![Stephen Ruckman Stephen Ruckman](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Stephen-Ruckman.jpg)
Sessions and workshops moderated: Control in the Information Ecosystem: Who Has it? Does It Exist? (2015)
![Randy-Sabett](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Randy-Sabett-2.jpg)
Sessions and workshops moderated: Information Privacy Law: Foundations (2015)
![Robert Mahini Robert Mahini](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Robert-Mahini.jpg)
Sessions and workshops moderated: FTC Privacy and Security Alumni: Reflections and Insights (2015)
![LauraVanDruff400 LauraVanDruff400](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/LauraVanDruff400.jpg)
Sessions and workshops moderated: Designing User Interfaces for Privacy (2015)
![Jon Mills Jon Mills](https://www.privacysecurityacademy.com/wp-content/uploads/2015/09/Jon-Mills.jpg)
Sessions and workshops moderated: Data Breach Fallout: The Legal and Ethical Considerations Concerning Stolen Data (2015)