PERVASIVE TECHNOLOGY INSTITUTE
Indiana University

Home

Speakers

Program & Schedule

Registration

Lodging & Directions

Contact Us
 

Speakers

Susan BlairSusan Blair
Susan Blair is Chief Privacy Officer for the University of Florida. Blair oversees privacy policies and protections for student records, health information, and other personally identifiable information such as Social Security numbers. When privacy breaches occur, Blair coordinates the University’s investigation and response. Blair holds a Master of Science in Jurisprudence (MSJ), a Master of Business Administration (MBA), and Certified Information Privacy Professional (CIPP) and Certified Internal Auditor (CIA) certifications.
 

 


Fred H. CateFred H. Cate
Fred H. Cate is a Distinguished Professor, C. Ben Dutton Professor of Law, Adjunct Professor of Informatics and Computing, and director of the Center for Applied Cybersecurity Research at Indiana University.

Professor Cate is a member of Microsoft's Trustworthy Computing Academic Advisory Board, Intel’s Academic Advisory Board, the Center for Applied Identity Management Research Board of Directors, the Privacy Projects Board of Directors, the Trustee Board of Advisors, and BNA’s Privacy & Security Law Report Advisory Board. He also serves as a senior policy advisor to the Centre for Information Policy Leadership at Hunton & Williams LLP and as editor of the Privacy Department of the IEEE's (Institute of Electrical and Electronic Engineers) Security & Privacy.

Previously, Professor Cate served as a member of the National Academy of Sciences Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals, reporter for the American Law Institute's project on Principles of the Law on Government Access to and Use of Personal Digital Information, counsel to the Department of Defense Technology and Privacy Advisory Committee, reporter for the third report of the Markle Task Force on National Security in the Information Age, and member of the Federal Trade Commission's Advisory Committee on Online Access and Security. He directed the Electronic Information Privacy and Commerce Study for the Brookings Institution, and chaired the International Telecommunication Union's High-Level Experts on Electronic Signatures and Certification Authorities. In 2008, he served as a privacy advisor to the campaign of then-Senator Barack Obama.

Professor Cate has testified before numerous congressional committees, and he frequently speaks before professional, industry, and government groups. He is the author of more than 100 articles and books, with regular appearances in national media, and he serves as the President and a Fellow of the Phi Beta Kappa Society and an elected member of the American Law Institute. Cate attended Oxford University and received his J.D. and his A.B. with Honors and Distinction from Stanford University.

Top of page


Michael CornMichael Corn
Michael Corn is the Chief Privacy and Security Officer for the University of Illinois at Urbana-Champaign. In addition to overseeing the campus Security Office, Corn's responsibilities include the Commission on Accreditation for Law Enforcement Agencies (CALEA), security and privacy provisions in contracts for electronic services, and IT policy. Corn is a member of the Educause CALEA Technical Team and the State of Illinois Public Key Infrastructure Policy Board. His most recent publication addresses cloud computing and strategic outsourcing.

He is a graduate of the University of Colorado at Boulder and the University of Illinois at Urbana-Champaign.

 


Tom DavisTom Davis
Tom is Indiana University's Chief Information Security Officer. In this role, Tom advises IU administration on information security issues and directs the efforts of the University Information Security Office (UISO). The UISO is responsible for university-wide security standards administration, technical risk assessment programs, security reviews and consulting, technical security resources, and technical responses to security incidents. Before his current appointment, Tom managed the data security and accounts administration groups at IU. Tom has worked in the information security field since 1991, is a Certified Information Systems Security Professional (CISSP), a Certified Information Security Manager (CISM), and holds a BS in Computer Science from Indiana University (1987).

 


Gabriel IovinoGabriel Iovino
Gabriel Iovino is a Principal Security Engineer with REN-ISAC. The REN-ISAC is an integral part of higher education's strategy to improve network security through information collection, analysis, dissemination, early warning, and response. Gabriel holds a Masters degree in Network Security from Capitol College and a Bachelors of Science with a concentration in Computer Information Systems from Indiana University. Before joining the REN-ISAC Gabriel worked for Indiana University.

 
 

Top of page


Merri Beth LavagninoMerri Beth Lavagnino
Merri Beth Lavagnino is Chief Privacy Officer and Compliance Coordinator within the Indiana University Office of the Vice President for Information Technology. In this role, she develops and maintains policies regarding the appropriate use of information technology, administering education programs about common technology and security issues and concerns. Lavagnino coordinates investigations and responses to reports of abuse or inappropriate use of electronic information or information technology, interacting daily with and on behalf of students, faculty, and staff. She also works closely with University administration, judicial officers, Counsel, and other IU agencies, as well as internal and external law enforcement and prosecutors. Lavagnino earned her Master's degree in Library and Information Science from Indiana University in 1989, and earned a Bachelor's degree in Education from Temple University in 1985. She earned the Certified Information Privacy Professional (CIPP) credential in 2007.

 


Dave MuehlingDave Muehling
Dave Muehling is a Director within Gartner’s consulting services. He covers security and risk management, identity and access management, directory services, provisioning, authentication, role based access control, and federated identity. Before the Burton Group acquisition by Gartner, Dave was a Senior Consultant at Burton Group. While at Burton Group, Dave worked with several Higher Education institutions and Fortune 500 companies designing strategies for a multitude of security and identity management programs. With 16 years of experience, Dave has held numerous executive and architecture positions at private and public companies. In addition to his experience in security, Dave has architected and designed large-scale customer facing and internally facing services (portal, web, and service integrations) spanning multiple domains including: e-commerce, education, health care, customer relationship management, and collaboration.

 


Doug PearsonDoug Pearson
Doug Pearson is the Technical Director of REN-ISAC. Doug is charged with aiding and promoting cybersecurity operational protection and response within the context of a private community of trusted representatives at member institutions, and in service to the higher education and research community at-large. REN-ISAC serves as a trusted partner for served networks, the formal US ISAC community, and in other commercial, governmental, and private security information sharing relationships.

 

Top of page


Jane RosenthalJane Rosenthal
Jane Rosenthal is the Privacy Coordinator for the University of Kansas located in Lawrence, Kansas. In this role, Rosenthal is responsible for coordinating campus-wide policies, procedures, and review of various State and Federal laws with privacy provisions (including HIPAA, FERPA, and GLBA). Prior to this position, Jane served for 7 years at the University of Kansas Medical Center Research Institute, Inc. as the Corporate Counsel responsible for all research contracts, public and private, received by the KUMC campuses. Jane earned her Bachelor of Arts in International Affairs at the University of Colorado at Boulder and her Juris Doctor from the University of Kansas School of Law.

 
 


Bruce SchneierBruce Schneier
Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a "security guru," he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier.

His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His current book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.

Regularly quoted in the media, he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.

Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons from security stories that make the news.

Top of page


Jan SheetsJan Sheets
Jan Sheets serves as the Chief Information Security Officer for Ivy Tech Community College of Indiana. Ivy Tech is the largest public post-secondary institution in Indiana and the nation’s largest statewide community college with single accreditation. Sheets oversees the efforts of the Information Security Office and is responsible for college-wide information and access security, policy development, technical risk assessments, intrusion detection monitoring, account provisioning, security education and consulting, investigation of inappropriate use of information or resources, and disaster recovery planning. Prior to Information Security, she held several technical management positions at both the campus and statewide levels. Sheets received her M.S. from Indiana State University.

 


Tom SteffesTom Steffes
Tom Steffes is the Director of Computing Services at Earlham College, a position that he has held since January of 2001.  Prior to the Directorate, Tom held the position of Systems Administrator at Earlham from July of 1998 to December of 2000. Tom has a Bachelor's degree in Secondary Education from Taylor University, a Masters Degree in Information and Communication Science from Ball State University, and is a 2007 Frye Leadership Institute Fellow.

 

 

 


Lauren SteinfeldLauren Steinfeld
Lauren Steinfeld, JD, is the Chief Privacy Officer for the University of Pennsylvania. She works on a wide variety of privacy issues, including building privacy protections in IT systems and protecting student records, medical data, and Social Security numbers. Prior to this, she worked as the Associate Chief Counselor for Privacy at the Office of Management and Budget, where she helped the Clinton Administration develop the HIPAA medical privacy regulations. She also served as Attorney Advisor to Federal Trade Commissioner Mozelle Thompson, during which she was involved in the legal and policy aspects of some of the first Internet- and privacy-related cases brought by the FTC. Steinfeld received her BA from the University of Pennsylvania and JD from New York University School of Law.

Top of page

 

Copyright © 2010 The Trustees of Indiana University | Copyright Complaints