![Ian Ballon](https://www.privacysecurityacademy.com/wp-content/uploads/2015/08/Ian-Ballon-1.jpeg)
![Kirk Nahra Kirk Nahra](https://www.privacysecurityacademy.com/wp-content/uploads/2015/06/Kirk-Nahra.jpg)
Sessions and workshops moderated: Future Trends in Privacy and Security (2015)
![Ed McNicholas Ed McNicholas](https://www.privacysecurityacademy.com/wp-content/uploads/2015/06/Ed-McNicholas.jpg)
Sessions and workshops moderated: Cybersecurity Policy: The Role of the Government (2015)
![Reed Freeman](https://www.privacysecurityacademy.com/wp-content/uploads/2015/05/Reed-Freeman.jpeg)
![Perkins Nancy Perkins Nancy](https://www.privacysecurityacademy.com/wp-content/uploads/2015/03/Perkins-Nancy.jpg)
Sessions and workshops moderated: New Health Information Technologies: Privacy and Security Risks (2015)
![20240202_PaulSchwartz_bhs_003 copy](https://www.privacysecurityacademy.com/wp-content/uploads/2015/01/20240202_PaulSchwartz_bhs_003-copy-1-683x683.jpg)
![Solove Daniel Solove Daniel](https://www.privacysecurityacademy.com/wp-content/uploads/2018/10/Solove-Daniel-cropped-683x683.jpg)
![Maneesha Mithal](https://www.privacysecurityacademy.com/wp-content/uploads/2015/01/Maneesha-Mithal.jpeg)
![Woodrow Hartzog](https://www.privacysecurityacademy.com/wp-content/uploads/2015/01/Woodrow-Hartzog-.jpeg)
![Todd Ruback Todd Ruback](https://www.privacysecurityacademy.com/wp-content/uploads/2014/12/Todd-Ruback-1-683x683.jpg)
Sessions and workshops moderated: Understanding the Internet’s Hidden Digital Architecture (2015)