Driven by his own experience as a victim of identity theft, John Sileo has become a world-renowned identity theft speaker and expert on data theft, helping organizations to take proactive steps in preventing identity fraud. John is a uniquely qualified identity theft expert who can help you protect your business, your reputation, and your profits. Through a fun and unique approach, John engages crowds to get them excited about doing their part to prevent identity theft. John combines entertainment and relevant content in each and every conference or event to engage users in this mission-critical topic.
The Cyber Blacklist: Top Threats & Countermeasures for Data Security
At the heart of most data theft is lax cyber security: a broad term that will cease to intimidate you after this
presentation. Technology evolves so quickly that it’s easy to fall behind the digital curve and become
overwhelmed by the prospect of protecting the very data that underlies our wealth. In this state, we tend
to freeze, make excuses and assume that there is no reasonable, cost-effective way to protect our data.
That assumption is both wrong and dangerous. This crash course forges a high-level, non-technical path
through the sometimes confusing web of human decision making, computer security, mobile technology,
Internet connectivity, on-line privacy and cloud computing. When it comes to cyber security, you can’t
possibly do everything-but you must do the right things. By the end of this highly interactive presentation,
you will have an applicable and actionable Blacklist of next steps to protect your sensitive data, mobile
devices, social identity and, ultimately, your wealth and profitability.
Data Spies, Hackers & Internet Attackers: Bulletproof Your Privacy & Profits
Every move you make in the digital world is tracked, recorded and exploited. Tools like smartphones, iPads,
cloud computing and social media have shifted the competitive landscape in favor of cyber-savvy users,
prompting a question: Are you in control of your digital footprint, or are you being controlled? Are you
protecting the information your people share on social networks? Are mobile devices and free Wi-Fi a
recipe for costly data exposure? If you unknowingly stack the deck in favor of cyber criminals and
competitive spies, the results could be devastating. However, if you utilize technology to your advantage,
your bottom line benefits. This presentation highlights current data privacy trends as well as practical,
Think Like a Spy: Aggressive Identity Theft & Fraud Countermeasures
Identity theft and on-line fraud are destructive side effects of information over-exposure. Due to the power
of personally identifying information and the rapid rate at which it is being compromised, we must leverage
formidable tools to protect everything from Social Security numbers to bank accounts, from passwords to
intellectual property. John delivers those exact identity theft prevention tools in a highly interactive,
surprisingly humorous presentation inspired by his own life-changing battles with identity theft and privacy
exposure. John will help you to “own” your identity- to take responsibility for the sensitive data that powers
The Art of Human Hacking: Social Engineering Self Defense
Human beings are always the weakest link in the security, privacy and profitability of your information
assets. And they are the most overlooked, least expensive weapon in your fight against fraud, data breach
and profit erosion. But you can’t detect and deter deception with a dry Power Point presentation. You must
experience the feelings of fraud first hand; you need to understand the brain science behind manipulation.
In this highly interactive session, John takes a deep dive into the tools and tricks used by social engineers to
separate you from your critical data. By building reflex-based awareness around how tools like Facebook,
trust shortcuts, ego stroking, greed appeals, and cortisol flushing enable social engineers, John will
dramatically reduce your threat profile for fraud, deception and social engineering. In this way, human
become the most powerful line of defense.