Cyber Security Keynote Speaker National TV Montage
The average security keynote speaker is technical in nature (Zzz), which sometimes means they can be dry and boring. Death by PowerPoint! This is not good for your event. In fact, it can be disastrous for a meeting planner’s career or an organization’s entire conference. You want a keynote speaker who will interact with your audience, make them laugh, help them to understand where the worlds of human behavior, technology and the Internet converge, so that they walk out of the presentation with greater insight into securing the information that defines them.
Ideally, the perfect cybersecurity keynote speaker for your event will blend content, laughter, entertainment and cutting-edge data with the specific outcome necessary to change your audience’s behavior. That won’t just make you the hero, it will make the event a home run for the attendees, which is what it’s all about anyway. Take a quick look of this video to see what an engaging security keynote looks like (on stage).
Every dollar counts, now more than ever, as the government searches for ways to wisely spend our money. It’s dismaying to learn that an audit report from the Treasury Inspector General for Tax Administration (TIGTA) has found that the impact of identity theft on tax administration is significantly greater than the amount the IRS detects and prevents. Even worse, the “IRS uses little of the data from identity theft cases…to detect and prevent future tax refund fraud” according to Mike Godfrey, Tax-News.
The IRS is detecting far fewer fake tax returns than are actually falsely filed. 938,700 were detected in 2011. On the other hand, TIGTA identified 1.5M additional undetected tax returns in 2011 with potentially fraudulent tax refunds totaling in excess of $5.2B.
The study predicted that the IRS stands to lose $21B in revenue over the next 5 years with new fraud controls, or $26B without the new controls.
America’s top Privacy & Identity Theft Speaker John Sileo has appeared on 60 Minutes, Anderson Cooper, Fox & in front of audiences including the Department of Defense, Pfizer, Homeland Security and hundreds of corporations and associations of all sizes. His high-content, humorous, audience-interactive style delivers all of the expertise with lots of entertainment. Come ready to laugh and learn about this mission-critical, bottom-line enhancing topic.
John Sileo is an award-winning author and keynote speaker on the dark art of deception (identity theft, fraud training, data privacy, social media manipulation) and its polar opposite, the powerful use of trust, to achieve success. He is CEO of The Sileo Group, which advises teams on how to multiply performance by building a culture of deep trust.
A study produced by The Ponemon Institute and ThreatMetrix (Mobile Payments & Online Shopping – October 2011) states that only 29% of consumers use mobile banking apps on their smart phones and tablets. Of those that don’t participate, 51% cite security reasons for their lack of participation. In other words, consumers like you and I are not yet comfortable with mobile banking apps safety. And our instincts are correct! Why shouldn’t you be comfortable with mobile banking apps quite yet?
Top 7 Reasons Why Mobile Banking Apps Aren’t Safe (Yet)
Because most app stores (e.g., Android Marketplace) don’t review apps for security, it is very easy for criminals to post malicious apps that steal information from your mobile device (like your bank account numbers).
The average smartphone or tablet user has installed no security software on their mini-computer (that’s what smartphones and tablets are), meaning that they have only a fraction of the security of a laptop or desktop.
The typical US consumer still swipes their card, credit or debit, with those same old black magnetic stripes. And, we hold our breath and hope they work, and don’t lead to erroneous (fraudulent) charges we have to defend. The rest of the world has switched to Smart cards, according to Peter Svensson, The Associated Press, in The Denver Post. “The problem with that black magnetic stripe on the back of your card is that it’s about as secure as writing your account information on a post-card”.
Svensson comments “Smart-cards (chip-based cards) can’t be copied, which greatly reduces the potential for fraud. Smart cards with built-in chips are the equivalent of a safe: They can hide information so it can be unlocked only with the right key”.
AURORA – Five of Aurora’s most powerful politicians found out how vulnerable they truly are. They’ve joined a long list of people who have fallen victim to identity theft.
The city councilors thought they were alone, until they heard from their colleagues at a council meeting.
“It was kind of a relief when I found it was a council thing and not me personally,” said Councilor Molly Markert.
Markert and four other councilors received bills for items they never even purchased, including electronic devices.
If there was ever an expert on identity theft, John Sileo would certainly be high on the list.
He’s written a few books on the issue and even does work for the Department of Defense and Homeland Security.
Sileo says the thief or thieves likely cracked the councilors’ codes by one of two ways.
Why You Should Share Facebook Privacy Settings with Friends
A true friend does more than just post updates about their conquests on your wall. They share information with you that makes your life better, even if it isn’t exactly what you want to hear. And you do the same for them. But are your friends unwittingly sharing too much information about you with others (strangers, advertisers, app developers, scammers)? Probably. For example, if they (or you) haven’t customized your privacy settings lately, you are giving Facebook permission to:
Publish your name, photo, birth date, hometown and friend list to everyone?
Indirectly share your restricted data with outsiders through your friends?
Let your friends check you in to embarrassing locations where you aren’t?
Post your Likes as advertisements on friends’ walls using your name?
Authorize Google to index, access and share your information on the web?
In the first part of this article series, we discussed why it is so important to protect your business data, including the first two steps in the protection process. Once you have resolved the underlying human issues behind data theft, the remaining five steps will help you begin protecting the technological weaknesses common to many businesses.
Get monthly strategies and tips for protecting yourself and your business delivered right to your Inbox. Signup now and you'll immediately receive John's 7 Survival Strategies for Starving Data Spies!