Posts tagged "Speech"

Motivational Keynote Speech

After a financial conference speech I gave this afternoon on controlling social media data exposure, an executive asked me how long I’d been giving motivational keynote speeches.

My jaw dropped at the reference… “Motivational keynote speeches?”, I asked. “I’ve never really thought of myself as a motivational speaker. I’m more of a content speaker who focuses your organization on playing information offense… using and protecting information to your profitable advantage.” Yeah, I know, sounds like an elevator speech. It was.

The executive then explained his remarks in a very thoughtful way. He said that his organization had stopped hiring traditional “fluffy motivational speakers” when the economy went south, and now only hires content-rich speakers who motivate the audience to take action in a very specific area of need. If he and the rest of the audience came out of the speech ready to take action and clear on what steps to take next, then they referred the speech as motivational. “Every speaker we hire had better be motivational,” he said, “but that’s a given. We bring in a keynoter for their content, and they’d better bring their inspirational A-game as part of the package.”

Posted in Cyber Data Security, Digital Reputation & Trust, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , ,

Identity Theft Training

John Sileo knows identity theft and data breach first hand – he became “America’s Leading Identity Theft Speaker and Expert” after losing his business and more than $300,000 to these costly crimes. He has provided these Identity Theft Resources to help you protect your organization from suffering from the losses that result from unprotected private information. Visit John’s Identity Theft Prevention Store to learn more.

Hire John to train your employees to prevent identity theft, data breach and corporate espionage

Safe data is profitable data, whether it’s a client’s credit card number, a patient’s medical file, an employee’s benefit plan or sensitive intellectual capital. By the time John finishes his hilarious closing story, your audience will be fully empowered to protect private information, at home and at work.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , ,