901-754-9404
My List0

We've now made it easier for you to research and save your favorite keynotes speakers. Click on the + sign to add a speaker to your Speaker List and email your favorites to colleagues and friends.

using System.Text.RegularExpressions;
John Sileo, Fraud Prevention Speaker
5
1 Review(s)

John Sileo

    • Cybersecurity Expert & Hall of Fame Keynote Speaker
    • CEO & President, The Sileo Group
    • Inducted into the National Speakers Hall of Fame
    • Certified Helicopter Parent
Full Bio
Fee Range

$20,000 - $30,000

Travels From

Colorado

Bridging Personal & Workplace Security to Empower Culture

Bridging Personal & Workplace Security to Empower Culture

Live iPhone Hacking

Live iPhone Hacking

John's Story of Loss Inspires Change

John's Story of Loss Inspires Change

Security Through Humor Not Fear

Security Through Humor Not Fear

Human Powered Cyber Security

Human Powered Cyber Security

John Sileo left hi-tech consulting for two reasons: to start a family and to launch a software startup in the earliest stages of cloud computing. Six successful years, a multimillion-dollar business and two precious daughters later, he lost the business and his wealth to cybercrime.

Because the cybercriminal, a company insider, masked the crimes using John’s identity, John was held legally and financially responsible for the felonies committed. The losses destroyed his company, decimated his finances and consumed two years of his personal life as he fought to stay out of jail.

John Sileo has shared his story and hard-earned lessons as an award-winning author, 60 Minutes guest and keynote speaker to the Pentagon, Schwab and thousands of audiences ready to defend their data. John specializes in the human element of cybersecurity and uses humor, audience interaction and cutting-edge research to keep his message relevant and entertaining.

John is CEO & President of The Sileo Group, a Denver-based technology think tank. He graduated with honors from Harvard University and was recently inducted into the National Speakers Hall of Fame.

When not speaking, John spends time hiking with his family in the Rocky Mountains, reading psychological thrillers and earning his 3rd-degree black belt in Taekwondo, where he is regularly thrashed by teenagers half his size.

The Hacker’s Blacklist: Critical Cybersecurity Threats & Solutions

To avoid becoming the next disastrous data-breach headline, you must foster a healthy culture of security that addresses both the technological and human elements of data defense. Change happens when you create energy and buy-in among the people who handle your mission-critical information. When it comes to the latest data security threats, you can’t possibly do everything—but you must do the right things. This cybersecurity training crash course forges a high-level, non-technical path through the often-confusing web of human decision making, cyber defense, mobile technology, IoT, social media and cloud computing—critical components of your success. This highly-interactive presentation builds on John’s experience losing everything to cybercrime, continues with a live hacking demo of an audience member’s smartphone and ends with an actionable Roadmap of Next Steps.

 

C-Level Cybersecurity: Building a Bulletproof Culture of Security

Security awareness starts at the top. Cybercriminals lust for your corporate data. Competitors bribe your disgruntled employee for a thumb drive full of confidential files. Social engineers exploit your executives’ social media profiles – a veritable “how-to” guide for network security access. Hackers “sniff” unprotected IP addresses and cloud traffic you didn’t even know existed. Cyber extortionists encrypt your mission-critical data and demand a ransom. In the meantime, you end up the next disastrous headline – reputation damaged, customers fleeing. Cybercrime and corporate data breach are a huge financial cost and legal liability to organizations. This does not have to be your fate. As a leader, you must learn to cope with a wide range of cyber threats with little to no technical background, limited resources and almost no lead time. The answer lies in your preparation and strength of culture. This presentation aims at leaders looking to imbue their culture with security strategies from the boardroom to the break room. John leverages his work with clients like the Pentagon and Schwab to help you develop a prioritized punch list of critical action items.

 

Think Like a Spy: Personal Identity Theft Protection

Identity theft training is no longer optional. Every move you make in the digital world can be tracked, hacked, recorded and exploited. Threat sources like smartphones, the Internet of Things (IoT), wearable technology, cloud computing, and social media have shifted the competitive landscape in favor of cyber-savvy users with strong identity theft training. Due to the power of personally identifying information (PII) and the rapid rate at which information is being compromised, we must leverage the very latest prevention tools to protect everything from our Social Security numbers to bank accounts, from passwords to confidential emails. John delivers these identity theft countermeasures in a highly interactive, disarmingly humorous presentation inspired by his personal loss of more than $300,000, his business and two years of his life to data theft. In Think Like a Spy, John focuses specifically on identity theft prevention tools that apply to every individual in your audience.

 

The Art of Human Hacking: Social Engineering Self Defense

Anti-fraud and social engineering training only work when your people experience it in person. Human beings can be the weakest link or the strongest competitive advantage in the security and profitability of your information assets. But people are the most commonly underutilized, least expensive weapon in your fight against cybercrime. Social Engineering Training too often fails because of Death by PowerPoint. Fraud training needs to be engaging and interactive to be effective. To put it simply, this session makes security fun, so that it sticks. In this continually-interactive session, John goes deep into social engineering tools and tricks used to separate you from your critical data. By building System-1, Reflex-Based Awareness around how tools like social media, trust shortcuts, ego-stroking, greed appeals, and cortisol flushing enable social engineers, John will dramatically reduce the human element of your threat footprint. By the time John finishes his entertaining closing story, your audience will be fully empowered to detect and deter social engineering, fraud, and deception.

Speaking Topics:

Related Speakers

Thorton May Speaker

Thorton May

Futurist

Mike Walsh, speaker

Mike Walsh

CEO of Innovation Research Lab

Ron Galloway, Speaker

Ron Galloway

Expert on the Disruptors' (Apple

Jason Chaffetz, speaker

Jason Chaffetz

Fox News Channel Contributor

Tan Le, Speaker

Tan Le

Innovative Technology Entrepreneur

David Linthicum, B2B & B2C Speaker

David Linthicum

Executive

Danielle Feinberg Speaker

Danielle Feinberg

American Cinematographer Known for Work on Pixar Movies

Shivvy Jervis, Speaker

Shivvy Jervis

Award-winning Industry 4.0 Futurist

Sima Dahl, Social Media Speaker

Sima Dahl

Trainer. Coach. Emcee. Impresario. Author. Networker and Dot Connector.

Marc Prensky, Leadership Speaker

Marc Prensky

Education

Gautam Gulati

Gautam Gulati

Executive

J.D. Kleinke, Speaker

J.D. Kleinke

Medical Economist

Reviews

Customer Rating 5

5
1
4
0
3
0
2
0
1
0
Click testimonials tab below for detailed feedback.

November 11, 2019

audience loved it and gave us feedback right after the session how much they enjoyed it and got something out of it.

Altria Client Services

Testimonials

This was my first experience using ESB to locate and secure a keynote speaker for my Corporate event. They were extremely easy to work with a..

AngMar Medical Holdings

"Matt Meyer was really wonderful in assisting me to find the correct keynote speaker for our conference. Jenny Foreman was completely on top ..

The Anchor Group

"As always, Executive Speakers Bureau helped us execute another flawless event. It is always so reassuring to know that you have a team behin..

Texas Hospital Association

"What stands out about the times I have worked with Executive Speakers Bureau is their lightning-fast response time. ESB’s account exec..

Keynote Speaker

"I've worked with Richard and ESB for many years and he's always able to deliver for us. He works hard to meet your speaker goals within the ..

Chem Dry

"Angela is the best!!! I can always count on her honest feedback about speakers. She helps me look like a hero to my company!"

Testimonials | Medtronic | Executive Speakers

"ESB continues to deliver great options for us as we plan our event each year."

Testimonials | Arkansas Heart Hospital | Executive Speakers

“I am banging my head against the wall right now for all the times I have done this without using Executive Speakers Bureau. This ..

Clorox Client

"The conference was an immense hit – we certainly raised the bar in our company on how conferences are planned and executed. You and yo..

Testimonials | Benchmark Global Hospitality | Executive Speakers

"Johnny Cupcakes was a hit last night! Thank you both so much for all of your assistance through this process, it has been such a positi..

Johnny Cupcakes | Testimonials | Executive Speakers
Need Suggestions? Have Questions?

Need Suggestions? Have Questions?

Call to discuss how we can you help find the right speaker(s) for your organization.

Get Ideas in 1 hour or less

Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.

Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.

Please fill in information below