Aggressive Identity Theft Training & Fraud Prevention
Entertaining Training without the Techno-babble
Entertaining Training without the Techno-babble
“John is the best speaker I’ve ever heard. Love how he connects the dots between personal identity and business security.”
– Texas Dental Forum
Identity theft training is no longer optional. Every move you make in the digital world can be tracked, hacked, recorded and exploited. Threat sources like smartphones, the Internet of Things (IoT), wearable technology, cloud computing and social media have shifted the competitive landscape in favor of cyber-savvy users with strong identity theft training, prompting a question: Are you in control of your data, or are you being controlled? Due to the power of personally identifying information (PII) and the rapid rate at which information is being compromised, we must leverage prevention tools to protect everything from our Social Security numbers to bank accounts, from passwords to confidential emails.
John delivers these identity theft countermeasures in a highly interactive, disarmingly humorous presentation inspired by his personal loss of more than $300,000, his business and two years to data theft. Identity theft is America’s fastest-growing crime for more than a decade running. It affects not only individuals and families, but also has costly liability implications for every organization (data breach, corporate espionage, cyber extortion). Good online privacy habits lead to safer data among your attendees and within their organizations. Safe data is profitable data. In this speech, John focuses specifically on identity theft protection tools that apply to every individual in your audience.
Leverage Your Investment With a Deep-Dive-Interactive-Breakout
Interactive breakout and workshop sessions pick up where keynote and general sessions leave off—they make learning stick. By helping your audience get their “hands dirty” and by tapping the group’s internal expertise and industry experience, John will customize your breakout to fit the needs of the very people in the room.
Continuing Education via Video Tips
Keynote presentations are sparks meant to ignite the flame; it’s the follow-up work that kindles strong ideas into a full-blown fire. Following up John’s keynote with short, entertaining and actionable video tips that consistently reinforce key learnings keeps your investment working for you long after the stage lights have dimmed. Watch an episode of Sileo On Security to see why so many of our clients choose to keep the education going.
Reward Your VIPs With a Customized Roundtable
Successful organizations and conferences frequently reward their highest-value participants with a deeper level of service. Because cyber security, identity and privacy are sensitive issues, many executives and VIPs appreciate discussing particulars with a select group of peers behind closed doors. The conversations that happen around John’s roundtable are confidential, innovative and faced paced.
Provide Meaningful Takeaways to Reinforce Next Steps
Many event professionals like to encourage work beyond the conference by providing further resources to their attendees. Adding one of John’s books (e.g., Privacy Means Profit) to your event will leave attendees with a clear roadmap of next steps and a tangible reminder of the meeting’s exceptional value.
Improve Idea Absorption with Extended Q&A
If you really want your attendees to connect with the topics at hand, give them time to apply it to their own lives and jobs. In the hours after a keynote, the audience has a one-time opportunity to apply the general lessons of the presentation to the specific needs of their organization. Extended Q&A is the perfect vehicle for clarification, for customized application, and for sending the message that you care about them as individual. Extended Q&A often incorporates leaders from your organization who lend a supportive voice to the cultural changes you are seeking.
Call us today at 303.777.3221