0% found this document useful (0 votes)
188 views5 pages

Susan W

The two day International Conference on Cybercrime organized by the International Cybercrime Center and Digital Bridge Institute concluded on November 2nd, 2010. It included presentations on cyber security challenges and solutions, cyber threats to national interests, establishing a national cyber security strategy, cybercrime case studies, investigating cybercrime, and establishing a national Computer Emergency Readiness Team (CERT). The conference brought together participants from industries, academia, the military, and government to address cybercrime issues in Nigeria.

Uploaded by

YAHAYA GOBIR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
188 views5 pages

Susan W

The two day International Conference on Cybercrime organized by the International Cybercrime Center and Digital Bridge Institute concluded on November 2nd, 2010. It included presentations on cyber security challenges and solutions, cyber threats to national interests, establishing a national cyber security strategy, cybercrime case studies, investigating cybercrime, and establishing a national Computer Emergency Readiness Team (CERT). The conference brought together participants from industries, academia, the military, and government to address cybercrime issues in Nigeria.

Uploaded by

YAHAYA GOBIR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

Susan W.

Brenner
NCR Distinguished Professor of Law and Technology
Full-Time Faculty:
School of Law:

 Location: 421 Keller Hall


 Phone: 937-229-2929
 Email: Contact
 Webpage: http://cyb3rcrim3.blogspot.com/

Profile

Susan W. Brenner is NCR Distinguished Professor of Law and Technology at the University of
Dayton School of Law. She specializes in two distinct areas of law: grand jury practice and
cyberconflict, i.e., cybercrime, cyberterrorism and cyberwarfare.

In 1996, Professor Brenner and then Assistant U.S. Attorney Gregory Lockhart published
Federal Grand Jury: A Guide to Law and Practice, which was a treatise addressing the various
aspects of grand jury practice in the federal system. The book went into a second edition in 2007.
Professor Brenner is also the author of a law review article dealing with state grand jury practice
and the chapter, “The Grand Jury Speaks,” that will appear in Grand Jury 2.0. Grand Jury 2.0,
which is edited by Professor Roger Fairfax of the George Washington University School of Law,
will be published by Carolina in October 2010.

Professor Brenner has spoken at numerous events, including two Interpol Cybercrime
Conferences, the Middle East IT Security Conference, the American Bar Association’s National
Cybercrime Conference and the Yale Law School Conference on Cybercrime. She spoke on
cyberthreats and the nation-state at the Department of Homeland Security’s Global Cyber
Security Conference and participated in a panel discussion of national security threats in
cyberspace sponsored by the American Bar Association’s Standing Committee on Law and
National Security. In 2009, she spoke at a meeting on cyberthreats organized by the U.S.
Department of State Bureau of Intelligence and Research & National Intelligence Council. She
has also spoken at a NATO Workshop on Cyberterrorism in Bulgaria and on terrorists’ use of the
Internet at the American Society of International Law conference. She was a member of the
European Union’s CTOSE project on digital evidence and served on two Department of Justice
digital evidence initiatives. Professor Brenner chaired a Working Group in an American Bar
Association project that developed the ITU Toolkit for Cybercrime Legislation for the United
Nation’s International Telecommunications Union. She is a senior principal for Global
CyberRisk, LLC.

Professor Brenner is a member of the American Academy of Forensic Sciences. She has
published a number of law review articles dealing with cybercrime. In 2010, Praeger published
her most recent book, Cybercrime: Criminal Threats from Cyberspace. She also writes a blog,
CYB3RCRIM3.
Courses Taught

LAW 6107 Criminal Law


LAW 6112 Criminal Procedure
LAW 6215 Advanced Criminal Law
LAW 6924 Capstone: Cybercrime

Degrees

J.D., Indiana University (Bloomington), 1981


M.A., Kent State University, 1971
B.A., Southwestern Oklahoma State University, 1968

Areas Of Law

Criminal Law
Cybercrimes

Selected Publications

SSRN Page

Cybercrime: Criminal Threats from Cyberspace (Praeger, 2010)

Cyberthreats: The Emerging Fault Lines of the Nation State (Oxford University Press, 2009)

Fantasy Crime, 11 Vanderbilt Journal of Technology and Entertainment Law 1 (2008)

Law in an Era of “Smart” Technology (Oxford University Press, 2007)

State-Sponsored Crime: The Futility of the Economic Espionage Act, 26 Houston Journal of
International Law 1 (2006)

Distributed Security: Preventing Cybercrime, John Marshall Journal of Computer and


Information Law (with Leo Clarke, 2006)

Law in an Era of Pervasive Technology, Widener Law Journal (2006)

Cybercrime Jurisdiction in Crime, Law and Social Change, published in Crime, Law and Social
Change (2006)

Fourth Amendment Protection for Shared Privacy Rights in Stored Transactional Data, Journal
of Law and Policy (with Leo L. Clarke, 2006)

Digital Evidence: Computer Simulations and Animations, Computer & Telecommunications


Law Review (2005)
Requiring Protocols in Computer Search Warrants, Digital Investigation (2005)

Distributed Society: Moving Away From Reactive Law Enforcement, published in both the
International Journal of Communications Property and the Yale Journal of Law and Technology
(2004)

Cybercrime Metrics: Old Wine, New Bottles?, 9 Virginia Journal of Law & Technology 13
(2004)

Approaches to Cybercrime Jurisdiction, 4 Journal of High Technology Law 1 (with Bert-Jaap


Koops, 2004)

Cybercrime Law: Defining Offenses, 6 Information Systems Frontiers (2004)

Toward a Criminal Law for Cyberspace: A New Model of Law Enforcement? 30 Rutgers
Computer & Technology Law Journal (2004)

Toward a Criminal Law for Cyberspace: Distributed Security, 10 Boston University Journal of
Science & Technology Law (2004)

Efforts to Develop Transnational Legal Standards Governing Cybercrime: The Council of


Europe and the G8, 1 GCC Legal Journal 8, State of Qatar (2003)

Grand Juries: The Sword and the Shield, Case in Point: California Continuing Education for the
Bar (2003)

A Survey and Assessment of National and Transnational Efforts to Harmonize Cybercrime Law,
Interpol Computer Crime Manual (2003)

The Challenges of Cybercrime, United Nations Interregional Crime & Justice Research Institute
Journal 14 (with Marc Goodman, 2002)

Cybercrime Statutes and Case Law, Chapter 15 in Data Privacy and Electronic Security (West
Publishing 2002)

« Back Search for a profile

DBI Cybercrime Conference comes to an end!

The two day International Conference on


Cybercrime jointly organized by the
International Cybercrime Center - ICC at
Mason (George Mason University) and the
Digital Bridge Institute - DBI, Abuja came to an end on Tuesday 2 nd Nov. 2010. Among the participants
were various captains of industries, academic practitioners , top military personnels and Government
representatives.

For more information on the conference, visit www.ictnigeria.org

Conference presentations:

Topic Speaker

1.       Cyber security: realities, challenges and Prof Raymond Akwule:


solutions: President/CEO
Digital Bridge Institute

2.       Cyber threats: implications for Nigeria’s MAJOR GENERAL GG UMO:


National interest OON GSS psc(+) fwc CMH MIMC MNIM

3.       A national approach to cyber security/CIIP: Joseph Richardson:


raising awareness Senior Fellow, GMU-ICC

4.       Self-assessment and formulation of a


National Cyber security/CIIP strategy:

o     culture of security

o    Cert activities

o    Collaboration and information exchange

5.       An analysis of the cyber security strategy


(2008) of Estonia

6.       Establishment of a National CERT Ferenc Suba: LLM, MA


Chairman of the Board, CERT-Hungary, Theodore
7.       Large scale attacks: lessons learnt proposals Puskás Foundation
for national and eu policy Vice-Chair of the Management Board, European
8.       PTA Cert-Hungary's incident handling Network and Information Security Agency
practice

9.       Cybercrime & CERT: issues & probable Prof. Augustine C Odinma: PhD, MIEEE, MNIM,
policies for Nigeria FIET, FNSE, FBCS, CEng
Dean, School of IT & Communications, American
University of Nigeria (AUN)

10.    Case for the establishment of a National Emmanuel E. Ekuwem, PhD, MIEEE, NPOM CEO,
computer emergency readiness Team (CERT) Teledom Group,
Immediate past National President, Association of
11.    Protection of critical information Telecom Companies of Nigeria (ATCON)
infrastructure

12.    Cybercrime case scenarios assessment and ADEWALE JONES


protection approaches

13.    Cybercrime laws and  legal framework F. F Akinsuyi: (MSc, LLM)MBCS


Information Technology Law Consultant
14.    Investigating cybercrime (DATALAWS)
15.    Risk management: a case study

16.    Computer Emergency Readiness Teams Oyehmi Begho


(CERT) in Africa: Cybercrime Scenarios and
Assessment

17.    New approaches to security - cloud cert Arun Sood: Professor (Computer Science) Co-
Director, International Cyber Center George Mason
University

18.     Cloud CERT: Infrastructure and Security Dr. Chris Uwaje (FNCS): President - Institute Of
Issues For Developing Economies Software Practitioners of Nigeria (ISPON)

19.    Impact of Cybercrime and Cybersecurity on Prof. Oliver E. Osuagwu: D.Sc, FNCS, FCPN, FBCS,
the education community: imperatives for CERT CITP, MACM, MIEEE
solutions Department of Information Management
Technology Federal University of Technology,
Owerri
IP Vice-President, Computer Professionals
Registration Council of Nigeria (CPN)        

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy