About Brian Ray

Professor Brian Ray has extensive experience in eDiscovery, information governance and data privacy. He and Candice Hoke created and serve as Co-Directors of the Center for Cybersecurity and Data Privacy at Cleveland-Marshall College of Law, where they are Professors of Law. Brian co-founded, with Tim Opsitnick of Jurinnov, the Cleveland eDiscovery Roundtable, an informal group of lawyers, judges and academics that meets monthly to discuss issues surrounding electronic discovery, cybersecurity and data privacy issues. Professor Ray is a member of the Sedona Conference's International Electronic Information Management, Discovery and Disclosure and Data Security and Privacy Liability Working Groups. Professor Ray also is an expert in international and comparative law. His book, Engaging with Social Rights: Participation, Procedure and Democracy in South Africa's Second-Wave (forthcoming Cambridge 2016) provides a comprehensive analysis of the South African Constitutional Court's social rights decisions. He has served as a Fulbright Scholar in South Africa and has published extensively on the law of human rights.

Hirsch and Lamont Age of the Cyberpro

By |2017-10-17T10:58:07-04:00October 17th, 2017|

Dennis Hirsch and Keir Lamont have a nice analysis for IAPP of the need for cross-disciplinary training in cybersecurity.  CSU is developing an interdisciplinary Cybersecurity MS program that implements this idea with required coursework from law, business and engineering.  The initial program proposal is under review at the state. The siloed data governance professions of

Watch out: Russia’s tactics will evolve | CEPA

By |2017-10-17T10:32:18-04:00October 17th, 2017|

The belated is merely annoying; all the people now fussing about Kremlin interference in last year’s U.S. presidential election seem to think this was the first instance of Russian political warfare. In fact, it was just the latest and most conspicuous. Hardened participants in the struggle for freedom and democracy in and around Russia should

Don’t Worry About KRACK – Lawfare

By |2017-10-17T10:14:05-04:00October 17th, 2017|

DayZero: Cybersecurity Law and Policy KRACK–the vulnerability in the WPA2 security protocol proven this morning–is an interesting and amusing vulnerability from a technical standpoint and a great lesson in how our computer security is “dancing madly on the lip of a volcano”. It demonstrates a sober lesson for cybersecurity policy, showing just how tough seemingly

Government security tokens hackable-Politico Morning Cybersecurity

By |2017-10-17T10:12:34-04:00October 17th, 2017|

From Politico Morning Cybersecurity The physical security tokens carried by senior government officials and industry executives can be hacked, according to blockbuster research revealed Monday. The software used to generate private cryptographic keys for the tokens' chips, which are manufactured by a company called Infineon, can be reverse-engineered, letting hackers "factor" - or identify - the keys and

CyberSecure My Business – Stay Safe Online SME Seminar Series

By |2017-10-16T10:59:12-04:00October 16th, 2017|

CyberSecure My Business is a comprehensive national program led by the National Cyber Security Alliance (NCSA) to help businesses of all sizes learn to be safer and more secure online and is housed on the staysafeonline.org website. As the cornerstone of the program, NCSA has translated the (NIST) Cybersecurity Framework into simpler language and incorporated

Go to Top