{"id":733,"date":"2023-02-09T22:07:02","date_gmt":"2023-02-09T22:07:02","guid":{"rendered":"https:\/\/cybersecurity.csulaw.org\/conference\/?page_id=733"},"modified":"2026-04-16T14:46:05","modified_gmt":"2026-04-16T18:46:05","slug":"schedule","status":"publish","type":"page","link":"https:\/\/cybersecurity.csulaw.org\/conference\/schedule\/","title":{"rendered":"Conference Agenda"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-d81a5957 wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:var(--wp--preset--spacing--60);padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-ast-global-color-5-color has-vivid-cyan-blue-background-color has-text-color has-background has-link-color has-medium-font-size has-text-align-center has-custom-font-size wp-element-button\" href=\"https:\/\/csuohio.zoom.us\/webinar\/register\/WN_sFy16thBQaysvCIHVxOP3w\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">Watch Live via Zoom<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Day 1 &#8211; April 16, 2026<\/h3>\n\n\n\n<div class=\"inherit-container-width wp-block-group is-layout-constrained wp-container-core-group-is-layout-a51ffb58 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">7:30am &#8211; 8:15am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Registration &amp; Breakfast<\/h4>\n\n\n\n<p>Sponsored by Virtus Cybersecurity, LLC<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">8:15am &#8211; 8:30am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Welcome &amp; Introductions<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Brian Ray, Co-Interim Dean, CSU Law<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">8:30am &#8211; 9:30am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Patchwork in Progress: State Privacy and Cybersecurity Law Developments<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Marcel Duhamel, Partner, Data Security &amp; Privacy, Vorys LLP<\/li>\n\n\n\n<li>Maxwell Herath, Associate Porter Wright LLP<\/li>\n\n\n\n<li>Ariel Fox Johnson, Principal, Digital Smarts Law &amp; Policy LLC (lead)<\/li>\n\n\n\n<li>Jennifer Reuhr, Co-Managing Partner and Co-Chair, Workplace Privacy Group, Hintze Law PLLC<\/li>\n<\/ul>\n\n\n\n<p>As state legislatures continue to fill the federal vacuum on data privacy and cybersecurity, organizations face an increasingly fragmented compliance environment spanning consumer rights and workplace surveillance to breach reporting and AI. This panel will highlight the most significant state law developments of the past year and emerging obligations on the horizon.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">9:30am &#8211; 10:30am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Breach Ready: What Your Legal, PR, and Security Teams Need to Agree On Now<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gabrielle Hartstein, Associate, Dinsmore LLP<\/li>\n\n\n\n<li>Zachary Jacobson, Associate, McDonald Hopkins LLC<\/li>\n\n\n\n<li>Tim Ragones, Managing Director, Joele Frank<\/li>\n\n\n\n<li>Bogdan Salamakah, CEO, Virtus Cybersecurity, LLC<\/li>\n<\/ul>\n\n\n\n<p>When a data breach occurs, misalignment among legal, communications, and cybersecurity teams can turn a manageable incident into a crisis. This session brings experts in all three domains to discuss the tensions, close the gaps, and help organizations build a successful breach response strategy.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">10:30am &#8211; 10:45am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-8-color\">Networking Break<\/mark><\/h4>\n\n\n\n<p class=\"uag-hide-desktop uag-hide-tab uag-hide-mob\">&lt;Sponsored by McDonald Hopkins LLC&gt;<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">10:45am &#8211; 11:45am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Lessons Learned: Recent Privacy, Cybersecurity and AI Enforcement<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kirk Nahra, Co-Chair Artificial Intelligence, Co-Chair Cybersecurity and Privacy, WilmerHale LLP<\/li>\n<\/ul>\n\n\n\n<p>While approaches and priorities change, privacy and security enforcement continues to expand and evolve. This session will explore recent enforcement developments at both the state and federal level and will provide guidance and thoughts on lessons learned for the future about these enforcement activities.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">11:45am &#8211; 12:30pm<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-8-color\">Lunch<\/mark><\/h4>\n\n\n\n<p>Sponsored by UB Greensfelder LLP<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">12:30pm &#8211; 1:30pm<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Fireside Chat with Federal Trade Commissioner Mark Meador<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mark Meador, Federal Trade Commissioner<\/li>\n\n\n\n<li>Brian Ray, Co-Interim Dean, CSU Law<\/li>\n<\/ul>\n\n\n\n<p>Commissioner Mark R. Meador brings significant experience in competition policy to his tenure at the FTC and draws on that experience to inform his approach to the FTC\u2019s role in regulating data privacy and security. He has identified a consistent set of consumer concerns regarding the attention economy, children\u2019s privacy and safety, the erosion of trust caused by deepfakes, and the risks brought on by psychological attachment to human-like AI, while also highlighting the promise of technological innovation. Join us for a conversation with Commissioner Meador on how the FTC\u2019s competition and consumer protection role is evolving, and where organizations should focus their compliance efforts.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">1:30pm &#8211; 2:30pm<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">The Federal Regulatory Landscape<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Douglas Geho, Deputy Director, Consumer Protection Bureau, Federal Trade Commission<\/li>\n\n\n\n<li>Frances Floriano Goins, Partner, UB Greensfelder LLP<\/li>\n\n\n\n<li>Douglas Meal, Adjunct Professor, CSU Law<\/li>\n\n\n\n<li>Joseph Dickinson, Partner, Kaufman &amp; Canoles<\/li>\n\n\n\n<li>Brian Ray, Co-Interim Dean, CSU Law (moderator)<\/li>\n<\/ul>\n\n\n\n<p>At the federal level, data security and privacy compliance demands are evolving across sectors and disciplines. This panel maps the current federal enforcement environment and explores how regulated organizations should navigate its growing complexity<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">2:30pm &#8211; 2:45pm<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-8-color\">Networking Break<\/mark><\/h4>\n\n\n\n<p>Sponsored by McDonald Hopkins<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">2:45pm &#8211; 3:45pm<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Privacy and Data Breach Class Actions<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>James M. Brennan, Attorney, Squire Patton Boggs LLP<\/li>\n\n\n\n<li>Douglas Meal, Adjunct Professor of Law, CSU Law<\/li>\n<\/ul>\n\n\n\n<p>Privacy and data breach class actions have exploded in volume and complexity, with plaintiffs advancing novel theories under state laws while courts continue to wrestle with standing, injury, and the boundaries of statutory damages liability. This panel brings together seasoned litigators to examine the cases and doctrinal developments reshaping the litigation landscape, from class certification battles and mass arbitration tactics to the negligence frameworks emerging from high-profile breach suits.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">3:45pm &#8211; 4:45pm<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">The Board Wants Answers: Who Owns What in Cyber Governance?<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paul Beckwith, Chief Security Officer, Progressive Insurance<\/li>\n\n\n\n<li>Chris Cronin, Partner, HALOCK<\/li>\n\n\n\n<li>Mehmet Munur, Partner, Taft LLP<\/li>\n\n\n\n<li>Timothy Opsitnick, Executive Director, Sedona Conference<\/li>\n\n\n\n<li>Kevin Baker, CISO Emeritus, Fortress Security Risk Management<\/li>\n<\/ul>\n\n\n\n<p>Boards are demanding clear accountability for cyber risk\u2014without getting lost in technical jargon. This panel breaks down \u201cwho owns what\u201d across legal, privacy\/compliance, and security: decision rights, escalation triggers, metrics that mean something, and how to document risk acceptance so it holds up under audit, regulatory scrutiny, and post-incident review.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">4:45pm &#8211; 6:00pm<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-8-color\">Reception<\/mark><\/h4>\n\n\n\n<p class=\"uag-hide-desktop uag-hide-tab uag-hide-mob\">&lt;Sponsored by Centric Consulting&gt;<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Day 2 &#8211; April 17, 2026<\/h3>\n\n\n\n<div class=\"inherit-container-width wp-block-group is-layout-constrained wp-container-core-group-is-layout-a51ffb58 wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">8:00am &#8211; 8:15am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Welcome &amp; Introductions<\/h4>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">8:15am &#8211; 9:15am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">Data Ethics (Ohio Ethics CLE Credit pending)<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kirk Herath, Senior Fellow and Adjunct Professor, CSU Law (lead)<\/li>\n\n\n\n<li>Brian Mannion, Chief Legal Officer, Aware<\/li>\n\n\n\n<li>Dr. Arlonda Stevens, VP Senior Compliance Program Manager, PNC Bank<\/li>\n<\/ul>\n\n\n\n<p>Organizations face difficult challenges when it comes to ethically informed data collection, sharing and use. There is also a growing demand for incorporating ethical considerations into products and services involving big data, AI, and machine learning, and increasing recognition of the potential bias in them. This panel will discuss these challenges as well as emerging best practices for ethical data collection, processing and use and mitigating bias in the use of AI.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">9:15am &#8211; 10:15am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">From Defense to Resilience: Securing the AI-Cloud Enterprise<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Robert Eckman, CUI Program Operations Manager, ABB, Inc.<\/li>\n\n\n\n<li>Kevin Goodman, Managing Director, Partner, BlueBridge Networks<\/li>\n\n\n\n<li>Marcus Noel, Chief Security Officer, ReliabilityFirst Corporation<\/li>\n\n\n\n<li>Tony Pietrocola, Co-Founder and President, AgileBlue<\/li>\n\n\n\n<li>Spence Witten, Senior Advisor, 38 North Security (lead)<\/li>\n<\/ul>\n\n\n\n<p>The convergence of AI and cloud has dramatically expanded both the attack surface and the tools available to defenders creating new opportunities for organizations willing to rethink security from the ground up. Drawing on experience spanning cloud infrastructure services, AI-driven threat detection, and cybersecurity advisory across healthcare, financial services, and critical infrastructure, this panel examines how forward-thinking organizations are shifting from reactive defense to proactive resilience.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">10:15am &#8211; 10:30am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-ast-global-color-8-color\">Networking Break<\/mark><\/h4>\n\n\n\n<p>Sponsored by Benesch<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">10:30am &#8211; 11:30am<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">State AI &amp; Security Laws<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Jessica Cohen, Senior Counsel, Verizon<\/li>\n\n\n\n<li>Jeremy Mio, Interim Deputy Chief Technology Officer, Cuyahoga County<\/li>\n\n\n\n<li>Cory Scott, Executive Director, Center for Cybersecurity &amp; Privacy Protection, CSU Law<\/li>\n<\/ul>\n\n\n\n<p>This panel will give attendees a practical, Ohio-focused overview of two fast-moving areas: HB 96 cybersecurity requirements for political subdivisions and the current landscape for AI regulation. Speakers will lay out what HB 96 expects (including incident reporting and the state\u2019s posture on ransom payments), then move into what AI bills and policy proposals are realistically in play in Ohio and how they compare to activity in other states. The discussion will emphasize real-world implementation and enforcement challenges\u2014especially what audits and evidence expectations may look like, and the resource constraints facing both government entities and regulators.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a3a1f8a3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column .newwidth {width:200px;} is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<h6 class=\"wp-block-heading\">11:30am &#8211; 12:30pm<\/h6>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\">\n<h4 class=\"wp-block-heading\">AI Governance<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Brenda Leong, Director, AI Division, Zwillgen PLLC<\/li>\n\n\n\n<li>Kevin Mooney, Associate General Counsel, Privacy &amp; Regulatory Chair, SureScripts<\/li>\n\n\n\n<li>Matthew Neely, Director of Information Security, Progressive Insurance<\/li>\n\n\n\n<li>Michael Stovsky, Partner and Practice Chair, Benesch LLP<\/li>\n\n\n\n<li>Cory Scott, Executive Director, Center for Cybersecurity &amp; Privacy Protection CSU Law<\/li>\n<\/ul>\n\n\n\n<p>As AI moves from pilot to production across every sector, organizations are under growing pressure to govern it responsibly while navigating emerging state laws, federal agency guidance, and evolving standards like the NIST AI Risk Management Framework. This panel tackles the hard questions: how to operationalize risk management, where legal liability is crystallizing, and what organizations getting this right are actually doing differently.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Day 1 &#8211; April 16, 2026 7:30am &#8211; 8:15am Registration &amp; Breakfast Sponsored by Virtus Cybersecurity, LLC 8:15am &#8211; 8:30am Welcome &amp; Introductions 8:30am &#8211; 9:30am Patchwork in Progress: State Privacy and Cybersecurity Law Developments As state legislatures continue to fill the federal vacuum on data privacy and cybersecurity, organizations face an increasingly fragmented compliance [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-733","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/cybersecurity.csulaw.org\/conference\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Day 1 &#8211; April 16, 2026 7:30am &#8211; 8:15am Registration &amp; Breakfast Sponsored by Virtus Cybersecurity, LLC 8:15am &#8211; 8:30am Welcome &amp; Introductions 8:30am &#8211; 9:30am Patchwork in Progress: State Privacy and Cybersecurity Law Developments As state legislatures continue to fill the federal vacuum on data privacy and cybersecurity, organizations face an increasingly fragmented compliance&hellip;","_links":{"self":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/comments?post=733"}],"version-history":[{"count":71,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/733\/revisions"}],"predecessor-version":[{"id":1725,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/pages\/733\/revisions\/1725"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/media?parent=733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}