![20240202_PaulSchwartz_bhs_003 copy](https://www.privacysecurityacademy.com/wp-content/uploads/2015/01/20240202_PaulSchwartz_bhs_003-copy-1-683x683.jpg)
![Solove Daniel Solove Daniel](https://www.privacysecurityacademy.com/wp-content/uploads/2018/10/Solove-Daniel-cropped-683x683.jpg)
![Faith Myers Faith Myers](https://www.privacysecurityacademy.com/wp-content/uploads/2015/01/Faith-Myers-683x683.jpg)
![kristen mathews kristen mathews](https://www.privacysecurityacademy.com/wp-content/uploads/2015/01/kristen-mathews-683x683.jpg)
Sessions and workshops moderated: Vendor Management (2015)
![Jon Neiditz Jon Neiditz](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Jon-Neiditz.png)
Sessions and workshops moderated: High-Risk Data in the Cloud and the Internet of Things: What Really Works? (2015)
![Beth Hill Beth Hill](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Beth-Hill-683x683.jpg)
![Adam Greene](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Adam-Greene-3.png)
![Jennifer Archie](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Jennifer-Archie-1.png)
![Lothar Determann Lothar Determann](https://www.privacysecurityacademy.com/wp-content/uploads/2014/10/Lothar-Determann.jpeg)
Sessions and workshops moderated: California Privacy Law The Sunken Safe Harbor: The ECJ’s Decision and Beyond (2015)