Mary Chaney

 MaryN. Chaney

Mary N. Chaney

  • Courses0
  • Reviews0

Biography

University of Cincinnati - Information Systems

The Cyber Security Law Firm of Texas
Mary N.
Chaney, Esq., CISSP, CIPP/US
I am a licensed attorney with significant operational experience in cyber security, privacy and risk management. I have led teams responsible for cyber-incident management, incident response, cyber-network defense, forensics and e-discovery, internal threat, database security management, security awareness, and data leak prevention, to name a few.

During my career I have also developed and performed risk assessments, business impact analyses, incident response plans, business continuity and disaster discovery plans, drafted information security policies and procedures for small, medium and large enterprises. If it is related to cyber security, I have done it!

So, if you are looking for an attorney that knows the ins and outs of cyber security, that can speak geek as well as legalese, The Law Offices of Mary N. Chaney, P.L.L.C. is the firm for you!


Experience

    Education

    • Texas Southern University—Thurgood Marshall School of Law

      J.D.

      Law

    Publications

    • CREATING HER OWN CYBERSECURITY PATH: FROM JD TO FBI TO CISSP

      (ISC)2 Blog

    • CREATING HER OWN CYBERSECURITY PATH: FROM JD TO FBI TO CISSP

      (ISC)2 Blog

    • 6 Tips For Effective Security Tabletop Testing

      CSO Online

      Contributor to an article written on Effective Tabletop Testing

    • CREATING HER OWN CYBERSECURITY PATH: FROM JD TO FBI TO CISSP

      (ISC)2 Blog

    • 6 Tips For Effective Security Tabletop Testing

      CSO Online

      Contributor to an article written on Effective Tabletop Testing

    • Making Infosec Meetings More Inclusive

      Dark Reading

    • CREATING HER OWN CYBERSECURITY PATH: FROM JD TO FBI TO CISSP

      (ISC)2 Blog

    • 6 Tips For Effective Security Tabletop Testing

      CSO Online

      Contributor to an article written on Effective Tabletop Testing

    • Making Infosec Meetings More Inclusive

      Dark Reading

    • Biometric Security is on the Rise

      CSO Online

      Contributor on an article written on Biometric Security.

    • CREATING HER OWN CYBERSECURITY PATH: FROM JD TO FBI TO CISSP

      (ISC)2 Blog

    • 6 Tips For Effective Security Tabletop Testing

      CSO Online

      Contributor to an article written on Effective Tabletop Testing

    • Making Infosec Meetings More Inclusive

      Dark Reading

    • Biometric Security is on the Rise

      CSO Online

      Contributor on an article written on Biometric Security.

    • What Security Pros Want For The New Year

      CSO Online Magazine

      What Security Pros Want For The New Year

    • CREATING HER OWN CYBERSECURITY PATH: FROM JD TO FBI TO CISSP

      (ISC)2 Blog

    • 6 Tips For Effective Security Tabletop Testing

      CSO Online

      Contributor to an article written on Effective Tabletop Testing

    • Making Infosec Meetings More Inclusive

      Dark Reading

    • Biometric Security is on the Rise

      CSO Online

      Contributor on an article written on Biometric Security.

    • What Security Pros Want For The New Year

      CSO Online Magazine

      What Security Pros Want For The New Year

    • How to Build a Path Toward Diversity in Information Security

      Dark Reading

    • CREATING HER OWN CYBERSECURITY PATH: FROM JD TO FBI TO CISSP

      (ISC)2 Blog

    • 6 Tips For Effective Security Tabletop Testing

      CSO Online

      Contributor to an article written on Effective Tabletop Testing

    • Making Infosec Meetings More Inclusive

      Dark Reading

    • Biometric Security is on the Rise

      CSO Online

      Contributor on an article written on Biometric Security.

    • What Security Pros Want For The New Year

      CSO Online Magazine

      What Security Pros Want For The New Year

    • How to Build a Path Toward Diversity in Information Security

      Dark Reading

    • Crowdsourcing Your Security

      CSO Online

      Contributor to article written on Crowdsourcing Your Security