DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Quotes

“Ransomware is the kind of thing…”

Reading Time: 3 mins read
in Quotes, Ransomware

 

“Ransomware is the kind of thing where you can go to bed the night before, lay your head down on your pillow, have your organization doing great, and you wake up in the morning to have everything shut down and your whole world changed. That’s a huge impact. And it’s not just a technical aspect of going through that incident response. But there is also an emotional side.”

Shawn Tuma – Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane, LLP

Source: Secure World

About Shawn Tuma:

Shawn Tuma helps businesses protect their information and protect themselves from their information. He represents a wide range of clients, from small to midsize companies to Fortune 100 companies, across the United States and globally in dealing with cybersecurity, data privacy, data breach and incident response, regulatory compliance, computer fraud related legal issues, and cyber-related litigation.

Having practiced in this area of law since 1999, Shawn is widely recognized in cybersecurity and data privacy law. He is frequently sought out and hired by other lawyers and law firms to advise them when these issues arise in cases for their own clients.

While this area of the law has evolved greatly in the nearly 20 years while Shawn has been practicing, he continues to evolve with it as a practitioner representing his clients, academically as an author and instructor, and as an analyst for the national media.

Shawn’s practice covers three distinct areas:

  • Cyber Risk Management – Proactively helping companies assess and understand their overall cyber risk and then developing, implementing, and maturing a strategic cyber risk management program that prioritizes their efforts to help minimize their cyber risk and meet regulatory compliance requirements.
  • Cyber Incident Response – Leading companies through the cyber incident response and data breach response process (e.g., as a “breach guide” or “breach quarterback”), crisis management, and regulatory compliance investigations and enforcement actions (e.g., by regulators such as various states’ Attorneys General, Department of Health and Human Services / Office of Civil Rights (HHS/OCR), Federal Trade Commission (FTC), and Securities and Exchange Commission (SEC). Tuma serves as a breach guide for insurance companies’ panel of approved counsel.
  • Cyber Security, Hacking, and Data Breach Litigation – Representing clients in litigation involving cyber-related claims like computer and data misuse, computer hacking, data loss, data theft, and business-to-business disputes concerning responsibility for cyber incidents.

Shawn’s ideal role is to serve as a member of a company’s risk management team as outside cybersecurity counsel to help the company proactively prepare for and minimize its risks of doing business in today’s digital business world. Then, if a problem does arise, he is there to guide the company through resolving those issues as well.

Tags: quotesRansomwareRansomware QuotesShawn TumaSpencer Fane
ADVERTISEMENT

Related Posts

“As long as passwords are…”

“As long as passwords are…”

March 28, 2023
“To be effective, passwords must be…”

“To be effective, passwords must be…”

March 28, 2023
“Single-word credentials are no longer safe”

“Single-word credentials are no longer safe”

March 28, 2023
“Many are under the assumption that…”

“Many are under the assumption that…”

March 28, 2023

More Articles

Cyber101

Browser-based password managers

March 27, 2023

Application Security Weekly – Podcast

March 10, 2022
Alerts

VMware security advisory (AV22-145)

March 23, 2022
Tool

Balbix BreachControl platform

February 11, 2022

TestGuild Security Testing Podcast

April 1, 2022
Alerts

Atlassian security advisory (AV22-404)

July 21, 2022
Cyber101

SIEM AS A SERVICE – Definition

March 15, 2022
Incidents

Italian city of Palermo shuts down all systems to fend off cyberattack

June 7, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.