![David Sheidlower David Sheidlower](https://www.privacysecurityacademy.com/wp-content/uploads/2015/02/David-Sheidlower.png)
Sessions and workshops moderated: Authentication and Control Frameworks: Operationalizing a Safeguard (2015)
![Joshua Harris 1 Joshua Harris 1](https://www.privacysecurityacademy.com/wp-content/uploads/2015/02/Joshua_Harris-1.png)
Sessions and workshops moderated: Interoperability and Cross-Border Data Transfer: APEC, EU BCRs, and Beyond (2015)
![Jan Dhont](https://www.privacysecurityacademy.com/wp-content/uploads/2015/02/Jan-Dhont.jpeg)
Sessions and workshops moderated: Interoperability and Cross-Border Data Transfer: APEC, EU BCRs, and Beyond (2015)
![Steven Roosa Steven Roosa](https://www.privacysecurityacademy.com/wp-content/uploads/2015/02/Steven-Roosa.jpg)
Sessions and workshops moderated: Security Risks with the Internet of Things: Lessons from a Live Demonstration (2015)
![Heather Egan Sussman Heather Egan Sussman](https://www.privacysecurityacademy.com/wp-content/uploads/2015/02/Heather-Egan-Sussman.jpg)
Sessions and workshops moderated: The World Beyond HIPAA (2015)
![Paul Rosenzweig Paul Rosenzweig](https://www.privacysecurityacademy.com/wp-content/uploads/2015/02/Paul-Rosenzweig-2-683x683.jpg)
Sessions and workshops moderated: Cybersecurity Policy: The Role of the Government (2015)
![Steven Wicker Steven Wicker](https://www.privacysecurityacademy.com/wp-content/uploads/2015/02/Steven-Wicker.png)
Sessions and workshops moderated: