![K Royal K Royal](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/K-Royal-1.jpeg)
![Burstein_Aaron](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Aaron-Burstein-1-683x682.jpg)
![Al Saikali Al Saikali](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Al-Saikali.jpg)
![Bob Chaput Bob Chaput](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Bob-Chaput.jpg)
Sessions and workshops moderated: The Role of Privilege in Privacy and Security Investigations (2015)
![cliff baker cliff baker](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/cliff-baker.jpg)
Sessions and workshops moderated: High-Risk Data in the Cloud and the Internet of Things: What Really Works? (2015)
![Paul Luehr](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Paul-Luehr.jpeg)
Partner
Winston & Strawn LLP
Sessions and workshops moderated: Data Breach Liability (2015)
Lead Privacy Counsel
Outschool
Partner
Kelley Drye & Warren
Partner
Buchanan Ingersoll & Rooney
Sessions and workshops moderated: Data Breach Liability (2015)
Partner
Shook Hardy & Bacon
CEO and Founder
Clearwater Compliance
Sessions and workshops moderated: The Role of Privilege in Privacy and Security Investigations (2015)
Managing Partner
Meditology
Sessions and workshops moderated: High-Risk Data in the Cloud and the Internet of Things: What Really Works? (2015)
Founder
Wickr
Sessions and workshops moderated: What We Can Learn from DefCon – Hacking Comes in All Varieties (2015)
Associate General Counsel
Procter & Gamble
Sessions and workshops moderated: Data Security Law: Foundations (2015)
Partner
Manatt, Phelps & Phillips