TOPIC
X
IN-PERSON FEE RANGE
X
SPEAKER LOCATION
X
SELECT PROGRAM
X
John  Sileo

John Sileo

Cybersecurity Expert & Hall of Fame Keynote Speaker

In-Person Fee Range:
$20,001 - $30,000
Traveling from:
Colorado
John Sileo – Cyber Security Expert

John Sileo

Cybersecurity Expert & Hall of Fame Keynote Speaker

In-Person Fee Range:
$20,001 - $30,000
Fee Details
Traveling from:
Colorado

Why Book

  • John leverages his story of transforming risk into reward to evoke the skills of instinct, inquiry, and initiative that empower his clients to take control of their data exposure.
  • He advises clients on balancing risk, defending privacy and multiplying profits by building a culture of deep trust.

Biography

John speaks from experience – his identity was stolen and used to electronically embezzle $300,000 from his business clients. While the cybercriminal masked their crimes using John’s identity, Sileo and his business were held legally and financially responsible for the felonies committed. The breach destroyed John’s company and consumed two years of his life as he fought to stay out of jail. Refusing to give in, John ultimately turned his experiences into his greatest success as a renowned cyber security expert. From real-life experiences with cybercrime came the first of several books, a great love of sharing what he’s learned, and a profound mission to help others defend data and tap into the resilience that defines who they are.

Weaving his remarkable story with cutting-edge research, disarming humor and constant interaction, John inspires audiences worldwide to take ownership of the data that drives their success. In the words of one of John’s banking customers, “John took a sour batch lemons, squeezed out life lessons, sweetened them with laughter, and shared the lemonade with all of us!” Now he is one of the most recognized and respected thought leaders on cyber security, identity theft and entrepreneurial resilience. John focuses on ways to make security fun and engaging, so that it sticks.

Read More

Programs

Cyber Threat Evolution: Hacking the Hacker’s Mindset

The cybercrime landscape has shifted radically. Rapid growth in remote workforces, cloud jacking, smart devices, cyber blackmail and disinformation have altered the way we must defend our data, privacy and profits. Increasingly, cybercriminals leverage crisis and news headlines to fuel and fund social engineering scams, financial fraud and geo-political influence. Hackers don’t just adapt to change; they bank on it. Has your mindset evolved?

Never lose hope or give in to fear, because effective solutions exist when you take ownership. But the answers don’t just reside in technology – they reside in people and innovation – with the executives and employees who become either your weakest link or your most flexible line of data defense. In this presentation, John Sileo will leverage lessons learned from losing his entire business to cybercrime while simultaneously facing jailtime. He will show you how to deploy a threat narrative to empower your culture of security, and how crisis and failure are untapped weapons in your anti-fraud toolkit.

Key Deliverables – After this virtual presentation, attendees will:

  • Understand how cybersecurity has shifted due to recent events
  • Identify the 3-5 greatest risks growing out of our new reality
  • Take concrete steps to minimize these vulnerabilities
The Hacker’s Blacklist: Critical Cybersecurity Threats & Solutions

To avoid becoming the next disastrous data-breach headline, you must foster a healthy culture of security that addresses both the technological and human elements of data defense. Change happens when you create energy and buy-in among the people who handle your mission-critical information. When it comes to the latest data security threats, you can’t possibly do everything—but you must do the right things. This cyber security training crash course forges a high-level, non-technical path through the often- confusing web of human decision making, cyber defense, mobile technology, IoT, social media and cloud computing—critical components of your success. This highly-interactive presentation builds on John’s experience losing everything to cybercrime, continues with a live hacking demo of an audience member’s smartphone and ends with an actionable Roadmap of Next Steps.

C-Level Cybersecurity: Building a Bulletproof Culture of Security

Security awareness starts at the top. Cybercriminals lust for your corporate data. Competitors bribe your disgruntled employee for a thumb drive full of confidential files. Social engineers exploit your executives’ social media profiles – a veritable “how to” guide for network security access. Hackers “sniff” unprotected IP addresses and cloud traffic you didn’t even know existed. Cyber extortionists encrypt your mission-critical data and demand a ransom. In the meantime, you end up the next disastrous headline – reputation damaged, customers fleeing. Cybercrime and corporate data breach are a huge financial cost and legal liability to organizations. This does not have to be your fate. As a leader, you must learn to cope with a wide range of cyber threats with little to no technical background, limited resources and almost no lead time. The answer lies in your preparation and strength of culture. This presentation aims at leaders looking to imbue their culture with security strategies from the boardroom to the break room. John leverages his work with clients like the Pentagon and Schwab to help you develop a prioritized punch list of critical action items.

Think Like a Spy: Personal Identity Theft Protection

Identity theft training is no longer optional. Every move you make in the digital world can be tracked, hacked, recorded and exploited. Threat sources like smartphones, the Internet of Things (IoT), wearable technology, cloud computing and social mediahave shifted the competitive landscape in favor of cyber-savvy users with strong identity theft training. Due to the power of personally identifying information (PII) and the rapid rate at which information is being compromised, we must leverage the very latest prevention tools to protect everything from our Social Security numbers to bank accounts, from passwords to confidential emails. John delivers these identity theft countermeasures in a highly interactive, disarmingly humorous presentation inspired by his personal loss of more than $300,000, his business and two years of his life to data theft. In Think Like a Spy, John focuses specifically on identity theft prevention tools that apply to every individual in your audience.

The Art of Human Hacking: Social Engineering Self Defense

Anti-fraud and social engineering training only work when your people experience it in person. Human beings can be the weakest link or the strongest competitive advantage in the security and profitability of your information assets. But people are the most commonly underutilized, least expensive weapon in your fight against cybercrime. Social Engineering Training too often fails because of Death by PowerPoint. Fraud training needs to be engaging and interactive to be effective. To put it simply, this session makes security fun, so that it sticks. In this continually-interactive session, John goes deep into social engineering tools and tricks used to separate you from your critical data. By building System-1, Reflex-Based Awareness around how tools like social media, trust shortcuts, ego stroking, greed appeals, and cortisol flushing enable social engineers, John will dramatically reduce the human element of your threat footprint. By the time John finishes his entertaining closing story, your audience will be fully empowered to detect and deter social engineering, fraud and deception.

UN-HACKABLE: 5 Power Mindsets for Defending Your Data

Hackers don’t just adapt to change; they bank on it. Has your mindset evolved? The rapid expansion of remote workforces, cloud jacking, the Internet of Things, ransomware gangs, supply chain attacks, social engineering and disinformation campaigns have altered the way we must defend our organizational data, privacy and profits. A faulty adage asserts that humans are your weakest link, and left unaddressed, that becomes a self-fulfilling prophecy. Cybersecurity doesn’t grow from shinier tools, but from the powerful intersection between humans and technology. In UN-HACKABLE, John will leverage potent lessons learned from losing his business and wealth to cybercrime, wrongly facing jailtime and ultimately, how to turn all three to your advantage.

John Sileo Reviews

“Your keynote presentation Think Like a Spy: Identity Theft Prevention was particularly well-received and a key reason why the vast majority of attendees expressed that this year’s conference was the best and most informative to date. Your personal experiences with identity theft and humorous approach to this serious subject gave attendees a keen insight as to how to prevent identity theft for Service members and families.”

— Department of Defense

“Your presentation was outstanding! We continue to receive numerous positive comments about your presentation, which our audience found highly inspiring, informative, and fun. As a result of your presentation, we’ve seen important progress in employees’ awareness toward our agency’s goal of protecting sensitive personal information from harms, such as identity theft, through increased employee awareness. Your memorable tips for safeguarding data at home will certainly lead to safer data at FDIC.”

— FDIC

“Awesome presentation! Perfect for closing the conference”

— Blue Cross/Blue Shield

“If we could quantify the impact of John’s cyber security presentation on our attendees, it would likely be in the millions.”

— Young Presidents Organization

“Sileo’s security awareness training stopped $300,000 in fraud just days after his presentation.”

— Disney/Partners FCU

“A memorable bridge between personal and professional data security”

— Seattle Study Club

NEED MORE IDEAS?

We are here to help.
Speak with our experienced Program Consultants.

Call us or Live Chat Below

NEED MORE IDEAS?

We are here to help.
Speak with our experienced Program Consultants.

Call us or Live Chat Below

NEED MORE IDEAS?

We are here to help.
Speak with our experienced Program Consultants.

Call us or Live Chat Below

NEED MORE IDEAS?

We are here to help.
Speak with our experienced Program Consultants.

Call us or Live Chat Below

NEED MORE IDEAS?

We are here to help.
Speak with our experienced Program Consultants.

Call us or Live Chat Below

By continuing to browse, you consent to our use of cookies. To know more, please view our Privacy Policy. Hide