{"id":14,"date":"2023-02-09T19:24:30","date_gmt":"2023-02-09T19:24:30","guid":{"rendered":"https:\/\/cybersecurity.csulaw.org\/conference\/home\/"},"modified":"2026-04-16T11:46:44","modified_gmt":"2026-04-16T15:46:44","slug":"home","status":"publish","type":"page","link":"https:\/\/cybersecurity.csulaw.org\/conference\/","title":{"rendered":"About the Conference"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9fc9c952 wp-block-columns-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<ul class=\"wp-block-list\">\n<li><strong>11 CLE credits approved<br><\/strong>(10 general + 1 professional conduct; <strong><em><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-0-color\">In-person attendees only<\/mark><\/em><\/strong>)<\/li>\n<\/ul>\n\n\n\n<p>Celebrating our 11th year, CSU College of Law\u2019s Cybersecurity and Privacy Protection Conference is one of the leading educational and networking events in Ohio, and features rich content of interest to legal and compliance professionals, information technology and security experts, and executives responsible for developing security and privacy policies.<\/p>\n\n\n\n<p><em>In-person and live stream attendance options.<\/em><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-black-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60);flex-basis:40%\">\n<p>Registration opens at 7:30 am each day in the law school atrium. Program begins at 8:00 am each day.<\/p>\n\n\n\n<p><strong>For additional information and questions, email:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Brian Ray<br><a href=\"mailto:b.e.ray@csuohio.edu\">b.e.ray@csuohio.edu<\/a><\/li>\n\n\n\n<li>Jill Natran<br><a href=\"mailto:j.m.natran@csuohio.edu\">j.m.natran@csuohio.edu<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2f0dbd38 wp-block-columns-is-layout-flex\" style=\"margin-bottom:var(--wp--preset--spacing--60);padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h2 class=\"wp-block-heading\">Cyber+ Law Students Scholarship Fund<\/h2>\n\n\n\n<p>The Center is partnering with the Cleveland Metropolitan Bar Association&#8217;s Cyber+ Section to fund the Cyber+ Law Student Scholarship Fund. This fund will provide financial support to CSU College of Law students and students from other local law schools who are pursuing professional interests in Cybersecurity, Data Privacy and Emerging Technologies.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.clemetrobar.org\/?pg=Donations&amp;cpAction=showDetail&amp;pid=263&amp;cid=316\">Donate<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Keynotes &amp; Featured Speakers<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-5f70565d wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><div class=\"speakers-list\"><div class=\"speaker-item featured\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/09\/meador-mark_headshot_hr-e1758834188577.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Mark Meador<\/div><div class=\"speaker-job-title\">FTC Commissioner<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/mark-meador\/\">.<\/a><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Conference Sponsors<\/h2>\n\n\n<div data-post-id=\"56\" class=\"insert-page insert-page-56 \"><section class=\"sponsor-level sponsor-level-gold-sponsor\"><h2 class=\"sponsor-heading\">Gold Sponsors<\/h2><div class=\"sponsor-logos\"><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.beneschlaw.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"296\" height=\"100\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/benesch.jpg\" class=\"sponsor-logo-image\" alt=\"Benesch\" loading=\"lazy\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.mcdonaldhopkins.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"720\" height=\"150\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/01\/McDonaldHopkins.jpg\" class=\"sponsor-logo-image\" alt=\"McDonaldHopkins\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/01\/McDonaldHopkins.jpg 720w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/01\/McDonaldHopkins-300x63.jpg 300w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.ubglaw.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"2249\" height=\"254\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/UB-Greensfelder-Logo-Reg-2-Color-RGB-01.10.24.jpg\" class=\"sponsor-logo-image\" alt=\"UB Greensfelder\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/UB-Greensfelder-Logo-Reg-2-Color-RGB-01.10.24.jpg 2249w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/UB-Greensfelder-Logo-Reg-2-Color-RGB-01.10.24-300x34.jpg 300w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/UB-Greensfelder-Logo-Reg-2-Color-RGB-01.10.24-1024x116.jpg 1024w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/UB-Greensfelder-Logo-Reg-2-Color-RGB-01.10.24-768x87.jpg 768w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/UB-Greensfelder-Logo-Reg-2-Color-RGB-01.10.24-1536x173.jpg 1536w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/UB-Greensfelder-Logo-Reg-2-Color-RGB-01.10.24-2048x231.jpg 2048w\" sizes=\"auto, (max-width: 2249px) 100vw, 2249px\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/virtuscyber.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"664\" height=\"168\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/virtuscyber-logo.jpg\" class=\"sponsor-logo-image\" alt=\"Virtus\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/virtuscyber-logo.jpg 664w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/virtuscyber-logo-300x76.jpg 300w\" sizes=\"auto, (max-width: 664px) 100vw, 664px\" \/><\/a><\/div><\/section><section class=\"sponsor-level sponsor-level-sponsor\"><h2 class=\"sponsor-heading\">Sponsors<\/h2><div class=\"sponsor-logos\"><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/agileblue.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"800\" height=\"122\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/02\/Agileblue-800px.jpg\" class=\"sponsor-logo-image\" alt=\"Agileblue\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/02\/Agileblue-800px.jpg 800w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/02\/Agileblue-800px-300x46.jpg 300w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/02\/Agileblue-800px-768x117.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.bluebridgenetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"159\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/blue-bridge-logo-web.jpg\" class=\"sponsor-logo-image\" alt=\"Blue Bridge\" loading=\"lazy\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.dinsmore.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"523\" height=\"101\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/03\/Dinsmore-logo.png\" class=\"sponsor-logo-image\" alt=\"Dinsmore\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/03\/Dinsmore-logo.png 523w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/03\/Dinsmore-logo-300x58.png 300w\" sizes=\"auto, (max-width: 523px) 100vw, 523px\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.kaufcan.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"800\" height=\"369\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/Kaufman-Canoles.png\" class=\"sponsor-logo-image\" alt=\"Kaufman Canoles\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/Kaufman-Canoles.png 800w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/Kaufman-Canoles-300x138.png 300w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/Kaufman-Canoles-768x354.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.isao.org\/group\/northeast-ohio-cyberconsortium\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"821\" height=\"222\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/NOCC-logo-white.jpg\" class=\"sponsor-logo-image\" alt=\"Northeast Ohio CyberConsortium\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/NOCC-logo-white.jpg 821w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/NOCC-logo-white-300x81.jpg 300w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/NOCC-logo-white-768x208.jpg 768w\" sizes=\"auto, (max-width: 821px) 100vw, 821px\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.taftlaw.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"2560\" height=\"1129\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Taft-Color-Logo-hi-res-scaled.jpg\" class=\"sponsor-logo-image\" alt=\"Taft\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Taft-Color-Logo-hi-res-scaled.jpg 2560w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Taft-Color-Logo-hi-res-300x132.jpg 300w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Taft-Color-Logo-hi-res-1024x452.jpg 1024w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Taft-Color-Logo-hi-res-768x339.jpg 768w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Taft-Color-Logo-hi-res-1536x678.jpg 1536w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Taft-Color-Logo-hi-res-2048x904.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><a class=\"sponsor-logo-link logo-padded\" href=\"https:\/\/www.vorys.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1150\" height=\"393\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/VORYS-logo-RGB-tagline-e1773248851845.png\" class=\"sponsor-logo-image\" alt=\"Vorys\" loading=\"lazy\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/VORYS-logo-RGB-tagline-e1773248851845.png 1150w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/VORYS-logo-RGB-tagline-e1773248851845-300x103.png 300w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/VORYS-logo-RGB-tagline-e1773248851845-1024x350.png 1024w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/02\/VORYS-logo-RGB-tagline-e1773248851845-768x262.png 768w\" sizes=\"auto, (max-width: 1150px) 100vw, 1150px\" \/><\/a><\/div><\/section>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Celebrating our 11th year, CSU College of Law\u2019s Cybersecurity and Privacy Protection Conference is one of the leading educational and networking events in Ohio, and features rich content of interest to legal and compliance professionals, information technology and security experts, and executives responsible for developing security and privacy policies. In-person and live stream attendance options. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-14","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/cybersecurity.csulaw.org\/conference\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Celebrating our 11th year, CSU College of Law\u2019s Cybersecurity and Privacy Protection Conference is one of the leading educational and networking events in Ohio, and features rich content of interest to legal and compliance professionals, information technology and security experts, and executives responsible for developing security and privacy policies. In-person and live stream attendance options.&hellip;","_links":{"self":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":68,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":1724,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/14\/revisions\/1724"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}