{"id":54,"date":"2023-02-09T22:12:31","date_gmt":"2023-02-09T22:12:31","guid":{"rendered":"https:\/\/cybersecurity.csulaw.org\/conference\/?page_id=54"},"modified":"2026-04-15T17:30:23","modified_gmt":"2026-04-15T21:30:23","slug":"materials","status":"publish","type":"page","link":"https:\/\/cybersecurity.csulaw.org\/conference\/materials\/","title":{"rendered":"Conference Materials"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-63c0096e wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"\/conference\/wp-content\/uploads\/2026\/04\/CSU-Spring-2026-Enforcement-Risks215275875.1.ppt\">CSU &#8211; Spring 2026 (Enforcement Risks)(215275875.1)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.anthropic.com\/glasswing\">Project Glasswing, Anthropic<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/hai.stanford.edu\/policy\/data-privacy-and-foundation-models-can-we-have-both?mkt_tok=MTM4LUVaTS0wNDIAAAGhEivvU4uHHGgW8094C-cWKPKIbcHBIRPRmeRrcvBE0GwTlWwrz67pci_ybBYExq7IjQLc__4cs-XWvQt9YOoHamjp5YJEsGNX2U471h9IV75Q\">Data Privacy and Foundation Models: Can We Have Both?, Jennifer King and Tiffany Saade (April 2026)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/2025-09-16-meador-nad-keynote.pdf\">Federal Trade Commissioner Mark Meador, <em>Consumer Protection and Public Trust<\/em>, Keynote Address, National Advertising Division<\/a>\u00a0(Sept. 2025)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/meador-6b-ai_statement.pdf\">Statement of Commissioner Mark R. Meador, <em>Section 6(b) Resolution Relating to Generative AI Companion Products or Services<\/em><\/a><em> <\/em>(Sept. 2025)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/cmr-mark-r-meador-attention-economy-keynote-06-03-2025.pdf\">Keynote Remarks of Commissioner Mark R. Meador, <em>The Attention Economy: How Big Tech Firms Exploit Children and Hurt Families<\/em><\/a><em> <\/em>(June 2025)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/p035303ransomwarereport2025.pdf\">Federal Trade Commission, The FTC\u2019s Efforts in the Greater Fight Against Ransomware and Cyber-Related Attacks<\/a> (Jan. 2026)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/2025.09.02-2123075-disney-statement-ferguson-holyoak-meador.pdf\">Statement of Chairman Andrew N. Ferguson Joined by Commissioner Melissa Holyoak and Commissioner Mark R. Meador, <em>United States v. Disney Worldwide Servs., et al.<\/em><\/a>\u00a0(Sept. 2025)<\/li>\n\n\n\n<li><a href=\"\/conference\/wp-content\/uploads\/2026\/04\/Temu-Mass-Arbitration-EDNY-Decision.pdf\">Temu Mass arbitration EDNY decision<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-desktop uag-hide-tab uag-hide-mob is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">Day 1 \u2013 April 16, 2026<\/mark><\/h3>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">8:30am \u2013 9:30am Patchwork in Progress: State Privacy and Cybersecurity Law Developments<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">9:30am \u2013 10:30am Breach Ready: What Your Legal, PR, and Security Teams Need to Agree On Now<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">10:45am \u2013 11:45am Lessons Learned: Recent Privacy, Cybersecurity and AI Enforcement<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">12:30pm \u2013 1:30pm Fireside Chat with Federal Trade Commissioner Mark Meador<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">1:30pm \u2013 2:30pm The Federal Regulatory Landscape<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">2:45pm \u2013 3:45pm Privacy and Data Breach Class Actions<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">3:45pm \u2013 4:45pm The Board Wants Answers: Who Owns What in Cyber Governance?<\/mark><\/h5>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">Day 2 \u2013 April 17, 2026<\/mark><\/h3>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">8:15am \u2013 9:15am Data Ethics (Ohio Ethics CLE Credit pending)<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">9:15am \u2013 10:15am From Defense to Resilience: Securing the AI-Cloud Enterprise<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">10:30am \u2013 11:30am State AI &amp; Security Laws<\/mark><\/h5>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-6-color\">11:30am \u2013 12:30pm AI Governance<\/mark><\/h5>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Day 1 \u2013 April 16, 2026 8:30am \u2013 9:30am Patchwork in Progress: State Privacy and Cybersecurity Law Developments 9:30am \u2013 10:30am Breach Ready: What Your Legal, PR, and Security Teams Need to Agree On Now 10:45am \u2013 11:45am Lessons Learned: Recent Privacy, Cybersecurity and AI Enforcement 12:30pm \u2013 1:30pm Fireside Chat with Federal Trade Commissioner [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-54","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/cybersecurity.csulaw.org\/conference\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Day 1 \u2013 April 16, 2026 8:30am \u2013 9:30am Patchwork in Progress: State Privacy and Cybersecurity Law Developments 9:30am \u2013 10:30am Breach Ready: What Your Legal, PR, and Security Teams Need to Agree On Now 10:45am \u2013 11:45am Lessons Learned: Recent Privacy, Cybersecurity and AI Enforcement 12:30pm \u2013 1:30pm Fireside Chat with Federal Trade Commissioner&hellip;","_links":{"self":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/comments?post=54"}],"version-history":[{"count":20,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/54\/revisions"}],"predecessor-version":[{"id":1718,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/54\/revisions\/1718"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/media?parent=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}