Interactive Virtual Breakout Sessions
Interactive breakout and workshop sessions pick up where keynote and general sessions leave off to make learning stick. John will customize your breakout session to fit the needs of the very people in the room.
The rules of cybercrime have changed. To keep up, your people need to be armed with the most up-to-date information and cutting-edge tools to identify and mitigate threats. That’s where John Sileo comes in. As your virtual keynote speaker, John addresses a cyber landscape that is ever-shifting. He reinvents the definition of a virtual keynote, moving from “talking at” to “collaborating with” the audience. He can host and produce highly professional virtual keynotes and roundtables customized to your requirements. The best part? The audience can watch from anywhere in the world, even in their pajamas.
John and his team will handle all registration, tech set-up, and hosting of the event from his professional studio using Zoom video conferencing (or your corporate hosting platform). Simply email attendees a link to the registration, perform some in-person follow-up with key attendees, and log in to the virtual event, popcorn in hand.
John will host and produce a customized virtual keynote and roundtable on your chosen topic. In his virtual presentations, John will:
In this keynote presentation, John will leverage potent lessons learned from losing everything to cybercrime as well as a humorous hacking demonstration to build a Blockbuster Framework for analyzing, organizing, and communicating a powerful cyber defense strategy.
Think Like A Spy focuses on taking control of your identity and privacy. Due to the rapid rate at which information is being compromised, you must leverage the very latest prevention tools to protect everything from your Social Security number to bank account, from passwords to confidential emails. John delivers these identity theft and privacy countermeasures in an engaging and humorous speech.
In this fun presentation, John will use his own losses at the hands of social engineering to illustrate the tools and tricks used to separate you from your critical data, including: System 1 & 2 reflexes, social media harvesting, trust shortcuts, ego stroking, greed appeals, and cortisol flushing. By John’s closing story, you will be fully empowered to detect and deter social engineering and fraud.
This cyber-leadership crash course forges a high-level, non-technical path through the often-confusing web of cybersecurity. John leverages his first-hand experience of losing everything to cybercrime to help the audience create an actionable Roadmap of Leadership Next Steps.
Interactive breakout and workshop sessions pick up where keynote and general sessions leave off to make learning stick. John will customize your breakout session to fit the needs of the very people in the room.
In the hours after a keynote, the audience has the opportunity to apply the general lessons of the presentation to the specific needs of their organization. Extended Q&A is the perfect vehicle for clarification and customized application.
John’s roundtable sessions allow executives and VIPs to participate in confidential, innovative cybersecurity discussions with a select group of peers.
Many event professionals like to encourage work beyond the conference by providing further resources to their attendees. Adding one of John’s books (e.g., Privacy Means Profit) to your event will leave attendees with a clear roadmap of next steps.
John’s educational video clips reinforce key learnings to keep your investment working for you long after the stage lights dim.