Toledo Cybersecurities Conference

The University of Toldeo College of Law is sponsoring what sounds like it will be a great conference on Cybersecurities regulation. I wish I could go. But as the first presenter on the first panel is my wife, someone has to stay home.

The Tenth Anniversary of Cybersecurities Law

Friday, April 8, 2005
9:00 a.m. to 2:30 p.m.
University of Toledo College of Law

Co-sponsored by the Cybersecurities Law Institute, the Stranahan National Issues Forum, and the University of Toledo Law Review

Keynote speaker:

John Reed Stark, Chief of Office of Internet Enforcement and Counselor to Director of Enforcement, U.S. Securities and Exchange Commission
Recent Developments in Cybersecurities Fraud Enforcement

Moderator: Prof. Howard M. Friedman, Director, Cybersecurities Law Institute, University of Toledo

Presenters:

Panel I: The Challenge of Technology

Prof. Caroline M. Bradley, University of Miami School of Law
Information Society Challenges to Financial Regulation

Prof. Olufunmilayo Arewa , Case Western Reserve University School of Law: Securities Law and Technology: Translation and Accommodation in Cyberspace

Panel II: The SEC's New Securities Offering Rules (Proposals)

Broc Romanek, Esq., Editor, TheCorporateCounsel.net
David C. Lee, Esq., Gibson, Dunn & Crutcher, Washington, D.C.
E-Communications by Public Companies: Inside and Outside the Offering Context

Panel III: Innovative Uses of Cyberspace

Prof. Christine Hurt, Marquette University Law School
What Google Can't Tell Us About IPO Auctions (And What It Can)

Dr. Dirk Zetzsch, Heinrich Heine University (Dusseldorf)
Corporate Governance in Cyberspace-The Impact of Virtual Shareholder Meetings

Panel IV: The Internet and International Securities Issues
Dr. Paul U. Ali, University of New South Wales
Cyberderivatives-Online Retail Markets in International Equity Betting

Prof. Dimity Kingsford-Smith, University of New South Wales
Follow My Leader? Similarities and Differences in Australian and US Online Investing Regulation

This entry was posted in Law: Internet Law. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *