Pre-Event Promotional Materials
Short Bio for Event Materials: John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority – being present for his family. Six successful years, a thriving $2M business and two precious daughters later, he lost it all to cybercrime. Because the cybercriminal masked the crimes using John’s identity, Sileo was held responsible for the felonies committed. The losses destroyed his company, decimated his finances and consumed two years as he fought to stay out of jail. And from these bitter circumstances, John made lemonade.
John Sileo is an award-winning author and highly sought-after cyber expert from 60 Minutes to the Pentagon, USA Today to Rachel Ray. His satisfied clients include a Who’s Who of the Fortune 1000, Government, Associations and Small Business. The CEO of a Denver-based cyber think tank, an honors graduate from Harvard University and an inductee into the National Speakers Hall of Fame, John still values his remarkable wife and highly spirited daughters over all other successes.
Speaker Photo: Click Here for a Hi-Resolution Image (After clicking link, right click on image to save)
Speech Titles & Descriptions:
The Hacker’s Blacklist: Critical Cybersecurity Threats & Solutions
The heart of good cybersecurity starts with the human beings that help it flourish, or fail. To avoid becoming the next disastrous data-breach headline, you must foster a healthy balance between computer security and human behavior. Cybersecurity isn’t just about overspending on shinier technology – it’s about building a mindset and culture that evolves with the threats.
This crash course forges a high-level, non-technical path through the confusing web of cybersecurity, human decision making, network protection, mobile technology, the Internet of Things, social media and cloud computing—critical components of your information strategy. In this presentation, John will leverage his story of losing his business to cybercrime as a blueprint for how to protect the information that drives your organization.
Key Takeaways:
- Understanding the “Why” behind cybersecurity as well as the “How to”
- A clear understanding of what cybersecurity means and how it works
- An overview of the 7 Critical Threat Trends in data security
- How to move from humans being your “weakest link” to your greatest asset
- A tactical roadmap of critical data, necessary conversations and next steps
- Prioritized solutions for ransomware, phishing, mobile hacking, cyber blackmail…
- How to detect, reflect and react to social engineering & fraud techniques
- A re-energized desire to address and eliminate key threats in your organization
Related Titles and Follow-Up Presentations on this topic:
- Bulletproofing Your Business Against Breach: A Cybersecurity Crash Course
- Cybersecurity Threats, Trends & Countermeasures: Annual Update
- The Cybersecurity Crash Course for Small/Medium Businesses
Deep Dive Options available in conjunction with this topic:
- Leverage your investment with an interactive, workshop-style breakout
- Empower your audience with continued video learning beyond the stage
- Reward your VIPs with a customized, small-group round table
- Provide meaningful takeaways (books, DVDs, guides) to reinforce next steps
- Improve idea absorption with an extended Q&A session
- To learn more about leveraging John’s continuing education video series to help secure, engage and retain your clients, please ask us for details or visit SileoOnSecurity.com.
The Art of Human Hacking: Social Engineering Self Defense
Fraud training only works when it happens in person. Human beings can be the weakest link or the strongest competitive advantage in the security and profitability of your information assets. But people are the most commonly underutilized, least expensive weapon in your fight against cybercrime. Social Engineering Training too often fails because of Death by PowerPoint. Security needs to be engaging – has to be interactive – to be effective. To put it simply, this session makes security fun, so that it sticks. Additionally, your audience must experience manipulation, deception and fraud first hand before their behaviors are ripe for change.
In this continually-interactive session, John goes deep into social engineering tools and tricks used to separate you from your critical data. By building System-1, Reflex-Based Awareness around how tools like social media, trust shortcuts, ego stroking, greed appeals, and cortisol flushing enable social engineers, John will dramatically reduce the human element of your threat footprint. Safe data is profitable data, whether it’s a client’s credit card number, a patient’s medical file, an employee’s benefit plan or sensitive intellectual capital. By the time John finishes his entertaining closing story, your audience will be fully empowered to detect and deter social engineering, fraud and deception.
Key Takeaways:
- How to identify the most common forms of social engineering
- Reflexes to instinctually detect manipulation and negative influence
- How to apply anti-social-engineering skills in the workplace, in person and at home
- Understanding 7 signs of deception and how to combat them
- Distinguishing weapons of manipulation from tools of influence
Related Titles and Follow-Up Presentations on this topic:
- The Hacker’s Blacklist: 7 Critical Cybersecurity Threats & Solutions
- Bulletproofing Your Business Against Breach: A Cybersecurity Crash Course
- Cybersecurity Threats, Trends & Countermeasures: Annual Update
- The Cybersecurity Crash Course for Small/Medium Businesses
Deep Dive Options available in conjunction with this topic:
- Leverage your investment with an interactive, workshop-style breakout
- Empower your audience with continued video learning beyond the stage
- Reward your VIPs with a customized, small-group round table
- Provide meaningful takeaways (books, DVDs, guides) to reinforce next steps
- Improve idea absorption with an extended Q&A session
- To learn more about leveraging John’s continuing education video series to help secure, engage and retain your clients, please ask us for details or visit SileoOnSecurity.com.
Your Data is Showing: Protecting Your Privacy in the Surveillance Economy
Key Takeaways:
- Biometric Passwords: Yes, No or Maybe
- Configuring digital assistants like Alexa for privacy
- How to keep Google from tracking your every move
- The Internet of Things and the resulting threats to you
- Utilizing two-factor authentication to increase privacy and security
- Background on the Surveillance Economy and how it affects you
Related Titles and Follow-Up Presentations on this topic:
- The Hacker’s Blacklist: 7 Critical Cybersecurity Threats & Solutions
- Bulletproofing Your Business Against Breach: A Cybersecurity Crash Course
- Cybersecurity Threats, Trends & Countermeasures: Annual Update
- The Cybersecurity Crash Course for Small/Medium Businesses
Deep Dive Options available in conjunction with this topic:
- Leverage your investment with an interactive, workshop-style breakout
- Empower your audience with continued video learning beyond the stage
- Reward your VIPs with a customized, small-group round table
- Provide meaningful takeaways (books, DVDs, guides) to reinforce next steps
- Improve idea absorption with an extended Q&A session
- To learn more about leveraging John’s continuing education video series to help secure, engage and retain your clients, please ask us for details or visit SileoOnSecurity.com.
Cyber Security 2020 – Emerging Threats, Trends & Tactics
The cyber-threat landscape is shifting in new and critical directions. While financial gain still drives cybercrime, the accumulation and exercise of raw power is the latest holy grail. Criminals are strategically leveraging potent tools, from hacking the news cycle (fake news) to manipulating outcomes (election fraud), from weaponizing the Internet of Things (cyber warfare) to exploiting information for the purpose of extortion (cyber blackmail). The common mistake is to think that these trends won’t affect an organization like yours or people like you. And that is where the danger lies. Cyber Security 2020 is full of solutions to help you plan and prepare for the latest wave of threats before they land on your shores, saving you time, money and reputational damage.
Key Takeaways:
- An up-to-date roadmap of the cyber-threat landscape
- Key strategies and tools to prepare for the latest attacks
- Background on artificial intelligence, machine learning, Iot, deep fakes, etc.
- A mindset for evaluating and coping with the ever-changing cyber risks
Related Titles and Follow-Up Presentations on this topic:
- The Hacker’s Blacklist: 7 Critical Cybersecurity Threats & Solutions
- Bulletproofing Your Business Against Breach: A Cybersecurity Crash Course
- Cybersecurity Threats, Trends & Countermeasures: Annual Update
- The Cybersecurity Crash Course for Small/Medium Businesses
Deep Dive Options available in conjunction with this topic:
- Leverage your investment with an interactive, workshop-style breakout
- Empower your audience with continued video learning beyond the stage
- Reward your VIPs with a customized, small-group round table
- Provide meaningful takeaways (books, DVDs, guides) to reinforce next steps
- Improve idea absorption with an extended Q&A session
- To learn more about leveraging John’s continuing education video series to help secure, engage and retain your clients, please ask us for details or visit SileoOnSecurity.com.
Think Like a Spy: Aggressive Identity Theft Protection
Identity theft training is no longer optional. Every move you make in the digital world can be tracked, hacked, recorded and exploited. Threat sources like smartphones, the Internet of Things, wearable technology, cloud computing and social media have shifted the competitive landscape in favor of cyber-savvy users with strong identity theft training, prompting a question: Are you in control of your data, or are you being controlled? Due to the power of personally identifying information and the rapid rate at which information is being compromised, we must leverage prevention tools to protect everything from our Social Security numbers to bank accounts, from passwords to confidential emails.
John delivers these identity theft countermeasures in a highly interactive, disarmingly humorous presentation inspired by his personal loss of more than $300,000, his business and two years to identity theft. In this presentation, John focuses specifically on identity theft protection tools that apply to every individual in your audience.
Key Takeaways:
- Overcoming the #1 obstacle to identity theft prevention
- Top trends and countermeasures in protecting personal data
- How to apply detect, reflect and respond tools to fraud
- Identifying the five manipulation triggers and how to defeat them
- Risk-scenario training to make safe data a habit, not an afterthought
- Protecting your mobile devices, social media profiles and online privacy
- Bridging the gap between personal prevention and professional protection
Related Titles and Follow-Up Presentations on this topic:
- Data Spies, Hackers & Online Attackers: Defending Your Personal Data
- Hack Back: Taking Charge of Your Identity & Online Privacy
- A Cybersecurity Crash Course for Your Home & Small Office
Deep Dive Options available in conjunction with this topic:
- Leverage your investment with an interactive, workshop-style breakout
- Empower your audience with continued video learning beyond the stage
- Reward your VIPs with a customized, small-group round table
- Provide meaningful takeaways (books, DVDs, guides) to reinforce next steps
- Improve idea absorption with an extended Q&A session
- To learn more about leveraging John’s continuing education video series to help secure, engage and retain your clients, please ask us for details or visit SileoOnSecurity.com.
C-Level Cybersecurity: Building a Bulletproof Culture of Security
Key Takeaways:
- Map a clear path to a Culture of Security
- Understand the subtleties of security awareness training
- Gain board “buy-in”, appropriate budgets and staff accountability
- Effectively nudge awareness into permanent transformation
- Identify and prioritize top cyber threats
- Turn theoretical solutions into actionable security strategies
- Leverage keystone defense habits to cement change
- Incorporate security by design so that it becomes “business-as-usual”
Related Titles and Follow-Up Presentations on this topic:
- The Hacker’s Blacklist: 7 Critical Cybersecurity Threats & Solutions
- Bulletproofing Your Business Against Breach: A Cybersecurity Crash Course
- Cybersecurity Threats, Trends & Countermeasures: Annual Update
- The Cybersecurity Crash Course for Small/Medium Businesses
Deep Dive Options available in conjunction with this topic:
- Leverage your investment with an interactive, workshop-style breakout
- Empower your audience with continued video learning beyond the stage
- Reward your VIPs with a customized, small-group round table
- Provide meaningful takeaways (books, DVDs, guides) to reinforce next steps
- Improve idea absorption with an extended Q&A session
- To learn more about leveraging John’s continuing education video series to help secure, engage and retain your clients, please ask us for details or visit SileoOnSecurity.com.
White Hot Security Trends: Threats, Thoughts & Tactics
There is no better way to learn about how to cope with the latest and nastiest security threats than from those who have failed hardest! Do you want to know how your organization can avoid the destruction visited upon 150 nation-states during the WannaCry Ransomware attack? Hoping to understand and defend yourself before advanced cyber extortion dismantles your reputation, operation and profitability? Ever seen the inside of an election-hacking machine and what it has to do with your business? Ready for the Internet of Things to transform into an Invasion of Threats?
White Hot Security trends is an up-to-the-minute look at the unbelievable stories unfolding in the world of cyber security – for good and evil. If you have ever had John present before, this is Part II of the series, giving your audience an update on the latest cyber security issues that they will no longer ignore. This session utilizes Appreciative Inquiry techniques that leverage the skills your workforce already has and builds on the aspects of cyber security that already work inside of your culture. Using audience interaction and case studies, John will go in depth into the latest trends and counter-tactics to help your audience understand the risks and protect their critical data assets.
Key Takeaways:
- Clarity on the latest types and trends of cyber crime
- Case studies on how organizations effectively defended against breach
- A look into the future of cybersecurity, cybercrime and cyberwarfare
- Defense tools for cyberespionage and cyber extortion
- Customized content that addresses your organization’s specific needs
Related Titles and Follow-Up Presentations on this topic:
- The Hacker’s Blacklist: 7 Critical Cybersecurity Threats & Solutions
- Bulletproofing Your Business Against Breach: A Cybersecurity Crash Course
- Cybersecurity Threats, Trends & Countermeasures: Annual Update
- The Cybersecurity Crash Course for Small/Medium Businesses
Deep Dive Options available in conjunction with this topic:
- Leverage your investment with an interactive, workshop-style breakout
- Empower your audience with continued video learning beyond the stage
- Reward your VIPs with a customized, small-group round table
- Provide meaningful takeaways (books, DVDs, guides) to reinforce next steps
- Improve idea absorption with an extended Q&A session
- To learn more about leveraging John’s continuing education video series to help secure, engage and retain your clients, please ask us for details or visit SileoOnSecurity.com.
Your Financial Practice as Hero: Adding Customer Value Through Security
No one is in a better position to educate financially savvy customers about protecting identity and net worth than bankers, brokers, agents, accountants and full-fledged financial advisors. Not only do you serve as your client’s trusted advisor and have their “financial ear,” but you also have an ethical responsibility to help them protect their wealth against crimes like identity theft, online fraud and cyber extortion. Here’s the good news: by hosting financial presentations targeting fraud protection training, risk management seminars and identity theft workshops, you create a safer, more loyal customer.
John has delivered cyber-specific financial seminars to more than 100,000 FI customers. His financial presentations cover the most relevant aspects of identity theft prevention, online privacy, social media exposure, mobile technology, cloud computing and Internet banking and investing. Imagine your customer, fully educated about how to protect their financial and informational assets and attributing their increased security to your brand. They will be happier, less likely to defect to automated investment tools and less susceptible to fraud. Safe customers are profitable customers.
Key Takeaways:
- Phone-related investment and IRS fraud
- Banking and investing from mobile devices
- Safely storing financial documents in the cloud
- Protecting online accounts with robust password protection tools
- Utilizing two-factor authentication to bullet proof investment accounts
- Financially motivated phishing, SMiShing and Vishing scams
- Utilizing account monitoring to detect and stop financial fraud
- How to leverage security education to deepen your customer relationship
Related Titles and Follow-Up Presentations on this topic:
- The Hacker’s Blacklist: 7 Critical Cybersecurity Threats & Solutions
- Bulletproofing Your Business Against Breach: A Cybersecurity Crash Course
- Cybersecurity Threats, Trends & Countermeasures: Annual Update
- The Cybersecurity Crash Course for Small/Medium Businesses
Deep Dive Options available in conjunction with this topic:
- Leverage your investment with an interactive, workshop-style breakout
- Empower your audience with continued video learning beyond the stage
- Reward your VIPs with a customized, small-group round table
- Provide meaningful takeaways (books, DVDs, guides) to reinforce next steps
- Improve idea absorption with an extended Q&A session
- To learn more about leveraging John’s continuing education video series to help secure, engage and retain your clients, please ask us for details or visit SileoOnSecurity.com.
Logistics
- Travel: John’s Business Manager will book all flights to and from the event, as John generally flies from one event to the next before returning home.
- Hotel: Hotel reservations are generally organized by the client on a master account, preferably at the same hotel where the meeting is to be held (if applicable). Please guarantee the room for late arrival and have it billed to your master account. John requests up to two nights hotel to ease travel on domestic trips and three nights internationally. Please check with his business manager to confirm which night(s) he will be staying.
- Ground Transport: John loves having a driver meet him in baggage claim, but is also happy to utilize ride-sharing or a taxi.
- Pre-Event Conference Call: a few weeks prior to the event we will want to discuss final logistics (handouts, A/V check, book sales, travel and lodging plans, etc.). Please be ready to provide the name and phone number of John’s A/V contact person as well as an A/V check time.
- Recording & Streaming: We encourage professional audio/video taping of John’s work as well as webcast streaming. If you are planning on taping and have not yet discussed this with Sileo, please contact us on 303-777-3221 immediately about licensing fees and requirements.
- Book-signing Table: If you are having John sign copies of his award-winning book, please have a book-signing table set up so that it is in the flow of audience members as they leave the event room. Please assign someone to make sure the books have been picked up from their delivery location (warehouse, front desk, your offices). Your main contact person will receive a confirmation email when the books have arrived. Having a staff member on hand to help with collecting payments (if you have not pre-purchased copies) greatly speeds up the process.
- Introduction: John’s introduction is a key part of his presentation, as it sets the stage for his topic and credibility. If you haven’t already received it by email, please let us know immediately. Please forward it to the person who will be doing his introduction, and have them contact us directly if they have any questions. It is meant to be a bit lighthearted and has worked thousands of times in previous presentations. John will go over any specifics with the introducer during his A/V check.
- Follow-Up Educational Materials: Interested in extending your attendee’s education beyond the event? Ask us about John’s Video Tip Series to reinforce key learnings and keep your audience up to date on the latest cybersecurity threats and solutions.
Audio Visual & Room Setup (PDF CHECKLIST VERSION)
- An Empty Room During A/V Check: Because many of John’s slides and videos reveal the stories that he uses to engage the audience (and surprise them), there should be no attendees in the room during his A/V check. Event staff, emcees, A/V teams and client leadership are welcome to be there. The A/V check should be at least 75 minutes in advance of John going on stage or attendees entering the room. Please note that the initial setup of projector and screen must be done prior to John’s arrival, as his check will take an additional 60 minutes before audience members are present.
- Seating Arrangements are Critical: If feasible, please seat audience members as close to the stage as possible so that John can interact with them easily. There is a great deal of energy lost in “Death Valley”, the gaping distance between the edge of the stage and the front row. A front row that is 10 feet away from the stage is twice as good as a front row 20 feet back from the platform. Auditorium seating tends to work the best if it fits with your needs. TOO GREAT A DISTANCE BETWEEN THE STAGE AND THE AUDIENCE IS THE #1 EVENT PRODUCTION OVERSIGHT WE WITNESS.
- Stage Setup & Lighting: For audiences over 100 people, a well-lit stage or riser will make viewing easier for audience members sitting in the back. Please provide as much natural light as possible in the room as John moves throughout the audience. The riser should NOT be placed in the corner of the room with the presentation screen in the middle. For optimal stage and seating design, please ask for our opinion. John will not use a lectern and it generally hinders interaction. If the lectern is being used by other presenters, putting it to one side is optimal. John prefers to have a small, sturdy table on stage to set notes, props, water, etc.
- A Wireless Lapel Microphone: John uses his hands throughout the presentation and walks around the audience, so handheld/wired microphones don’t work. Over the ear microphones also do not work for John.
- A Second Wireless Microphone: In certain presentation packages, John includes Q&A with a Catch Box microphone. This makes Q&A much more lively and fun for the audience. If this option is part of your package, John will need a second lav mic for the Catch Box. A/V teams are familiar with this tech.
- An LCD Projector: John needs an LCD projector to project slides. He prefers an HDMI connection to maximize screen resolution. He will provide and HDMI dongle. If HDMI is not available, please contact us.
- Presenting from His Own Mac Computer: Because of copyright restrictions, proprietary presentation software, customized fonts and high-res, multi-gigabyte videos, John must deliver his presentation from his own Mac computer, which is optimized for best performance. It is not feasible to send or transfer this information to client computers or a USB drive.
- His Computer on Stage: Because he switches between software programs throughout the presentation it generally does not work if his computer is located behind the stage or at the back of the room at an A/V table. Ideally, he will have access on the stage. If John’s presentation falls directly after another presentation with no break time, please coordinate logistics with us in the case that the previous presenter needs their laptop on stage as well. We can give suggestions on connecting to a video switcher for immediate transition between the two presentations. John appreciates a confidence monitor, but because his computer is on stage with him, does not require it.
- 16:9 Aspect Ratio: John’s presentation is NOT 4:3 (the old standard). His slides are designed for 1920X1080 resolution and look best when displayed on a screen optimized for 16:9 (your A/V contact will know exactly what this means). Letter-boxing of the presentation is acceptable, if necessary.
- Mini-Jack Audio hookup: John’s presentation does have embedded videos and music, so please include a mini-jack sound hookup that connects to the main sound system as part of your A/V requirements with the conference center. This should be in addition or as backup to HDMI sound, which isn’t always reliable.
Please contact us on 303-777-3221 for any further A/V discussion. Otherwise, John’s Business Manager will contact you to schedule a logistics call a few weeks prior to the event. Thank you.