901-754-9404
My List0

We've now made it easier for you to research and save your favorite keynotes speakers. Click on the + sign to add a speaker to your Speaker List and email your favorites to colleagues and friends.

John Sileo, Fraud Prevention Speaker

John Sileo

    • Cyber Security and Fraud Prevention Expert
    • Award-winning author of Privacy Means Profit
    • Called “America’s most entertaining cyber security speaker
Fee Range

$20,000 - $30,000

Travels From

Colorado

John Sileo - Human Powered Cyber Security

John Sileo - Human Powered Cyber Security

Incorporating The Latest Data Security Threats

Incorporating The Latest Data Security Threats

John Sileo

John Sileo

John Sileo’s identity was stolen from his business and used to embezzle $300,000 dollars from his clients.  While the thief covered his crimes using Sileo’s identity, John and his business were held legally and financially responsible for the felonies committed. The breach destroyed John’s company and consumed two years of his life as he fought to stay out of jail.

In response, John made it his mission to help others protect the private data that represents their wealth. Now America’s leading keynote speaker on privacy, identity and technology protection, John specializes in making security fun and engaging for audiences so that it works. John’s most requested topics include identity theft prevention, online privacy, social media exposure, mobile technology, social engineering and cyber security.

John Sileo is the award-winning author of many books including Privacy Means Profit (Wiley), the host of Burning Questions Live and has recently appeared on 60 Minutes, Anderson Cooper and Fox Business.

John’s satisfied clients include the Department of Defense, Visa, Blue Cross Blue Shield, Homeland Security, University of Massachusetts, the FDIC, Pfizer, NASBA, the Federal Trade Commission, Lincoln Financial, Northrop Grumman, AARP, the Federal Reserve Bank and scores of corporations, universities, and associations of all sizes.

John is CEO of The Sileo Group, a privacy think tank that helps organizations protect the privacy that drives their profits. He graduated from Harvard University with honors and spends his free time snowshoeing the Rocky Mountains with his remarkable wife and two highly spirited daughters.

To book cyber security expert John Sileo call Executive Speakers Bureau at 800-754-9404.

The Hacker's Blacklist

The heart of good cybersecurity starts with the human beings that help it flourish, or fail. To avoid becoming the next disastrous data-breach headline, you must foster a healthy balance between computer security and human behavior. Cybersecurity isn’t just about overspending on shinier technology – it’s about building a mindset and culture that evolves with the threats.

This crash course forges a high-level, non-technical path through the confusing web of cybersecurity, human decision making, network protection, mobile technology, the Internet of Things, social media and cloud computing—critical components of your information strategy. In this presentation, John will leverage his story of losing his business to cybercrime as a blueprint for how to protect the information that drives your organization.

Key Takeaways:

- Understanding the “Why” behind cybersecurity as well as the “How to”
- A clear understanding of what cybersecurity means and how it works
- An overview of the 7 Critical Threat Trends in data security
- How to move from humans being your “weakest link” to your greatest asset
- A tactical roadmap of critical data, necessary conversations, and next steps
- Prioritized solutions for ransomware, phishing, mobile hacking, cyber blackmail…
- How to detect, reflect and react to social engineering & fraud techniques
- A re-energized desire to address and eliminate key threats in your organization

 

Think Like a Spy

Identity theft training is no longer optional. Every move you make in the digital world can be tracked, hacked, recorded and exploited. Threat sources like smartphones, the Internet of Things, wearable technology, cloud computing, and social media have shifted the competitive landscape in favor of cyber-savvy users with strong identity theft training, prompting a question: Are you in control of your data, or are you being controlled? Due to the power of personally identifying information and the rapid rate at which information is being compromised, we must leverage prevention tools to protect everything from our Social Security numbers to bank accounts, from passwords to confidential emails.

John delivers these identity theft countermeasures in a highly interactive, disarmingly humorous presentation inspired by his personal loss of more than $300,000, his business and two years to identity theft. In this presentation, John focuses specifically on identity theft protection tools that apply to every individual in your audience.

Key Takeaways:

- Overcoming the #1 obstacle to identity theft prevention
- Top trends and countermeasures in protecting personal data
- How to apply detect, reflect and respond tools to fraud
- Identifying the five manipulation triggers and how to defeat them
- Risk-scenario training to make safe data a habit, not an afterthought
- Protecting your mobile devices, social media profiles, and online privacy
- Bridging the gap between personal prevention and professional protection

 

The Art of Human Hacking

Fraud training only works when it happens in person. Human beings can be the weakest link or the strongest competitive advantage in the security and profitability of your information assets. But people are the most commonly underutilized, least expensive weapon in your fight against cybercrime. Social Engineering Training too often fails because of Death by PowerPoint. Security needs to be engaging – has to be interactive – to be effective. To put it simply, this session makes security fun, so that it sticks. Additionally, your audience must experience manipulation, deception, and fraud first hand before their behaviors are ripe for change.

In this continually-interactive session, John goes deep into social engineering tools and tricks used to separate you from your critical data. By building System-1, Reflex-Based Awareness around how tools like social media, trust shortcuts, ego stroking, greed appeals, and cortisol flushing enable social engineers, John will dramatically reduce the human element of your threat footprint. Safe data is profitable data, whether it’s a client’s credit card number, a patient’s medical file, an employee’s benefit plan or sensitive intellectual capital. By the time John finishes his entertaining closing story, your audience will be fully empowered to detect and deter social engineering, fraud, and deception.

Key Takeaways:

- How to identify the most common forms of social engineering
- Reflexes to instinctually detect manipulation and negative influence
- How to apply anti-social-engineering skills in the workplace, in person, and at home
- Understanding 7 signs of deception and how to combat them
- Distinguishing weapons of manipulation from tools of influence

 

White Hot Security Trends

There is no better way to learn about how to cope with the latest and nastiest security threats than from those who have failed hardest! Do you want to know how your organization can avoid the destruction visited upon 150 nation-states during the WannaCry Ransomware attack? Hoping to understand and defend yourself before advanced cyber extortion dismantles your reputation, operation, and profitability? Ever seen the inside of an election-hacking machine and what it has to do with your business? Ready for the Internet of Things to transform into an Invasion of Threats?

White Hot Security trends is an up-to-the-minute look at the unbelievable stories unfolding in the world of cybersecurity – for good and evil. If you have ever had John present before, this is Part II of the series, giving your audience an update on the latest cybersecurity issues that they will no longer ignore. This session utilizes Appreciative Inquiry techniques that leverage the skills your workforce already has and builds on the aspects of cybersecurity that already work inside of your culture. Using audience interaction and case studies, John will go in-depth into the latest trends and counter-tactics to help your audience understand the risks and protect their critical data assets.

Key Takeaways:

- Clarity on the latest types and trends of cybercrime
- Case studies on how organizations effectively defended against breach
- A look into the future of cybersecurity, cybercrime, and cyberwarfare
- Defense tools for cyber espionage and cyber extortion
- Customized content that addresses your organization’s specific needs

 

Creating a Compelling Culture of Security

Security awareness starts at the top. Cybercriminals lust for your corporate data. Competitors bribe your disgruntled employee for a thumb drive full of confidential files. Social engineers exploit your executives’ social media profiles – a veritable “how to” guide for network security access. Hackers “sniff” unprotected IP addresses and cloud traffic you didn’t even know existed. Cyber extortionists encrypt your mission-critical data and demand a ransom. In the meantime, you end up as the next disastrous headline – reputation damaged, customers fleeing. This does not have to be your fate if you move beyond security awareness and into action.

Cybercrime and corporate data breach are a huge financial cost and legal liability to organizations.

But how are you supposed to cope with such a wide range of cyber threats when you have little to no technical background? The answer lies, as does so much of your success, in your preparation and strength of culture. It is imperative in the information economy to train your workforce on how to protect the information assets that fuel your success, whether they are digital, physical or intellectual. Build security awareness training into your daily operations from the boardroom to the break room and watch your risk footprint diminish. In this presentation, John leverages his experience working with clients like the Pentagon and Charles Schwab to give you a prioritized punch list of action items to reduce your chances of a costly data breach.

Key Takeaways:

- Map a clear path to a Culture of Security
- Understand the subtleties of security awareness training
- Gain board “buy-in”, appropriate budgets and staff accountability
- Effectively nudge awareness into permanent transformation
- Identify and prioritize top cyber threats

 

Your Financial Practice as Hero

No one is in a better position to educate financially savvy customers about protecting identity and net worth than bankers, brokers, agents, accountants, and full-fledged financial advisors. Not only do you serve as your client’s trusted advisor and have their “financial ear,” but you also have an ethical responsibility to help them protect their wealth against crimes like identity theft, online fraud, and cyber extortion. Here’s the good news: by hosting financial presentations targeting fraud protection training, risk management seminars and identity theft workshops, you create a safer, more loyal customer.

John has delivered cyber-specific financial seminars to more than 100,000 FI customers. His financial presentations cover the most relevant aspects of identity theft prevention, online privacy, social media exposure, mobile technology, cloud computing, and Internet banking and investing. Imagine your customer, fully educated about how to protect their financial and informational assets and attributing their increased security to your brand. They will be happier, less likely to defect to automated investment tools and less susceptible to fraud. Safe customers are profitable customers.

Key Takeaways:

- Phone-related investment and IRS fraud
- Banking and investing from mobile devices
- Safely storing financial documents in the cloud
- Protecting online accounts with robust password protection tools
- Utilizing two-factor authentication to bulletproof investment accounts
- Financially motivated phishing, SMiShing, and Vishing scams
- Utilizing account monitoring to detect and stop financial fraud

 

Speaking Topics:

Related Speakers

Chunka Mui, speaker

Chunka Mui

Author of Unleashing the Killer App and Billion Dollar Lessons.

Paul Risner, Healthcare Speaker

Paul Risner

Keynote Speaker Specializing in Healthcare Law

Jay Silver Speaker

Jay Silver

Innovation and Technology Speaker

David McCandless

David McCandless

Data-Journalist and Information Designer

Ian Siegel, Techonology Speaker

Ian Siegel

CEO & Co-Founder of ZipRecruiter

Anthony Amore, Speaker

Anthony Amore

Director of Security at the Isabella Stewart Gardner Museum

Joseph Coughlin, speaker

Joseph Coughlin

Expert on Disruptive Demographics

John Sitilides Speaker

John Sitilides

Government Relations

John Patrick Speaker

John Patrick

Technology Futurist & Internet Visionary

Dave deBronkart Speaker

Dave deBronkart

Top Spokesman for Patient Experience

Kare Anderson, Speaker

Kare Anderson

Emmy-winner

Greg Verdino Digital Transformation Speaker

Greg Verdino

Futurist

Testimonials

“I am banging my head against the wall right now for all the times I have done this without using Executive Speakers Bureau. This ..

Clorox Client

"The conference was an immense hit – we certainly raised the bar in our company on how conferences are planned and executed. You and yo..

Testimonials | Benchmark Global Hospitality | Executive Speakers

"Johnny Cupcakes was a hit last night! Thank you both so much for all of your assistance through this process, it has been such a positi..

Johnny Cupcakes | Testimonials | Executive Speakers

"You all were awesome to work with and helped make my life easier when planning these events. Thanks so much!” 

 

Testimonial

"Thanks so much for working on this engagement with us. It’s been a very pleasant experience. We will definitely include ESB in our sea..

Testimonial

"They have booked me to speak at events for over a decade and their professional approach and client focus is unmatched in the industry. I am..

Garrison Wynn, Sales Speaker

"Thank you, both, for making last night possible! You have been such a Joy to work with and I appreciate everything you did for us! I can't s..

Salvation Army

Our bank has held an annual business and economic conference for the past 9 years.  We have worked with Executive Speakers every year an..

I’ve used the services of a number of speakers bureaus in the past. However, my current experience working with the Executive Speakers ..

I want to thank you for all of your assistance you and Jenny were wonderful. If it had not been for you sending me suggestions I would not ha..

Need Suggestions? Have Questions?

Need Suggestions? Have Questions?

Call to discuss how we can you help find the right speaker(s) for your organization.

Get Ideas in 1 hour or less

Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.

Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.

Please fill in information below