![John Kropf John Kropf](https://www.privacysecurityacademy.com/wp-content/uploads/2015/01/John-Kropf.png)
Sessions and workshops moderated: Privacy and Security in the Public vs. Private Sector: A Comparison (2015)
![Chris Wolf](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Chris-Wolf.jpeg)
![Wimmer Kurt Wimmer Kurt](https://www.privacysecurityacademy.com/wp-content/uploads/2020/01/Wimmer-Kurt-.jpg)
Sessions and workshops moderated: Privacy, Security, and Fairness by Design: What the FTC Does (and Doesn’t Do) (2015)
![Todd Ruback Todd Ruback](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Todd-Ruback-1-683x683.jpg)
Sessions and workshops moderated: Understanding the Internet’s Hidden Digital Architecture (2015)
![Jules Polonetsky](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Jules-Polonetsky-.jpeg)
![Jon Neiditz Jon Neiditz](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Jon-Neiditz.png)
Sessions and workshops moderated: High-Risk Data in the Cloud and the Internet of Things: What Really Works? (2015)
![Saira Nayak Saira Nayak](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Saira-Nayak.png)
Sessions and workshops moderated: Defining “Reasonable Data Security” and “Personal Data” Across Borders (2015)
![Lee Ronald Lee Ronald](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Lee-Ronald.png)
Sessions and workshops moderated: Privacy and Security by Design (2015)