No videos found.
Jon Engstrom is a 20-year veteran with a major U.S. metropolitan police department where he serves as the technical lead for the agency’s Criminal Intelligence and Cyber-Crime Sections. He founded and continues to support the organization’s Technical Investigations and Open-Source Intelligence Units, and is the operations lead in charge of threat assessment and incident response for the region’s Real-Time Crime Center. Jon instructs internal department teams as well as outside organizations in the areas of Operational Security for Covert Operations, Countering Electronic Surveillance, Cyber-Crime Investigations, and Open-Source Intelligence. Prior to his current assignments, Jon worked as a Federal Task-Force Officer, running under-cover and electronic surveillance operations for long-term organized crime investigations. With a certification in ethical hacking, he focuses on incorporating an attacker’s perspective into investigations and operational security.
Keynote Part 1- Protecting Your Organization from Cyber-Crime
This session focuses on recent trends of online fraud, computer intrusion, and methods that suspects steal valuable data from your company. The presentation includes the details of how hackers commit their crimes and what every employee must do to protect company assets. The audience will learn immediately how password hacking, email phishing, telephone attacks, social engineering, and online devices are an emerging threat against every business. Live examples of 'hacking' into information will surprise the audience, while detailed solutions will be displayed on how to stop the threats. Your employees will easily modify a few key online habits that will help protect your organization from the next attack.
Workshop Part 2 – Cyber-Security and Privacy: Taking Control of Your Digital Life
This session focuses on looking at the threats to our privacy and security and then defending against the most common attacks against both our organizations and our own personal data. We know that more and more often hackers and criminals are targeting individual employee’s personal information in order to compromise sensitive organizational data. This class will cover basic and more advanced best practices for reducing and security your digital footprint. The audience will learn immediately how to properly create and store passwords, generate proper online security questions, secure their home and work computers from online threats, and apply better overall defensive behavior in regard to technology. Attendees will learn how most hackers can access personal online accounts with only one attempt. More importantly, they will learn how to stop the intrusion into our smart devices and the “Internet of Things”. We live in a time where malicious actors are attempting to steal our information on a daily basis and we will build a foundation of actionable measures to fend off these attacks.
Securing Your Digital Life
This session focuses on the numerous ways that suspects steal your personal information and explains how they benefit from the data obtained. The presentation includes live demonstrations of how you and your family are likely to be attacked and the easy steps that anyone can take to prevent becoming a victim. The audience will learn immediately how to properly create and store passwords, generate proper online security questions, secure their home computers from online threats, and apply better overall defensive behavior in regards to technology in the home. Attendees will learn how most hackers can access personal online accounts with only one attempt. More importantly, they will learn how to stop the intrusion.
Advanced Internet Search Techniques
We have all "Googled" someone and received varied results. This data is only the tip of the iceberg when it comes to proper internet search. This presentation will show the audience how to "dig" into the internet for personal information about themselves, their children, or others. While popular sites such as Twitter, Facebook, and Instagram are covered in great detail, including the ability to access data thought to be private, the presentation goes much deeper into the vast resources available online for researching personal information. The content gathered will give a surprising glimpse of what anyone with an internet connection can find out about you! Each presentation is custom tailored for the audience, and can be very beneficial for conducting background checks, employee screening, customer acquisition, and any type of investigation. Lifetime use of custom search tools will be provided to all attendees.
© 2024 Executive Speakers Bureau. All Rights Reserved.
Design and Developed by eBiz Solutions
Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.
Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.