Loading Events

Why Privacy (usually) Needs Anonymity

Home » Events » Why Privacy (usually) Needs Anonymity

  • This event has passed so registration is closed.


Interested in getting your message in front of a targeted audience? Click on the link to explore sponsorship opportunities.


Date and Time

June 15, 2021 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference


Irene Fisher


Lisa O'Connell


Privacy finally earned its legitimate place in the world of the technology despite years of being dismissed as the domain of the paranoid or the guilty. But strong privacy often requires what some consider its nefarious sibling, anonymity. Is collecting so much identifying data about users really critical to security? This presentation will approach how strong privacy enhancing technologies should also be appreciating the necessity of anonymity, or at least pseudonymity, in their design.


Janelle Hsia – Principal, Privacy SWAN Consulting

Janelle Hsia is a trusted advisor for strategic and tactical decision-making within organizations of all sizes.  She focuses on privacy and security while bringing a diverse background in leadership, business, security, privacy, and technology spanning over 20 years.  Her experience integrating privacy with security and technology helps companies operationalize their privacy and security requirements.  She creates comprehensive and tailored data governance programs for SMBs with a global presence.  Her passion is privacy and data protection training and awareness.  This fall, she is teaching a class on Privacy and Technology at the University of Colorado in Boulder.    She is an ISSA Privacy SIG Tri-Chair and one of our 2022 Volunteers of the Year.  She is a member of the IEEE Digital Privacy Working Group and an IAPP Official Training Partner. She holds the following certifications CIPM, CIPT, CIPP/US/E, CISA, PMP, and GSLC.

See Janelle Hsia‘s full profile.


George Rosamond – Founder and CTO, ClearOPS

By craft a Unix systems administrator, George Rosamond gravitated towards privacy technologies in the mid-2000's (decade) before it emerged as a distinct field when he began running a Tor relay in 2006. His experience ranges from building out infrastructures and colocation to software development, and thrives on trainings for vulnerable less-technical audiences. He is a long-time contributor to the open-source BSD Unix community on various levels, and is on the core of Tor Project. He was central to launching the NYC *BSD User Group in 2003 and the BSD Certification project. He has worked on a number of grant-funded privacy enhancing technology grants in the past.

George is a founder and CTO of ClearOPS, Inc, which he co-founded with privacy attorney Caroline McCaffery in 2017. For George, ClearOPS is an opportunity to apply his array of skills and experiences to concrete problems facing organizations today.

See George Rosamond‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top