Clarify white-hot topics, including: post-pandemic cyberthreats, cloud computing, artificial intelligence, supply chain attacks & disinformation
“If we could quantify the impact of John’s cyber security presentation on our attendees, it would likely be in the millions.”
– Young Presidents Organization
Hackers don’t just adapt to change; they bank on it. Has your mindset evolved? The rapid expansion of remote workforces, ransomware gangs, cloud jacking, IoT hacking, supply chain attacks, social engineering, insider theft and disinformation campaigns have altered the way we must defend our data, reputation, and profits. A faulty adage asserts that humans are your weakest link when in reality, they can be your greatest defense. Cybersecurity doesn’t grow from shinier tools, but from the powerful intersection between human beings and technology.
In his highly-interactive keynote presentations, John leverages potent lessons learned from losing everything to cybercrime as well as a humorous live-hacking demonstration to build a Blockbuster Framework for analyzing, organizing, and communicating your powerful cyber-defense strategy. Don’t underestimate the ROI of a cybersecurity speaker who generates momentum and buy-in among the heroes who handle your mission-critical data every day. Because when it comes to the latest cyberthreats, you can’t possibly do everything — but you must do the right things.
Leverage Your Investment With a Deep-Dive-Interactive-Breakout
Interactive breakout and workshop sessions pick up where keynote and general sessions leave off—they make learning stick. By helping your audience get their “hands dirty” and by tapping the group’s internal expertise and industry experience, John will customize your breakout to fit the needs of the very people in the room.
Continuing Education via Video Tips
Keynote presentations are sparks meant to ignite the flame; it’s the follow-up work that kindles strong ideas into a full-blown fire. Following up John’s keynote with short, entertaining and actionable video tips that consistently reinforce key learnings keeps your investment working for you long after the stage lights have dimmed. Watch an episode of Sileo On Security to see why so many of our clients choose to keep the education going.
Reward Your VIPs With a Customized Roundtable
Successful organizations and conferences frequently reward their highest-value participants with a deeper level of service. Because cyber security, identity and privacy are sensitive issues, many executives and VIPs appreciate discussing particulars with a select group of peers behind closed doors. The conversations that happen around John’s roundtable are confidential, innovative and faced paced.
Provide Meaningful Takeaways to Reinforce Next Steps
Many event professionals like to encourage work beyond the conference by providing further resources to their attendees. Adding one of John’s books (e.g., Privacy Means Profit) to your event will leave attendees with a clear roadmap of next steps and a tangible reminder of the meeting’s exceptional value.
Improve Idea Absorption with Extended Q&A
If you really want your attendees to connect with the topics at hand, give them time to apply it to their own lives and jobs. In the hours after a keynote, the audience has a one-time opportunity to apply the general lessons of the presentation to the specific needs of their organization. Extended Q&A is the perfect vehicle for clarification, for customized application, and for sending the message that you care about them as individuals. Extended Q&A often incorporates leaders from your organization who lend a supportive voice to the cultural changes you are seeking.