$15,000 - $20,000
$10,000 - $15,000
District of Columbia
Tyler Cohen Wood is an internationally recognized technologist and thought leader with over 21 years of highly technical experience, including 13 of which were spent working for the Department of Defense (DoD). She sits on several global advisory boards such as the Global Cybersecurity Association, EC-Council Incident Handlers global board amongst others.
She is the Co-Founder of the startup, Dark Cryptonite, which is working on leading-edge U.S. patent-pending technology to revolutionize the way governments and businesses operate, making data virtually 100% safe from cyber terrorism and information warfare. Dark Cryptonite utilizes advanced blockchain algorithms and zero trust models with the goal of being the world's first 'All Digital Bunker'.
Tyler is also the Founder and CEO of MyConnectedHealth Inc., a unique global health care platform that connects the best of technology (AI, ML), healthcare, and secure patient crowd data to strategically diagnose and treat disease. Tyler also hosts a live talk show called “MyConnectedLife” on the Voice America network that discusses cybersecurity, health-tech, fintech, and all the latest cyber hot button issues.
Tyler has worked in the private sector as a Director of the Cyber Risk Management group at AT&T, using thought leadership and her cybersecurity expertise to develop new and inventive solutions to protect customers from hackers and the ever-increasing cyber threat landscape.
Prior to that, Tyler worked at the U.S. Defense Intelligence Agency (DIA) under the DoD, serving as a Senior Intelligence Officer, Deputy Cyber Division Chief of the Special Communications Division, and the DIA Science and Technologies Directorate-selected Cyber Subject Matter Expert (SME). While at DIA, she developed highly technical cyber solutions, cybersecurity awareness training, and made recommendations and decisions significantly interpreting, developing, and changing critical cyber initiatives and directives affecting current and future DoD and intelligence community programs. She has helped the White House, DoD, federal law enforcement, and the intelligence community thwart many threats to the United States cyber security.
Tyler was also responsible for developing and leading many interagency working groups and task forces to develop, assess and deconflict advanced technical capabilities, techniques, and cybersecurity awareness training currently being used by U.S. Special Forces and the intelligence community to conduct special operations and missions.
As a keynote speaker, author, national security expert, and overall cyber authority, she is relied on to provide unique insight into cyber threats, cyber warfare, mitigating cyber risk, national security, and ensuring industries have the tools and knowledge they need to defend themselves in the digital world. She has received many awards such as Top 10 Cybersecurity Keynote Speakers in Onalytica’s 2021 report, “Who’s Who in Cybersecurity and The Top Influencers and Brands, Cybercrime magazine’s Top 30 Cybersecurity Experts to Follow in 2021”. She was also listed as "Top 50 Women in Tech Influencers to Follow 2021" by The Awards Magazine, 30 Most Inspiring Women in AI 2021 by Engati, Top 10 Cybersecurity speakers and influencers by Kevsbest, and is a Finalist for Cybersecurity of Woman Leader of the Year 2021.
She has given many empowering keynotes and presentations for companies ranging from start-ups to Fortune 100s. Tyler has been a keynote and session speaker at conferences such as RSA, Defcon/Blackhat, HTCIA, Bloomberg Legal Conference Series, DoD Cybercrime Conference, ISSA, ISACA, EY Global and Mobility Talent Conference Berlin, A Gateway to Cybersecurity, Annual Corporate Fleet Conference (AFLA 2018), EC Council, Hacker Halted, FedEx Cyber Security Conference, BankersWeb Conference, Canadian Pharmacy Conference, Raymond James, Chicago Mercantile Exchange and many more.
Tyler’s expertise has made her a highly sought-after guest and writer for both national and local television, radio, print, and online media. She has been featured on Good Morning America, FOX and Friends, CBS Evening News, ABC World News Tonight, Bloomberg, CNN, FOX, CBS, ABC, NBC, WGN, among others, and in The Wall Street Journal, Washington Post, and Huffington Post.
She is also the author of Catching the Catfishers: Disarm the Online Pretenders, Predators, and Perpetrators Who Are Out to Ruin Your Life (2014, The Career Press), which teaches how to safely and successfully navigate the online world, and protect yourself, your children, your business and your privacy.
Redefining Cyber Security by Employing a New Paradigm
The media is awash with seemingly daily reports of more and more serious cyber-attacks. We are losing the battle with cybersecurity and will continue to in the future unless we make critical and fundamental shifts to our paradigm. Cybersecurity leaders agree that the field has become one in which we find ourselves in a constant reactive loop, where we’re putting out fires without truly identifying underlying problems. Without addressing the problems, how can we even begin to address the solutions?
This presentation will closely align the disconnects and critical failures facing cybersecurity with another industry that has achieved pockets of excellence that go a long way to mitigating failure. Through Wood’s extensive background in multiple aspects of cybersecurity and her experience navigating another equally complex field, she will use her expertise and unique storytelling approach to share how to truly understand cyber challenges in order to fully address the bigger picture with concrete solutions. Through analogies and case studies, Wood will detail the major cyber problems businesses face today and demonstrate how, by employing a new model and paradigm, we can begin to solve the cybersecurity and workforce problems today and those on the threat horizon of tomorrow.
Corporate Cyberwarfare: Real Solutions to Protect your Business and Assets
With cyberattacks already at a critical level, it’s important to understand specific active threats, who’s carrying them out, what is being done and what else can be done about it. Cyber threats have cyber war is being waged today, we can take tactical preventative measures to stave off a lurking disaster that could potentially put a company out of business.
In today’s quickly evolving connected world where business is more frequently done on the go using mobile, IoT and many other smart devices, cyber threats are more of a risk to corporations than ever. What are the threats to businesses and just how realistic are they? Can they really happen? How can we ensure we are armed with the knowledge to protect corporate assets and critical business infrastructure from increasingly aggressive threat actors? Many businesses know that the threats are out there but aren’t sure what to do about it or even how to begin to tackle the problem at hand.
This presentation will focus on the real cyber-attacks being enacted today against businesses of all sizes, and what can be done about them. We’ll cover the current threat landscape and the ever-looming threat horizon of corporate cyber risk. We’ll also explore how the unique challenges of remote work using connected devices, implants, and A.I. affect business cybersecurity. At the end of the presentation the audience will have a close understanding of the main threat actors, the threats themselves and how to protect businesses against them.
What attendees will learn from this presentation:
The New and Improved Big Data Analytics: Good Enough to Solve a Murder?
There’s been a murder! After detailed forensic data collection, law enforcement officials begin to piece together the facts. They parse through physical data, social media, digitally collected data from witnesses and suspects and other open source intelligence (OSINT) to attempt to piece together the “who done it and why” in order to solve what seems to be an unsolvable case.
We know that social media, digital devices, and apps we rely on collect information on us. But do we know exactly what that means or just how comprehensive and intimate that data is? Most terms of service will tell you exactly what is collected and that apps have the right to distribute collected content to third parties, usually to make your service better. What isn’t said is how the data is put together, the impact that it can have at the personal, company and national security levels and what form future collection techniques might take. This presentation will show just how vast the scope of information collection is now and how it will be in the future. We’ll also demonstrate how, when pieced together in the right order, data can even solve a seemingly unsolvable crime.
The Future of Healthcare: Connected and Intelligent
There are two types of people in this world—those who are happy with the healthcare system and anyone who has ever needed to use the healthcare system. For many, the current model of healthcare is frustrating and, at its worst, negligent. People with chronic illnesses or rare diseases are hit especially hard by the gaps in our system.
Cohen Wood spent her entire career in cybersecurity working with data and understanding the significance of the cyber world in our reality. She used her tech background to develop her idea for a better healthcare system into MyConnectedHealth, an A.I.-driven view of medicine.
Cohen Wood is proof of the concept herself. By using the concept behind MyConnectedHealth Cohen Wood was able to diagnose herself (confirmed by physicians) with her rare disease—so rare only 300,000 people in the United States have it. Just the mere concept of MyConnectedHealth surpassed the medical system that had failed her for years in a matter of minutes.
This presentation will not only share with you the latest technology and trends happening in healthcare; but inspire your team to think "outside of the box" in order to improve patient outcomes by fast tracking patient diagnosis and treatment plans, eliminating duplicate tests, and offering cost-saving efficiencies.
Protecting Your Property: Shielding Your Company’s Assets and Image
In today’s fast-paced business and Internet of Things connected world, working away from the office using mobile and other connected devices for telecommuting and productivity has become mainstream. But how do we know what confidential data, tradecraft or intellectual property this technology might be unknowingly giving away to corporate spies, hackers or data marketers? This presentation will teach you and your employees how to safely and securely protect company confidential information while using mobile devices both inside and outside the workplace, and also how to protect corporate intellectual property and trade secrets that may be at risk through social media and mobile device use. This presentation will also teach how to protect your corporate image and assets.
Using the Internet to Hire Right: An Ounce of Prevention – A Ton of Trust
These days it takes more than a meet-and-greet to be sure a potential hire is who they say they are and can do what they claim to do. In-person interviews often don’t give you the whole picture, and certainly, don’t reveal potential threats. However, there’s no hiding from an online profile which has been accumulating ever since that person first logged on to the internet. This presentation will teach HR professionals, recruiters, managers, and executives how to use social media and the internet to help rethink, or reaffirm, their confidence in potential candidates and current employees.
Take Control: Protecting Your Privacy & Managing Your Online Image
In this presentation, you will learn how to shield your personal information and safely and successfully navigate the online world, protect yourself, your children, your company, your privacy, and your communications, and learn to vet if someone is who they claim to be online. You will also learn how to read deception and lies in other people’s online identities and posted content, such as social media, emails, reviews and dating profiles. While learning the skills for personal protection, you will also learn how to apply these same techniques to your professional life, clean up and leverage your online image for social and career success, and develop beneficial relationships online. Whether you’re a seasoned professional, a recent graduate entering the workforce or a working parent concerned about your children’s safety, this presentation will provide valuable information and tips to ensure security and success online.
HACKERNOMICS: Using The Best Practices of Cyber-Criminals to Beat Your Competition
Why are hackers more creative than you? How do they see threats as opportunities? How do they use new technologies as tools to create new sources of revenue? Why are your apathetic and dispassionate workers and customers the best targets to expand their markets. Why is talent and knowledge at a premium for them? Learn this and many more eye-opening insights from one of the leading experts on cyber-crime.
© 2022 Executive Speakers Bureau. All Rights Reserved.
Design and Developed by eBiz Solutions
Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.
Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.