The Law Offices of Mary N. Chaney, P.L.L.C.
The Cyber Security Law Firm of Texas

Mary's Blog

The Breach Whisperer

About Mary....

Mary N. Chaney, Esq., CISSP® is a former Special Agent for the FBI where she investigated cybercrime, a seasoned corporate executive that built and operated information security teams and now a cybersecurity attorney.

As a self-described “Breach Whisperer” our firm can train your company to properly prepare for your eventual breach!

The overall goal of our firm is to use our wealth of knowledge and expertise to help support, translate and advise, Boards of Directors, CIO's, CISO's and General Counsel's on how to legally protect their company from cyber related risk.

Blog Entries


In-Car Cybersecurity Platform C2A Raises 6.5M

See Article Here

When searching for articles to blog about I look for and tell my folks who assist me to look for, new things in cybersecurity and privacy. The attached article is how C2A is building out a cybersecurity platform for cars. The first thing I thought about was who in the world is going to be monitoring these systems, is every car maker now going to build out a SecOps center to fight these threats for their cars? Please don’t tell me you are expecting the average consumer to be able to understand right? There are enough distractions and bells and whistles and things that light up in cars now, what happens when a driver gets an alert that their system has a security issue? Is this something I want my mom to worry about as she is driving down the road? And if they have the ability to track my mom’s car what are the privacy implications of that? In other words, lots of questions but not many answers. 

I believe IoT cybersecurity platforms are going to be on the rise it can be an easy sell, we are again selling based on fear not necessarily likelihood. Anytime we in cybersecurity create a shiny new toy to solve a problem we are inevitably creating more vulnerabilities in systems. More targets for hackers to go after.

I have said it time and time again, technology cannot solve our problems in cybersecurity because technology is our problem in cybersecurity!