Program Categories
Program Categories

Speaker Programs in Security

Forensic Archaeological Recovery Operation at the WTC Site
Lessons Learned from Two Distinct Recovery Operations
  

You will learn fascinating details regarding the World Trade Center Human Remains Recovery Operation conducted by the NYC Medical Examiner’s Office from 2006 to 2014, and what the archaeological data revealed about which methods and strategies used during the original recovery operation of 2001/2 worked and which did not.

PRESENTED BY

Travels From: New York City, NY
Fee Range: Varies

More Information
We talk Cyber Security But: What about Protecting your company's data, by psychologically evaluating potential Espionage and Spy activity?
Corporate Security; The Psychological Factors of Espionage and Spying
  

The audience will be engaged when we will focus on the psychological motivations, to identify the emotional precursors, which lead to CORPORATE ESPIONAGE and SPYING. In today’s world of CYBER-RISK and CYBER-SECURITY, we sometimes forget about the individuals, or dare I say SUSPECTS behind the BREACH, ATTACH or THEFT. We neglect these individuals until it is too late, and the damage has been d...

PRESENTED BY

Travels From: Fort Wayne, IN
Fee Range: Available Upon Request

More Information
Protect Your Office from Hackers and Rogue Employees
Fun, practical information
  

Bill will explain technology risks and how to manage them without overdoing it on paranoia and security measures. Bill will cover major tech risks, how to look out for them, and what to do to minimize the downside when you do experience a negative event. You’ll hear stories from other organizations and observe how a business can be held ransom. Benefits: • Learn the key ways your business ...

PRESENTED BY

Travels From: Lexington, KY
Fee Range: $2,500 - $5,000

More Information
Rethinking Cyber Security
Risk and Intelligence in the Cyber Domain
  

We have been trying to create secure computer systems for thirty plus years without success. This suggests that perhaps we are doing it wrong. This presentation looks at cyber operations and risk from cybercrime, cyber espionage, and cyber warfare through the lens of cyber intelligence. It addresses what lessons can be learned from cyber space as a domain of war and the implications of chaos, c...

PRESENTED BY

Travels From: Seattle, WA
Fee Range: Varies

More Information
Threat Identification
For individuals and teams
  

I discuss threat identification for individuals and teams that may be targeted by organized crime and foreign intelligence agencies.

PRESENTED BY

Travels From: Anchorage, AK
Fee Range: Varies

More Information