![Beth Hill Beth Hill](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Beth-Hill-683x683.jpg)
![Adam Greene](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Adam-Greene-3.png)
![Scott Gross Scott Gross](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Scott-Gross.png)
Sessions and workshops moderated: Privacy Impact Assessment Scenario Exercise (2015)
![Khaled El Emam](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Khaled-El-Emam.jpeg)
![Behnam Dayanim1 Behnam Dayanim1](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Behnam-Dayanim1.png)
Sessions and workshops moderated: Conducting a Privacy Investigation (2015)
![19-1619-CITRON-106](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/resize-19-1619-CITRON-106-copy-1.jpeg)
![Jennifer Archie](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Jennifer-Archie-1.png)
![James Aquilina James Aquilina](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/James-Aquilina-683x683.png)
Sessions and workshops moderated: Privacy and Security Film and TV Club (2015) Data Breach Response Scenario Exercise (2015)
![Lothar Determann Lothar Determann](https://www.privacysecurityacademy.com/wp-content/uploads/2014/10/Lothar-Determann.jpeg)
Sessions and workshops moderated: California Privacy Law The Sunken Safe Harbor: The ECJ’s Decision and Beyond (2015)