National Academies Press: OpenBook
« Previous: Appendix B: Planning Committee Biographies
Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

C Speaker Biographies

HEATHER ADKINS is an 11-year Google, Inc., veteran and founding member of the Google Security Team. As manager of information security, she has built a global team responsible for maintaining the safety and security of Google’s networks, systems, and applications. The Google Security Team, now numbering in the hundreds, is involved in every facet of the business, including launching new products, mergers and acquisitions, building security infrastructure, responding to security threats, and evangelism. Ms. Adkins has an extensive background in systems and network administration, with an emphasis on practical security, and has worked to build and secure some of the world’s largest infrastructure for web information systems. She now focuses her time primarily on the defense of Google’s computing infrastructure and working with both the Google Incident Response Team and outside entities to tackle some of the industry’s greatest security challenges.

ROBERT R. BELAIR is a partner and practice leader of the Privacy Practice and co-chair of the Government Relations Practice. Mr. Belair is the managing partner of Arnall Golden Gregory’s Washington, D.C., office. He is an internationally recognized privacy lawyer with more than three decades of experience and is a frequent writer and speaker on privacy topics. Mr. Belair focuses his practice on advising clients with all aspects of the privacy policy cycle. This has included drafting legislative language, submitting public comments, and engaging congressional and agency staff on the development of privacy policy. With regard to existing privacy requirements, Mr. Belair has assisted clients to develop comprehensive privacy compliance programs, responded to data breaches, and defended against administrative actions and litigation. He served as deputy counsel to the White House Privacy Committee in the Ford Administration and as a lawyer in the Federal Trade Commission’s (FTC’s) Bureau of Consumer Protection doing Fair Credit Reporting Act and other privacy-related work. Later, Mr. Belair served as general counsel of the National Commission on the Confidentiality of Health Records. In private practice, he was a founding partner of Oldaker, Belair & Wittie. He has done work for numerous government entities on privacy matters, including the National Science Foundation, the National Academy of Sciences, Engineering, and Medicine, the Department of Transportation, and the Social Security Administration. Mr. Belair has served on the Judiciary Committee Advisory Committee for Chairman Joe Biden (D-DE) and as an advisor to Senator Bob Bennett’s (R-UT) Health Privacy Task Force. Together with Alan Westin, he was the editor of a preeminent privacy periodical for the business community, Privacy & American Business.

Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

AARON BURSTEIN is a senior legal advisor at the FTC to Commissioner Julie Brill. At the FTC, Mr. Burstein advises on enforcement and policy matters concerning privacy, data security, financial practices, and a range of other consumer protection issues. Before joining the FTC in 2013, he was a policy advisor at the National Telecommunications and Information Administration (NTIA), where he played a central role in drafting the Department of Commerce’s privacy “green paper” and the Obama Administration’s “Privacy Blueprint.” Mr. Burstein also served as director for privacy and civil liberties in the Cybersecurity Directorate of the National Security Council at the White House. Before joining NTIA, he was a research fellow at the University of California, Berkeley, and a trial attorney in the Department of Justice’s Antitrust Division. Mr. Burstein earned his law degree from the University of California, Berkeley, and his undergraduate degree from Brown University.

BETH GIVENS is founder and executive director of the Privacy Rights Clearinghouse (PRC), established in 1992. The PRC is a nonprofit consumer education and advocacy organization based in San Diego, California. Its mission is to engage, educate, and empower individuals to protect their privacy. The PRC invites consumers to submit complaints and questions via its website. Its online guides cover a broad range of topics, including credit reporting, identity theft, data breaches, online privacy, computer security, financial privacy, medical records, workplace monitoring, data brokers, employment screening, telemarketing, and smartphones. The PRC’s “Chronology of Data Breaches” has tracked breaches since 2005. Ms. Givens and her colleagues represent the interests of consumers in public policy proceedings at the state and federal levels. They have served on several task forces and working groups and are often interviewed by the media. Prior to her work as a consumer advocate, Ms. Givens was a librarian specializing in resource sharing. She has a master’s degree from the University of Southern California’s Annenberg School for Communication and a master’s degree in library and information services from the University of Denver. She is a member of the International Association of Privacy Professionals.

JAMES HARVEY is a partner at Alston & Bird, LLP, in the Technology and Privacy Group, and co-chairs the firm’s Privacy and Security Task Force and its Cybersecurity Preparedness and Response Team. Mr. Harvey’s practice involves board-level and enterprise-wide issues at the intersection of global cybersecurity, privacy, technology, and data initiatives. Given his decades-long experience in the technology space, he was one of the first lawyers in the United States to focus on the criticality of privacy and data management issues for global corporations. This immersion in technology and data matters motivated Mr. Harvey to found the task force and response team well before other firms realized these issues faced their clients. Today, Mr. Harvey and these teams assist multinational clients from a wide array of industries with a full spectrum of cyber,

Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

privacy, and technology issues and adversarial matters and transactions, including everything from preparing companies and their boards for cybersecurity risks; responding to network intrusion and other security incidents; collecting, storing, processing, and monetizing personal and corporate data around the globe; and acquiring technology and services in today’s networked world.

TOM MURPHY is the vice president of information technology and the university chief information officer (CIO) at the University of Pennsylvania. Mr. Murphy brings a successful track record of creating a vision and mission for business and technology professionals and building strong, customer-focused teams. He provides leadership for the university’s information technology (IT) and leads the central IT organization that is responsible for providing core administrative information systems, campus data, voice, and video networks. He advises the provost and executive vice president on information technology issues. Mr. Murphy previously held CIO and senior IT leadership positions at DaVita HealthCare Partners, AmerisourceBergen, Royal Caribbean Cruises, Bristol Hotels & Resorts, Cendant Corporation, Omni Hotels, Interstate Hotels Corporation, and Marriott Corporation. He was elected to the CIO Hall of Fame in 2010. In 2011 and 2008 he was recognized at the Global CIO Executive Summit as a Top Ten Global CIO for Breakaway Leadership and Leadership and Innovation, respectively. His teams have been recognized for innovation, resourcefulness, and for being best places to work. He holds a B.A from the University of Richmond.

JOEL R. REIDENBERG is the Stanley D. and Nikki Waxberg Chair and Professor of Law at Fordham University where he directs the Center on Law and Information Policy. He was the inaugural Microsoft Visiting Professor of Information Technology Policy at Princeton University teaching in the Computer Science Department and, more recently, a visiting lecturer teaching cybersecurity policy at Princeton’s Woodrow Wilson School. Dr. Reidenberg has also previously taught at the Universite de Paris-Sorbonne and the Institut d’etudes Politques de Paris. He publishes regularly on both information privacy and on information technology law and policy. He is a member of the American Law Institute and an advisor to its Principles of Law of Data Privacy project. Dr. Reidenberg has served as an expert adviser to the U.S. Congress, the FTC, the European Commission, and the World Intellectual Property Organization. At Fordham, he previously served as the associate vice president for academic affairs and, prior to his academic career, he was an associate at the law firm Debevoise & Plimpton. Dr. Reidenberg is a graduate of Dartmouth College and earned a J.D. from Columbia University and a Ph.D. in law from the Université de Paris–Sorbonne. He is admitted to the Bars of New York and the District of Columbia.

Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

SASHA ROMANOSKY researches topics in the economics of security and privacy, cybercrime, information policy, applied microeconomics, and law and economics. He is a policy researcher at the RAND Corporation. Dr. Romanosky holds a Ph.D. in public policy and management from Carnegie Mellon University and a B.S. in electrical engineering from the University of Calgary, Canada. He has published in the Journal of Policy Analysis and Management, the Journal of Empirical Legal Studies, and the Berkeley Technology Law Journal; coauthored two book chapters; and has written other works on information security. Dr. Romanosky was a Microsoft research fellow in the Information Law Institute at New York University and was a security professional for more than 10 years within the financial and e-commerce industries at companies such as Morgan Stanley and eBay. He holds a CISSP certification and is co-author of the Common Vulnerability Scoring System (CVSS), an open standard for scoring computer vulnerabilities.

DAVID C. VLADECK is a professor and co-director for the Institute for Public Representation at Georgetown Law School. Professor Vladeck holds a B.A. degree from New York University, a J.D. degree from Columbia University, and an LL.M. from Georgetown. Professor Vladeck teaches federal courts, civil procedure, administrative law, and seminars in First Amendment litigation and co-directs the Institute for Public Representation, a clinical law program. He recently returned to the Law Center after serving for nearly 4 years as the director of the FTC’s Bureau of Consumer Protection. At the FTC, he supervised the bureau’s more than 430 lawyers, investigators, paralegals, and support staff in carrying out the bureau’s work to protect consumers from unfair, deceptive, or fraudulent practices. Before joining the Law Center faculty full time in 2002, Professor Vladeck spent more than 25 years with the Public Citizen Litigation Group, a nationally prominent public interest law firm, handling and supervising complex litigation. He has briefed and argued a number of cases before the U.S. Supreme Court and more than 60 cases before federal courts of appeal and state courts of law resort. He is a senior fellow of the Administrative Conference of the United States, an elected member of the American Law Institute, and a scholar with the Center for Progressive Reform. Professor Vladeck frequently testifies before Congress and writes on administrative law, preemption, First Amendment, and access to justice issues.

Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×

This page intentionally left blank.

Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 52
Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 53
Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 54
Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 55
Suggested Citation:"Appendix C: Speaker Biographies." National Academies of Sciences, Engineering, and Medicine. 2016. Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/23559.
×
Page 56
Next: Other Recent Reports of the Computer Science and Telecommunications Board »
Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop Get This Book
×
Buy Ebook | $14.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In January 2016, the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Data Breach Aftermath and Recovery for Individuals and Institutions. Participants examined existing technical and policy remediations, and they discussed possible new mechanisms for better protecting and helping consumers in the wake of a breach. Speakers were asked to focus on data breach aftermath and recovery and to discuss ways to remediate harms from breaches. This publication summarizes the presentations and discussions from the workshop.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!