Incorporating The Latest Data Security Threats
John Sileo’s identity was stolen from his business and used to embezzle $300,000 dollars from his clients. While the thief covered his crimes using Sileo’s identity, John and his business were held legally and financially responsible for the felonies committed. The breach destroyed John’s company and consumed two years of his life as he fought to stay out of jail.
In response, John made it his mission to help others protect the private data that represents their wealth. Now America’s leading keynote speaker on privacy, identity and technology protection, John specializes in making security fun and engaging for audiences so that it works. John’s most requested topics include identity theft prevention, online privacy, social media exposure, mobile technology, social engineering and cyber security.
John Sileo is the award-winning author of many books including Privacy Means Profit (Wiley), the host of Burning Questions Live and has recently appeared on 60 Minutes, Anderson Cooper and Fox Business.
John’s satisfied clients include the Department of Defense, Visa, Blue Cross Blue Shield, Homeland Security, University of Massachusetts, the FDIC, Pfizer, NASBA, the Federal Trade Commission, Lincoln Financial, Northrop Grumman, AARP, the Federal Reserve Bank and scores of corporations, universities, and associations of all sizes.
John is CEO of The Sileo Group, a privacy think tank that helps organizations protect the privacy that drives their profits. He graduated from Harvard University with honors and spends his free time snowshoeing the Rocky Mountains with his remarkable wife and two highly spirited daughters.
To book cyber security expert John Sileo call Executive Speakers Bureau at 800-754-9404.
The Cyber Blacklist: Top Threats & Countermeasures for Data Security
At the heart of most data theft is lax cyber security: a broad term that will cease to intimidate you after this presentation. Technology evolves so quickly that it’s easy to fall behind the digital curve and become overwhelmed by the prospect of protecting the very data that underlies our wealth. In this state, we tend to freeze, make excuses and assume that there is no reasonable, cost-effective way to protect our data. That assumption is both wrong and dangerous. This crash course forges a high-level, non-technical path through the sometimes confusing web of human decision making, computer security, mobile technology, Internet connectivity, online privacy and cloud computing. When it comes to cyber security, you can’t possibly do everything—but you must do the right things. By the end of this highly interactive presentation, you will have an applicable and actionable Blacklist of next steps to protect your sensitive data, mobile devices, social identity and, ultimately, your wealth and profitability.
Data Spies, Hackers & Internet Attackers: Bulletproof Your Privacy & Profits
Every move you make in the digital world is tracked, recorded and exploited. Tools like smartphones, iPads, cloud computing and social media have shifted the competitive landscape in favor of cyber-savvy users, prompting a question: Are you in control of your digital footprint, or are you being controlled? Are you protecting the information your people share on social networks? Are mobile devices and free Wi-Fi a recipe for costly data exposure? If you unknowingly stack the deck in favor of cyber criminals and competitive spies, the results could be devastating. However, if you utilize technology to your advantage, your bottom line benefits. This presentation highlights current data privacy trends as well as practical, tactical solutions.
Think Like a Spy: Aggressive Identity Theft & Fraud Countermeasures
Identity theft and online fraud are destructive side effects of information over-exposure. Due to the power of personally identifying information and the rapid rate at which it is being compromised, we must leverage formidable tools to protect everything from Social Security numbers to bank accounts, from passwords to intellectual property. John delivers those exact identity theft prevention tools in a highly interactive, surprisingly humorous presentation inspired by his own life-changing battles with identity theft and privacy exposure. John will help you to “own” your identity—to take responsibility for the sensitive data that powers your wealth.
The Art of Human Hacking: Social Engineering Self Defense
Human beings are always the weakest link in the security, privacy and profitability of your information assets. And they are the most overlooked, least expensive weapon in your fight against fraud, data breach and profit erosion. But you can’t detect and deter deception with a dry Power Point presentation. Your must experience the feelings of fraud first hand; you need to understand the brain science behind manipulation. In this highly interactive session, John takes a deep dive into the tools and tricks used by social engineers to separate you from your critical data. By building reflex-based awareness around how tools like Facebook, trust shortcuts, ego stroking, greed appeals, and cortisol flushing enable social engineers, John will dramatically reduce your threat profile for fraud, deception and social engineering. In this way, humans become the most powerful line of defense.
Director of Events and Education National Association of Federal Credit Unions
John was fantastic, he was very engaging with our attendees. The thing that was great about the opener was he immediately had attendees speaking with each other, which was wonderful. They were immediately engaged. I would definitely invite John to speak again.
Associate Director of Events and Education National Association of Federal Credit Unions
Very grateful to John for being such an easy person to work with. An incredible and engaging speaker that our attendees really enjoyed.
Your Keynote was a key reason why this year’s conference was the best.
John is a certified risk killer worth every penny
Jaw dropping content laced with laughter!
No News Found For this Speaker!