![Hilary Wandall](https://www.privacysecurityacademy.com/wp-content/uploads/2015/08/Hilary-Wandall.jpeg)
![Michelle Rosenthal 400×400 1 Michelle Rosenthal 400x400 1](https://www.privacysecurityacademy.com/wp-content/uploads/2015/08/Michelle-Rosenthal-400x400-1.jpg)
![Stuart Shapiro Stuart Shapiro](https://www.privacysecurityacademy.com/wp-content/uploads/2015/08/Stuart-Shapiro.jpg)
Sessions and workshops moderated: Authentication and Control Frameworks: Operationalizing a Safeguard (2015)
![Kim Tony press 400×400 400×400 Kim Tony press 400x400 400x400](https://www.privacysecurityacademy.com/wp-content/uploads/2018/12/Kim_Tony_press_400x400-400x400.jpg)
![Tim West Tim West](https://www.privacysecurityacademy.com/wp-content/uploads/2015/08/Tim-West-1-1.jpg)
Sessions and workshops moderated: Health Data Breaches and OCR Investigations (2015)
![joel reidenberg 400×400 joel reidenberg 400x400](https://www.privacysecurityacademy.com/wp-content/uploads/2015/08/joel-reidenberg-400x400.jpg)
Sessions and workshops moderated: Student and Children’s Data: FERPA, COPPA, and Beyond (2015)