NKU Security Symposium


2013 Security Symposium – was held October 18, 2013

The 2013 Security Symposium focused on IT security challenges, best practices, and professional discussions. This annual symposium brings together IT professionals for engaging talks, training, and live demos of cutting edge security products.

CLE Materials from the program remain available:

Jon M. Garon, NKU Chase College of Law, Data Security: Breach Notification Law Issues [pdf]

Jennifer Orr Mitchell, Dinsmore & Shohl LLP, Attorneys and Other Contractors – HIPAA Business Associates in 2014 and Beyond [pdf]

The legal track emphasized legal issues in privacy and security.

  • John C. (Jack) Greiner, Graydon Head, “Avoiding Legal Detours When Going Mobile” [Abstract]
  • Scot Ganow, Faruki Ireland & Cox P.L.L.,“A Perfect (Snow) storm:  What the NSA Surveillance ScandalTeaches Companies About Managing the Human Element of Information Security” [Abstract]
  • Jennifer Mitchell, Dinsmore & Shohl LLP,“Attorneys and Other Contractors – HIPAA Business Associates in 2014 And Beyond” [Abstract]
  • Michael G. Carr, University of Kentucky,“Coming to a Town Near You: Federal Breach Notification Laws” [Abstract]

The Security Symposium is organized into five tracks:

  • Information Security Governance
    This informational track focuses on the understanding and implementation of management policy, procedures, IT audits, continuity planning, and security awareness and training.
  • Software Security
    This track incorporates knowledge about how identity theft is being fought and information integrity is being secured by industry ingenuity.
  • Mobile & Computer Forensics
    Learn the latest methods and tools to process and understand digital evidence.
  • Current Topics in Security
    Explore security topics focused around cloud computing, virtualization, mobile, and much more.
  • Legal Issues in Privacy and Security
    Security professionals and legal professionals will come together during this track to discuss the legal and regulatory framework for the implementation of software security.



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s