<p>John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority - being present for his family. Six successful years, a thriving $2M business and two precious daughters later, he lost it all to cybercrime.</p><p>Because the cybercriminal masked the crimes using John’s identity, Sileo was held responsible for the felonies committed. The losses destroyed his company, decimated his finances and consumed two years as he fought to stay out of jail. And from these bitter circumstances, John made lemonade.</p><p>John Sileo is an award-winning author and highly sought-after cyber expert from 60 Minutes to the Pentagon, USA Today to Rachel Ray. His satisfied clients include a Who’s Who of the Fortune 1000, Government, Associations and Small Business. The CEO of a Denver-based cyber think tank, an honors graduate from Harvard University and an inductee into the National Speakers Hall of Fame, John still values his remarkable wife and highly spirited daughters over all other successes.</p><p><br></p>

Category
First Name
John
Last Name
Sileo
Twitter
john_sileo
Siebel ID
1-A4P72
Trending Topic
Moniker

Trusted Corporate Cybersecurity Strategist & Advisor

Speech Topics

<ul><li><strong>Savvy Cybersecurity in a World of Weaponized A.I.</strong></li><li>Artificial Intelligence makes hacking your organization easier. Generative A.I. models evolved from ChatGPT give novice cybercriminals free tools to code malware, create adaptive ransomware, and author sophisticated phishing emails around the clock. Deepfake videos imitate people in power to manipulate your performance, profits, and reputation while disinformation campaigns blur the lines of trust. And quantum computing is about to render current defenses nearly useless. Are you prepared? While technology is also part of the solution, it is not the primary answer to the quiz. In this keynote, cyber expert John Sileo leverages his experience of losing everything to cybercrime to bridge the security gap between human beings, technology and rapidly emerging threats.</li><li><strong>Blockbuster Cybersecurity in a Zero-Trust World</strong></li><li>Hackers don’t just adapt to change, they bank on it. Has your mindset evolved? The rapid expansion of remote workforces, ransomware gangs, cloud jacking, IoT hacking, supply chain attacks, social engineering and disinformation campaigns have altered the way we must defend our data, reputation and profits. A faulty adage asserts that humans are your weakest link when they can in reality be your greatest defensive asset. Cybersecurity doesn’t grow from shinier tools, but from the powerful intersection between human beings and technology. In this keynote presentation, John will leverage potent lessons learned from losing everything to cybercrime to help you build a Blockbuster Framework for analyzing, organizing, and communicating a powerful cyber defense strategy.</li><li><strong>The Art of Human Hacking: Social Engineering Self Defense</strong></li><li>Anti-fraud and social engineering training only work when your people experience it for themselves. Humans can be the weakest link or the strongest competitive advantage in the security and profitability of your information. But people are the most underutilized weapon in your fight against cybercrime. Don’t surrender to Death by PowerPoint—training needs to be engaging to be effective. This presentation makes security interactive, so that it sticks. John will use his own losses to social engineering to illustrate the tools and tricks used to separate you from your critical data, including System 1 and 2 reflexes, social media harvesting, trust shortcuts, ego stroking, greed appeals, and cortisol flushing. By the time he gets to his closing story, your audience will be fully empowered to detect and deter social engineering and fraud.</li><li><strong>Building a Bulletproof Culture of Security</strong></li><li>To avoid becoming the next disastrous data breach headline, you must foster a healthy culture of security that addresses both the technological and human elements of data defense. Change happens when you create energy and buy-in among the people who handle your mission-critical information. When it comes to the latest data security threats, you can’t possibly do everything—but you must do the <em>right</em> things. This cyber security training crash course forges a high-level, non-technical path through the often-confusing web cybersecurity. This highly interactive presentation builds on John’s experience losing everything to cybercrime, continues with a live hacking demo of an audience member and ends with an actionable Roadmap of Next Steps.</li></ul><p><br></p>

Hide Fee
On
Exclusive
Off
Environment
Headline (Deprecated)
<p><b>Trusted Corporate Cybersecurity Strategist & Advisor</b></p>
Image Alt Tag
John Sileo, Business Speaker, Keppler Speakers Bureau
Marketing Toolkit
Sileo J-Bio.doc
Sileo J-Bookcover-(Privacy Means Profit).jpg
Sileo J-Bookcover-(Your Data Is Showing).jpg
Sileo J-Intro (Virtual).docx
Sileo J-Introduction.doc
Sileo J-Photo (HEADSHOT).jpg
Sileo J-Photo (High Res HEADSHOT 02_22).jpg
Sileo J-Photo (flexing).jpg
Sileo J-Topics.docx
Ignore Keppler Lit?
No