My List0

We've now made it easier for you to research and save your favorite keynotes speakers. Click on the + sign to add a speaker to your Speaker List and email your favorites to colleagues and friends.

using System.Text.RegularExpressions;
Tyler Cohen Wood, speaker Exclusive

Tyler Cohen Wood

    • Internationally recognized Cybersecurity influencer and key opinion leader
    • Former Defense Intelligence Agency Cyber Deputy Division Chief and Senior Intelligence Officer
    • Former Director of the Cyber Risk Management at AT&T
    • Cybersecurity Woman of the Year Finalist 2021
Full Bio
In Person-Fee 🛈

$15,000 - $20,000

Virtual Fee:

$10,000 - $15,000

Travels From

District of Columbia

Cyber Apocalypse...

Cyber Apocalypse...

Think Like an Operative

Think Like an Operative

Tyler Cohen Wood - Data Oceans & Data Lakes - IT Security

Tyler Cohen Wood - Data Oceans & Data Lakes - IT Security

Tyler Cohen Wood is an internationally recognized cybersecurity authority with over 20 years of highly technical experience, including 13 of which were spent working for the Department of Defense (DoD). She is also the Founder and CEO of MyConnectedHealth Inc., a unique global health care platform that connects the best of technology (AI, ML), healthcare, and secure patient crowd data to strategically diagnose and treat disease.

As a keynote speaker, author, blogger, national security expert, and overall cyber authority, Cohen Wood is relied on to provide unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring industries have the tools and knowledge they need to defend themselves in the digital world. Tyler sits on several cyber advisory boards. Tyler was recently named as one of the top 10 cybersecurity keynote speakers in Onalytica’s 2021 report “Who’s Who in Cybersecurity and The Top Influencers and Brands” She was also listed by Cybercrime magazine as one of the Top 30 Cybersecurity Experts to Follow In 2021”.

Tyler has worked in the private sector as a Director of the Cyber Risk Management group at AT&T, using thought leadership and her cybersecurity expertise to develop new and inventive solutions to protect customers from hackers and the ever-increasing cyber threat landscape.

Prior to that, Tyler Cohen Wood worked at the U.S. Defense Intelligence Agency (DIA) under the DoD, serving as a Senior Intelligence Officer, Deputy Cyber Division Chief of the Special Communications Division, and the DIA Science and Technologies Directorate-selected Cyber Subject Matter Expert (SME). While at DIA, she developed highly technical cyber solutions and made recommendations and decisions significantly interpreting, developing, and changing critical cyber policies and directives affecting current and future DoD and intelligence community programs. She has helped the White House, DoD, federal law enforcement, and the intelligence community thwart many threats to the United States cybersecurity.

Tyler was also responsible for developing and leading many interagency working groups and task forces to develop, assess and deconflict advanced technical capabilities and techniques currently being used by U.S. Special Forces and the intelligence community to conduct special operations and missions.

She has given many empowering keynotes and presentations for companies ranging from start-ups to Fortune 100s. Tyler has been a keynote and session speaker at conferences such as RSA, Defcon/Blackhat, HTCIA, Bloomberg Legal Conference Series, DoD Cybercrime Conference, ISSA, ISACA, EY Global and Mobility Talent Conference Berlin, A Gateway to Cybersecurity, Annual Corporate Fleet Conference (AFLA 2018), EC Council, Hacker Halted, FedEx Cyber Security Conference, BankersWeb Conference, Canadian Pharmacy Conference, Raymond James, Chicago Mercantile Exchange and many more.

Her latest book, Catching the Catfishers: Disarm the Online Pretenders, Predators, and Perpetrators Who Are Out to Ruin Your Life (2014, The Career Press), teaches how to safely and successfully navigate the online world, and protect yourself, your children, your business and your privacy.

Cohen Wood's expertise has made her a highly sought-after guest and writer for both national and local television, radio, print, and online media. She has been featured on Good Morning America, FOX and Friends, CBS Evening News, ABC World News Tonight, Bloomberg, CNN, FOX, CBS, ABC, NBC, WGN, among others, and in The Wall Street Journal, Washington Post, and Huffington Post.

With a passion for helping the average person understand the dangers and pitfalls of living in a digital world, Tyler is also called upon as a featured speaker to educate audiences of all demographics on the ever-growing and ever-changing digital landscape.

Redefining Cyber Security by Employing a New Paradigm

The media is awash with seemingly daily reports of more and more serious cyber-attacks. We are losing the battle with cybersecurity and will continue to in the future unless we make critical and fundamental shifts to our paradigm. Cybersecurity leaders agree that the field has become one in which we find ourselves in a constant reactive loop, where we’re putting out fires without truly identifying underlying problems. Without addressing the problems, how can we even begin to address the solutions?

This presentation will closely align the disconnects and critical failures facing cybersecurity with another industry that has achieved pockets of excellence that go a long way to mitigating failure. Through Wood’s extensive background in multiple aspects of cybersecurity and her experience navigating another equally complex field, she will use her expertise and unique storytelling approach to share how to truly understand cyber challenges in order to fully address the bigger picture with concrete solutions. Through analogies and case studies, Wood will detail the major cyber problems businesses face today and demonstrate how, by employing a new model and paradigm, we can begin to solve the cybersecurity and workforce problems today and those on the threat horizon of tomorrow.

Corporate Cyberwarfare: Real Solutions to Protect your Business and Assets

With cyberattacks already at a critical level, it’s important to understand specific active threats, who’s carrying them out, what is being done and what else can be done about it. Cyber threats have cyber war is being waged today, we can take tactical preventative measures to stave off a lurking disaster that could potentially put a company out of business.

In today’s quickly evolving connected world where business is more frequently done on the go using mobile, IoT and many other smart devices, cyber threats are more of a risk to corporations than ever. What are the threats to businesses and just how realistic are they? Can they really happen? How can we ensure we are armed with the knowledge to protect corporate assets and critical business infrastructure from increasingly aggressive threat actors? Many businesses know that the threats are out there but aren’t sure what to do about it or even how to begin to tackle the problem at hand.

This presentation will focus on the real cyber-attacks being enacted today against businesses of all sizes, and what can be done about them. We’ll cover the current threat landscape and the ever-looming threat horizon of corporate cyber risk. We’ll also explore how the unique challenges of remote work using connected devices, implants, and A.I. affect business cybersecurity. At the end of the presentation the audience will have a close understanding of the main threat actors, the threats themselves and how to protect businesses against them.

What attendees will learn from this presentation:

  • The types of cyber-attacks being carried out against corporations and business infrastructure
  • Concrete counter-measures that can be enacted to protect business assets from cyber threats
  • How to be prepared for a worst-case scenario

The New and Improved Big Data Analytics: Good Enough to Solve a Murder?

There’s been a murder! After detailed forensic data collection, law enforcement officials begin to piece together the facts. They parse through physical data, social media, digitally collected data from witnesses and suspects and other open source intelligence (OSINT) to attempt to piece together the “who done it and why” in order to solve what seems to be an unsolvable case.

We know that social media, digital devices, and apps we rely on collect information on us. But do we know exactly what that means or just how comprehensive and intimate that data is? Most terms of service will tell you exactly what is collected and that apps have the right to distribute collected content to third parties, usually to make your service better. What isn’t said is how the data is put together, the impact that it can have at the personal, company and national security levels and what form future collection techniques might take. This presentation will show just how vast the scope of information collection is now and how it will be in the future. We’ll also demonstrate how, when pieced together in the right order, data can even solve a seemingly unsolvable crime.

The Future of Healthcare: Connected and Intelligent

There are two types of people in this world—those who are happy with the healthcare system and anyone who has ever needed to use the healthcare system. For many, the current model of healthcare is frustrating and, at its worst, negligent. People with chronic illnesses or rare diseases are hit especially hard by the gaps in our system.

Cohen Wood spent her entire career in cybersecurity working with data and understanding the significance of the cyber world in our reality. She used her tech background to develop her idea for a better healthcare system into MyConnectedHealth, an A.I.-driven view of medicine.

Cohen Wood is proof of the concept herself. By using the concept behind MyConnectedHealth Cohen Wood was able to diagnose herself (confirmed by physicians) with her rare disease—so rare only 300,000 people in the United States have it. Just the mere concept of MyConnectedHealth surpassed the medical system that had failed her for years in a matter of minutes.

This presentation will not only share with you the latest technology and trends happening in healthcare; but inspire your team to think "outside of the box" in order to improve patient outcomes by fast tracking patient diagnosis and treatment plans, eliminating duplicate tests, and offering cost-saving efficiencies.

Protecting Your Property: Shielding Your Company’s Assets and Image

In today’s fast-paced business and Internet of Things connected world, working away from the office using mobile and other connected devices for telecommuting and productivity has become mainstream.  But how do we know what confidential data, tradecraft or intellectual property this technology might be unknowingly giving away to corporate spies, hackers or data marketers? This presentation will teach you and your employees how to safely and securely protect company confidential information while using mobile devices both inside and outside the workplace, and also how to protect corporate intellectual property and trade secrets that may be at risk through social media and mobile device use.  This presentation will also teach how to protect your corporate image and assets.

Using the Internet to Hire Right: An Ounce of Prevention – A Ton of Trust

These days it takes more than a meet-and-greet to be sure a potential hire is who they say they are and can do what they claim to do. In-person interviews often don’t give you the whole picture, and certainly, don’t reveal potential threats. However, there’s no hiding from an online profile which has been accumulating ever since that person first logged on to the internet. This presentation will teach HR professionals, recruiters, managers, and executives how to use social media and the internet to help rethink, or reaffirm, their confidence in potential candidates and current employees.

Take Control: Protecting Your Privacy & Managing Your Online Image

In this presentation, you will learn how to shield your personal information and safely and successfully navigate the online world, protect yourself, your children, your company, your privacy, and your communications, and learn to vet if someone is who they claim to be online.  You will also learn how to read deception and lies in other people’s online identities and posted content, such as social media, emails, reviews and dating profiles. While learning the skills for personal protection, you will also learn how to apply these same techniques to your professional life, clean up and leverage your online image for social and career success, and develop beneficial relationships online.  Whether you’re a seasoned professional, a recent graduate entering the workforce or a working parent concerned about your children’s safety, this presentation will provide valuable information and tips to ensure security and success online.

Related Speakers

Duncan MacPherson Speaker

Duncan MacPherson


Albert Wu

Albert Wu


Dave Mochel, keynote speaker

Dave Mochel

Founder of Applied Attention

Luann Alemao

Luann Alemao

Degree in family and consumer science

Douglas Jackson, speaker

Douglas Jackson

President/CEO of Project C.U.R.E.

John Foley, speaker

John Foley

Former Lead Solo Pilot

Michael Tchong, Change Speaker

Michael Tchong

An Innovation Specialist who was Dubbed "America's Most Influential Trendspotter"

John Sculley

John Sculley

The Quintessential Smart Entrepreneur - A Compelling Public Speaker on Innovation in Global Business and Technology

Krister Ungerbock, Keynote Speaker

Krister Ungerbock

Leadership Language Expert

Karen Cook, Healthcare Speaker

Karen Cook

Healthcare Coach

Daniel  Newman

Daniel Newman


Dave Knox, speaker

Dave Knox

Digital innovation and disruption



I just wanted to thank Matt Meyer and Sheryl Moon for their meticulous assistance with identifying, securing and preparing our chosen guest s..

Testimonials | TraceLink | Executive Speakers

This was my first experience using ESB to locate and secure a keynote speaker for my Corporate event. They were extremely easy to work with a..

AngMar Medical Holdings

"Matt Meyer was really wonderful in assisting me to find the correct keynote speaker for our conference. Jenny Foreman was completely on top ..

The Anchor Group

"As always, Executive Speakers Bureau helped us execute another flawless event. It is always so reassuring to know that you have a team behin..

Texas Hospital Association

"What stands out about the times I have worked with Executive Speakers Bureau is their lightning-fast response time. ESB’s account exec..

Keynote Speaker

"I've worked with Richard and ESB for many years and he's always able to deliver for us. He works hard to meet your speaker goals within the ..

Chem Dry

"Angela is the best!!! I can always count on her honest feedback about speakers. She helps me look like a hero to my company!"

Testimonials | Medtronic | Executive Speakers

"ESB continues to deliver great options for us as we plan our event each year."

Testimonials | Arkansas Heart Hospital | Executive Speakers

“I am banging my head against the wall right now for all the times I have done this without using Executive Speakers Bureau. This ..

Clorox Client

"The conference was an immense hit – we certainly raised the bar in our company on how conferences are planned and executed. You and yo..

Testimonials | Benchmark Global Hospitality | Executive Speakers
Need Suggestions? Have Questions?

Need Suggestions? Have Questions?

Call to discuss how we can you help find the right speaker(s) for your organization.

2021 Executive Speakers Bureau. All Rights Reserved.

Design and Developed by eBiz Solutions

Get Ideas in 1 hour or less

Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.

Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.

Please fill in information below