul Quran)
Para 01 (Misbah ul Quran)
Adeel Ahmad Munir Ahmad
 
Para 02 (Misbah Ul Quran)
Para 02 (Misbah Ul Quran)Para 02 (Misbah Ul Quran)
Para 02 (Misbah Ul Quran)
Adeel Ahmad Munir Ahmad
 
Cuenta de youtube
Cuenta de youtubeCuenta de youtube
Cuenta de youtube
piliferro
 
Simple tutorial : Android get and post data
Simple tutorial : Android get and post dataSimple tutorial : Android get and post data
Simple tutorial : Android get and post data
Pikiring Hutama
 
Blogs
BlogsBlogs
Blogs
sila
 
Since coming to university
Since coming to universitySince coming to university
Since coming to university
guestb5e9c9d7
 
healthcare auditing and monitoring tools
healthcare auditing and monitoring toolshealthcare auditing and monitoring tools
healthcare auditing and monitoring tools
hurt3303
 
Como crear tu cuenta en youtobe
Como crear tu cuenta en youtobeComo crear tu cuenta en youtobe
Como crear tu cuenta en youtobe
Sandrita Guzman
 
Bath tour
Bath tourBath tour
Bath tour
Song Dee
 
Factories of the Future - and What They Mean for Your Business
Factories of the Future - and What They Mean for Your BusinessFactories of the Future - and What They Mean for Your Business
Factories of the Future - and What They Mean for Your Business
Sanderson Group
 
Material design for android (Diggest)
Material design for android (Diggest)Material design for android (Diggest)
Material design for android (Diggest)
Google
 

Viewers also liked (11)

Para 01 (Misbah ul Quran)
Para 01 (Misbah ul Quran)Para 01 (Misbah ul Quran)
Para 01 (Misbah ul Quran)
 
Para 02 (Misbah Ul Quran)
Para 02 (Misbah Ul Quran)Para 02 (Misbah Ul Quran)
Para 02 (Misbah Ul Quran)
 
Cuenta de youtube
Cuenta de youtubeCuenta de youtube
Cuenta de youtube
 
Simple tutorial : Android get and post data
Simple tutorial : Android get and post dataSimple tutorial : Android get and post data
Simple tutorial : Android get and post data
 
Blogs
BlogsBlogs
Blogs
 
Since coming to university
Since coming to universitySince coming to university
Since coming to university
 
healthcare auditing and monitoring tools
healthcare auditing and monitoring toolshealthcare auditing and monitoring tools
healthcare auditing and monitoring tools
 
Como crear tu cuenta en youtobe
Como crear tu cuenta en youtobeComo crear tu cuenta en youtobe
Como crear tu cuenta en youtobe
 
Bath tour
Bath tourBath tour
Bath tour
 
Factories of the Future - and What They Mean for Your Business
Factories of the Future - and What They Mean for Your BusinessFactories of the Future - and What They Mean for Your Business
Factories of the Future - and What They Mean for Your Business
 
Material design for android (Diggest)
Material design for android (Diggest)Material design for android (Diggest)
Material design for android (Diggest)
 

Similar to Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss

Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
Shawn Tuma
 
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to KnowCybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Shawn Tuma
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
Shawn Tuma
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Shawn Tuma
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Shawn Tuma
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Shawn Tuma
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Shawn Tuma
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Shawn Tuma
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
Shawn Tuma
 
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Shawn Tuma
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
Financial Poise
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
David Shonka, Esq., FTC on eDiscovery
David Shonka, Esq., FTC on eDiscoveryDavid Shonka, Esq., FTC on eDiscovery
David Shonka, Esq., FTC on eDiscovery
J. David Morris
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
jyates
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
Rachel Hamilton
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
Todd Ruback
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
spencerharry
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 

Similar to Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss (20)

Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to KnowCybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to Know
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and M...
 
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
 
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
David Shonka, Esq., FTC on eDiscovery
David Shonka, Esq., FTC on eDiscoveryDavid Shonka, Esq., FTC on eDiscovery
David Shonka, Esq., FTC on eDiscovery
 
Legal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & UsersLegal Issues Impacting Data Center Owners, Operators & Users
Legal Issues Impacting Data Center Owners, Operators & Users
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 

More from Shawn Tuma

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Shawn Tuma
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
Shawn Tuma
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Shawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Shawn Tuma
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
Shawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
Shawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
Shawn Tuma
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
Shawn Tuma
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
Shawn Tuma
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Shawn Tuma
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Shawn Tuma
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
Shawn Tuma
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Shawn Tuma
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
Shawn Tuma
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
Shawn Tuma
 

More from Shawn Tuma (20)

Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
The Dark Side of Digital Engagement
The Dark Side of Digital EngagementThe Dark Side of Digital Engagement
The Dark Side of Digital Engagement
 
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackIncident Response Planning - Lifecycle of Responding to a Ransomware Attack
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
 
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data BreachThe Role of Contracts in Privacy, Cybersecurity, and Data Breach
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.Real World Cyber Risk. Understand it. Manage it.
Real World Cyber Risk. Understand it. Manage it.
 
The Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should IncludeThe Legal Case for Cyber Risk Management Programs and What They Should Include
The Legal Case for Cyber Risk Management Programs and What They Should Include
 
Cyber Hygiene Checklist
Cyber Hygiene ChecklistCyber Hygiene Checklist
Cyber Hygiene Checklist
 
Cyber Incident Response Checklist
Cyber Incident Response ChecklistCyber Incident Response Checklist
Cyber Incident Response Checklist
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)Cybersecurity Fundamentals for Legal Professionals (and every other business)
Cybersecurity Fundamentals for Legal Professionals (and every other business)
 
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
 
Cybersecurity Update
Cybersecurity UpdateCybersecurity Update
Cybersecurity Update
 

Recently uploaded

Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 

Recently uploaded (20)

Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 

Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss

  • 2. Shawn Tuma Cybersecurity Partner Scheef & Stone, L.L.P. 214.472.2135 shawn.tuma@solidcounsel.com @shawnetuma blog: www.shawnetuma.com web: www.solidcounsel.com This information provided is for educational purposes only, does not constitute legal advice, and no attorney-client relationship is created by this presentation. ShawnTuma is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity & Data Protection Partner at Scheef & Stone, LLP, a full- service commercial law firm inTexas that represents businesses of all sizes throughout the United States and around the world.  Board of Directors, NorthTexas Cyber Forensics Lab  Board of Directors & General Counsel, Cyber Future Foundation  Texas SuperLawyers 2015-16 (IP Litigation)  Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law)  Council, Computer &Technology Section, State Bar ofTexas  Chair, Civil Litigation & Appellate Section, Collin County Bar Association  College of the State Bar ofTexas  Privacy and Data Security Committee, Litigation, Intellectual Property Law, and Business Sections of the State Bar ofTexas  Information Security Committee of the Section on Science & Technology Committee of the American Bar Association  NorthTexas Crime Commission,Cybercrime Committee  Infragard (FBI)  International Association of Privacy Professionals (IAPP)  Information Systems Security Association (ISSA)  Board of Advisors, Optiv Security  Editor, Business Cybersecurity Business Law Blog
  • 3. “There are only two types of companies: those that have been hacked, and those that will be.” –Robert Mueller
  • 4. “It’s not a matter of if, but a matter of when”
  • 5. 62% of Cyber Attacks  SMBs
  • 6. Odds: Security @100% / Hacker @ 1
  • 7. TargetHome DepotNeiman MarcusMichael’sSpecsTJ MaxxeBaySally BeautyPF Chang’sUPSDairy QueenJimmy John’sJP Morgan ChaseKmartStaplesSonyAshley Madison
  • 8.
  • 10. www.solidcounsel.com “Security and IT protect companies’ data; Legal protects companies from their data.” -Shawn E. Tuma
  • 14. Immediate Priorities • Assess the situation • Be a counselor • Instill confidence • Bring peace • Facilitate rational thought & behavior
  • 15. www.solidcounsel.com Who are targets? Key Point: We are all targets  Your clients’ businesses  Your law firms  Big firms (give examples)  James Shelton Example  Rural Texas solo practitioner  Employee left, didn’t change password or disable acct  Hackers accessed, spoofed email, sent “pleadings” all over, including other countries
  • 16. www.solidcounsel.com Privilege / Work Product KEY POINT: Attorney’s may have privilege “Target has demonstrated . . . that the work of the Data Breach Task Force was focused not on remediation of the breach . . . but on informing Target’s in-house and outside counsel about the breach so that Target’s attorneys could provide the company with legal advice and prepare to defend the company in litigation that was already pending and was reasonably expected to follow.” In re Target Corp. Customer Data Breach Litigation
  • 17. www.solidcounsel.com ACC Study (Sept ‘15) What concerns keep Chief Legal Officers awake at night? #2 = Data Breaches 82% consider as somewhat, very, or extremely important
  • 18. www.solidcounsel.com Cost of a Data Breach – US 2013 Cost • $188.00 per record • $5.4 million = total average cost paid by organizations 2014 Cost • $201 per record • $5.9 million = total average cost paid by organizations 2015 Cost • $217 per record • $6.5 million = total average cost paid by organizations (Ponemon Institute Cost of Data Breach Studies)
  • 19. www.solidcounsel.com Legal Obligations  International Laws  Safe Harbor  Privacy Shield  Federal Laws & Regs  HIPAA, GLBA, FERPA  FTC, FCC, SEC  State Laws  47 states (Ala, NM, SD)  Fla (w/in 30 days)  OH & VT (45 days)  Industry Groups  PCI, FINRA, etc.  Contracts  Vendors & Suppliers  Business Partners  Data Security Addendum
  • 20. www.solidcounsel.com Ancient Cybersecurity Wisdom  Water shapes its course according to the nature of the ground over which it flows; the soldier works out his victory in relation to the foe whom he is facing.”  “In all fighting the direct method may be used for joining battle, but indirect methods will be needed to secure victory.”
  • 21. “An ounce of prevention is cheaper than the first day of litigation.”
  • 23. www.solidcounsel.com Consumer Litigation Peters v. St. Joseph Services, 74 F.Supp.3d 847 (S.D. Tex. Feb. 11, 2015) Remijas v. Neiman Marcus Group, LLC, 794 F.3d 688, 693 (7th Cir. 2015) Whalen v. Michael Stores Inc., 2015 WL 9462108 (E.D.N.Y. Dec. 28, 2015) In re SuperValu, Inc., 2016 WL 81792 (D. Minn. Jan. 7, 2016) In re Anthem Data Breach Litigation, 2016 WL 589760 (N.D. Cal. Feb. 14, 2016) (J. Lucy Koh)
  • 25. www.solidcounsel.com Regulatory & Administrative - FTC KEY POINT: You must have basic IT security F.T.C. v. Wyndham Worldwide Corp., 799 F.3d 236 (3rd Cir. Aug. 24, 2015).  The FTC has authority to regulate cybersecurity under the unfairness prong of § 45(a) of the Federal Trade Commission Act.  Companies have fair notice that their specific cybersecurity practices could fall short of that provision.  3 breaches / 619,000 records / $10.6 million in fraud  Rudimentary practices v. 2007 guidebook  Website Privacy Policy misrepresentations  Jurisdiction v. set standard?
  • 26. www.solidcounsel.com The Basics “Some people try to find things in this game that don’t exist but football is only two things – blocking and tackling.” -Lombardi
  • 27. www.solidcounsel.com The Basics Best Practices  Documented  Basic IT Security  Basic Physical Security  Security Focused P&P  Company  Workforce  Network  Website / Privacy / TOS  Business Associates  Social Engineering  Implementation  Training
  • 28. www.solidcounsel.com Regulatory & Administrative – FTC KEY POINT: You must evaluate business partners’ security In re GMR Transcription Svcs, Inc., 2014 WL 4252393 (Aug. 14, 2014). FTC’s Order requires business to follow 3 steps when contracting with third party service providers: 1. Investigate before hiring data service providers. 2. Obligate their data service providers to adhere to the appropriate level of data security protections. 3. Verify that the data service providers are complying with obligations (contracts).
  • 29. www.solidcounsel.com Addendum to Business Contracts KEY POINT: Know your contractual obligations  Common names for the Addendum:  Data Security & Privacy; Data Privacy; Cybersecurity; Privacy; Information Security.  Common features  Defines subject “Data” being protected in categories.  Describes acceptable and prohibited uses for Data.  Describes standards for protecting Data.  Describes requirements for deleting Data.  Describes obligations if a breach of Data.  Allocates responsibility if a breach of Data.  Requires binding third parties to similar provisions.
  • 30. www.solidcounsel.com Regulatory & Administrative – SEC KEY POINT: You must have written (1) Policies & Procedures and (2) Incident Response Plan S.E.C. v. R.T. Jones Capital Equities Management, Consent Order (Sept. 22, 2015).  “Firms must adopt written policies to protect their clients’ private information”  “they need to anticipate potential cybersecurity events and  have clear procedures in place rather than waiting to react once a breach occurs.”  violated this “safeguards rule  100,000 records (no reports of harm)  $75,000 penalty
  • 31. www.solidcounsel.com Responding: Execute Response Plan This is only a checklist – not a Response Plan
  • 32. How Fast? • 45 days (most states) • 30 days (some states) • 3 days (fed contracts) • 2 days (bus expectation) • Immediately (contracts)
  • 33. Officer & Director Liability
  • 34. www.solidcounsel.com Officer & Director Liability KEY POINT: “boards that choose to ignore, or minimize, the importance of cybersecurity oversight responsibility, do so at their own peril.” SEC Commissioner Luis A. Aguilar, June 10, 2014.  Heartland Payment Systems, TJ Maxx, Target, Home Depot, Wyndham  Derivative claims premised on the harm to the company from data breach.  Caremark Claims:  Premised on lack of oversight = breach of the duty of loyalty and good faith  Cannot insulate the officers and directors = PERSONAL LIABILITY!  Standard:  (1) “utterly failed” to implement reporting system or controls; or  (2) “consciously failed” to monitor or oversee system.
  • 35. www.solidcounsel.com Officer & Director Liability Palkon v. Holmes, 2014 WL 5341880, *5-6 (D. NJ Oct. 20, 2014).  Derivative action for failing to ensure Wyndham implemented adequate security policies and procedures.  Order Dismissing: The board satisfied the business judgement rule by staying reasonably informed of the cybersecurity risks and exercising appropriate oversight in the face of the known risks.  Well-documented history of diligence showed Board  Discussed cybersecurity risks, company security policies and proposed enhancements in 14 quarterly meetings; and  Implemented some of those cybersecurity measures.
  • 37. www.solidcounsel.com Cyber Insurance – Key Questions  Even know if you have it?  What period does the policy cover?  Are Officers & Directors Covered?  Cover 3rd Party Caused Events?  Social Engineering coverage?  Cover insiders intentional acts (vs. negligent)  Contractual liability?  What is the triggering event?  What types of data are covered?  What kind of incidents are covered?  Acts of war?  Required carrier list for attorneys & experts?  Other similar risks?
  • 38. Virtually all companies will be breached.Will they be liable? It’s not the breach; it’s their diligence and response that matter most. Companies have a duty to be reasonably informed of and take reasonable measures to protect against cybersecurity risks.
  • 40. 3 Must-Haves for Every Organization 1. Basic IT Security 2. Written Policies & Procedures 3. Written Incident Response Plan ***Document3***
  • 41. “You don’t drown by falling in the water; You drown by staying there.”