{"id":50,"date":"2023-02-09T22:10:34","date_gmt":"2023-02-09T22:10:34","guid":{"rendered":"https:\/\/cybersecurity.csulaw.org\/conference\/?page_id=50"},"modified":"2025-09-03T17:50:40","modified_gmt":"2025-09-03T21:50:40","slug":"speakers","status":"publish","type":"page","link":"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/","title":{"rendered":"Speakers"},"content":{"rendered":"<div class=\"speakers-list\"><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/Kevin-Baker-Headshot.png)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Kevin\u00a0Baker<\/a><\/div><div class=\"speaker-job-title\">CISO Emeritus, Fortress Security Risk Management<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/kevin-baker\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/Brennan_J_Master-e1776275645187.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">James M. Brennan<\/a><\/div><div class=\"speaker-job-title\">Attorney, Squire Patton Boggs (US) LLP<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/james-m-brennan\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/1625079618572.jpeg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Kristin L. Bryan<\/a><\/div><div class=\"speaker-job-title\">Partner, Squire Patton Boggs<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/kristin-l-bryan\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Jessica-Cohen-Headshot-2026-scaled-e1774473598985.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Jessica Cohen<\/a><\/div><div class=\"speaker-job-title\">Senior Counsel, Regulatory Affairs; AI, Cybersecurity, &amp; Privacy, Verizon<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/jessica-cohen\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Chris-Cronin-ISO-27001-Auditor-Reasonable-Risk-edited.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Chris Cronin<\/a><\/div><div class=\"speaker-job-title\">Partner, HALOCK<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/chris-cronin\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Joseph-A.-Dickinson-cropped.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Joseph A. Dickinson<\/a><\/div><div class=\"speaker-job-title\">Of Counsel, Co-Chair of Data Privacy and Security, Kaufman &amp; Canoles<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/joseph-a-dickinson\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/DUHAMEL__MARCEL_425x500-e1773249201386.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Marcel Duhamel<\/a><\/div><div class=\"speaker-job-title\">Partner, Vorys<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/marcel-duhamel\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2026\/04\/Robert-Eckman.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Robert Eckman<\/a><\/div><div class=\"speaker-job-title\">CUI Program Operations Manager, ABB, Inc.<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/robert-eckman\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/nx6BnSPByCtsp5BHsDA225lBaCuoZUncdW6ePBCW.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Douglas Geho<\/a><\/div><div class=\"speaker-job-title\">Deputy Director of the Bureau of Consumer Protection, Federal Trade Commission<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/douglas-geho\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/02\/goins_frances_bio-default-headshot-photo-141-e1743135752240.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Frances Floriano Goins<\/a><\/div><div class=\"speaker-job-title\">Partner, UB Greensfelder<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/frances-floriano-goins\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/MG3_0029B-scaled.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Kevin Goodman<\/a><\/div><div class=\"speaker-job-title\">Managing Director, BlueBridge Networks<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/kevin-goodman\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/04\/Hartstein-Gabrielle_main-default-headshot-photo-45727.png)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Gabrielle A. Hartstein<\/a><\/div><div class=\"speaker-job-title\">Associate Attorney, Dinsmore &amp; Shohl LLP<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/gabrielle-a-hartstein\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/02\/Kirk_Herath_flags-1-edited.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Kirk Herath<\/a><\/div><div class=\"speaker-job-title\">Adjunct Professor, CSU College of Law<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/kirk-herath\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Herath_Maxwell_2023-edited-e1741222841903.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Maxwell Herath<\/a><\/div><div class=\"speaker-job-title\">Associate, Porter Wright Morris &amp; Arthur LLP<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/maxwell-herath\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Zachary-Jacobson-e1773249719569.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Zachary Jacobson<\/a><\/div><div class=\"speaker-job-title\">Associate, McDonald Hopkins<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/zachary-jacobson\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/afjheadshot21_copy_1-e1741245842602.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Ariel Fox Johnson<\/a><\/div><div class=\"speaker-job-title\">Principal, Digital Smarts Law &amp; Policy LLC<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/ariel-fox-johnson\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/02\/Brenda-Leong144058-scaled.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Brenda Leong<\/a><\/div><div class=\"speaker-job-title\">Director, AI Division<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/brenda-leong\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Brian-Mannion-edited-e1775093997183.png)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Brian\u00a0Mannion<\/a><\/div><div class=\"speaker-job-title\">Director of Data Privacy, Northwest Bank<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/brian-mannion\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/09\/meador-mark_headshot_hr-e1758834188577.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Mark Meador<\/a><\/div><div class=\"speaker-job-title\">FTC Commissioner<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/mark-meador\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal.png)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Douglas H. Meal<\/a><\/div><div class=\"speaker-job-title\">Adjunct Professor, CSU College of Law<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/douglas-h-meal\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/kevin-mooney.jpeg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Kevin Mooney<\/a><\/div><div class=\"speaker-job-title\">Associate General Counsel, Surescripts<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/kevin-mooney\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/03\/Munur-Mehmet-Landing-edited-e1741222896739.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Mehmet Munur<\/a><\/div><div class=\"speaker-job-title\">Partner, Taft<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/mehmet-munur\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/nahra_kirk_216.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Kirk Nahra<\/a><\/div><div class=\"speaker-job-title\">Partner and Co-Chair Privacy and Cybersecurity Practice, WilmerHale<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/kirk-nahra\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/Marcus-Noel-scaled-e1774464958450.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Marcus Noel<\/a><\/div><div class=\"speaker-job-title\">VP &amp; Chief Security Officer, ReliabilityFirst<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/marcus-noel\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/Edited-20100420-joes-0204-e1741224411504.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Tim Opsitnick<\/a><\/div><div class=\"speaker-job-title\">Executive Vice President and General Counsel, TCDI<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/tim-opsitnick\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2024\/02\/Tony-Pietrocola.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Tony Pietrocola<\/a><\/div><div class=\"speaker-job-title\">Co-Founder and President, AgileBlue<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/tony-pietrocola\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/04\/Ragones_Tim-e1743628432897.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Tim Ragones<\/a><\/div><div class=\"speaker-job-title\">Managing Director, Joele Frank<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/tim-ragones\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/02\/headshots-jennifer-ruehr-001-linkedin.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Jennifer Ruehr<\/a><\/div><div class=\"speaker-job-title\">Co-Managing Partner, Hintze Law PLLC<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/jennifer-ruehr\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/Bogdan-Salamakha-scaled-e1742493472711.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Bogdan Salamakha<\/a><\/div><div class=\"speaker-job-title\">Founder, Virtus Cybersecurity<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/bogdan-salamakha\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2025\/03\/Cory-Scott.jpeg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Cory Scott<\/a><\/div><div class=\"speaker-job-title\">Principal, Security Simulations<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/cory-scott\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/arlonda-stevens-e1771948782562.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Arlonda Stevens<\/a><\/div><div class=\"speaker-job-title\">VP, Sr. Compliance Program Advisor, PNC Bank<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/arlonda-stevens\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Stovsky_Mike_web2019-e1741222956754.jpg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Michael D. Stovsky<\/a><\/div><div class=\"speaker-job-title\">Chair, Intellectual Property Practice Group; Team Lead, IP and Technology Transactions, Benesch<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/michael-d-stovsky\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/04\/Jess-Walpole.webp)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Jess Walpole<\/a><\/div><div class=\"speaker-job-title\">President, Fortress Security Risk Management<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/jess-walpole-2\/\">.<\/a><\/div><div class=\"speaker-item\"><div class=\"speaker-item-col1\"><div class=\"speaker-image\" style=\"background-image: url(https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/1578856947545-e1741223608484.jpeg)\"> <\/div><\/div><div class=\"speaker-item-col2\"><div class=\"speaker-info\"><div class=\"speaker-name\">Spence Witten<\/a><\/div><div class=\"speaker-job-title\">Adjunct Professor, CSU College of Law<\/div><\/div><\/div><a class=\"speaker-link\" href=\"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/spence-witten\/\">.<\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-50","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/cybersecurity.csulaw.org\/conference\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/50","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":113,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/50\/revisions"}],"predecessor-version":[{"id":1542,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/50\/revisions\/1542"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/media?parent=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}