![Cameron400 Cameron400](https://www.privacysecurityacademy.com/wp-content/uploads/2016/03/Cameron400.jpg)
Sessions and workshops moderated:
![David Keating David Keating](https://www.privacysecurityacademy.com/wp-content/uploads/2016/02/David-Keating.jpg)
Sessions and workshops moderated:
![Jason Cronk Jason Cronk](https://www.privacysecurityacademy.com/wp-content/uploads/2016/02/Jason-Cronk.png)
![Anwesa Paul](https://www.privacysecurityacademy.com/wp-content/uploads/2016/02/Anwesa-Paul.jpeg)
![karen eltis karen eltis](https://www.privacysecurityacademy.com/wp-content/uploads/2016/02/karen-eltis.jpg)
Sessions and workshops moderated:
![Hirsch400 Hirsch400](https://www.privacysecurityacademy.com/wp-content/uploads/2016/02/Hirsch400.jpg)
Sessions and workshops moderated:
![Carlson Amy400 Carlson Amy400](https://www.privacysecurityacademy.com/wp-content/uploads/2016/02/Carlson_Amy400.jpg)
Sessions and workshops moderated:
![Francoise Gilbert Francoise Gilbert](https://www.privacysecurityacademy.com/wp-content/uploads/2016/01/Francoise-Gilbert.jpg)
Sessions and workshops moderated:
![Gonca Dhont Gonca Dhont](https://www.privacysecurityacademy.com/wp-content/uploads/2016/01/Gonca-Dhont.jpg)
Sessions and workshops moderated:
![Tim Tobin Tim Tobin](https://www.privacysecurityacademy.com/wp-content/uploads/2015/10/Tim-Tobin.jpg)
Sessions and workshops moderated: Understanding the FTC: Lessons from FTC Investigations and Other Experiences (2015)