skip to Main Content

John Sileo

John Sileo

Specializing In The Human Element of Cyber Security

Topic Categories:

Fee Range: 20000-39999
  • Security expert
  • Author

John Sileo left hi-tech consulting for two reasons: to start a family and to launch a software startup in the earliest stages of cloud computing. Six successful years, a multimillion-dollar business and two precious daughters later, he lost the business and his wealth to cybercrime.

Because the cybercriminal, a company insider, masked the crimes using John’s identity, John was held legally and financially responsible for the felonies committed. The losses destroyed his company, decimated his finances and consumed two years of his personal life as he fought to stay out of jail.

John Sileo has shared his story and hard-earned lessons as an award-winning author, 60 Minutes guest and keynote speaker to the Pentagon, Schwab and thousands of audiences ready to defend their data. John specializes in the human element of cyber security and uses humor, audience interaction and cutting-edge research to keep his message relevant and entertaining.

John is CEO & President of The Sileo Group, a Denver-based technology think tank. He graduated with honors from Harvard University and was recently inducted into the National Speakers Hall of Fame.

When not speaking, John spends time hiking with his family in the Rocky Mountains, reading psychological thrillers and earning his 3rd-degree black belt in Taekwondo, where he is regularly thrashed by teenagers half his size.

YOUR DATA IS SHOWING – PROTECTING YOUR PRIVACY IN THE SURVEILLANCE ECONOMY

Smart speakers and digital assistants like Alexa, Google and Siri eavesdrop on the conversations you have at home and work, sharing your preferences and behaviors with their “partners”. Super cookies collect your browsing history even when you have cookies turned off, selling your privacy to the highest bidder. Mobile phone providers track and trade your location while social media sites like Facebook and Instagram build psychographic dossiers that classify you according to your attitudes, aspirations and psychological profile. And you sit there, unaware, both a fan and victim of the two faces of technology: convenience and surveillance. Your Data is Showing focuses on taking back your privacy with skills that apply across the ever-changing tactics of clever marketers, digital advertisers and cyber criminals.

CYBER SECURITY 2020 – THREATS, TRENDS & TACTICS

The cyber-threat landscape is shifting in new and critical directions. While financial gain still drives cybercrime, the accumulation and exercise of raw power is the latest holy grail. Criminals are strategically leveraging potent tools, from hacking the news cycle (fake news) to manipulating outcomes (election fraud), from weaponizing the Internet of Things (cyber warfare) to exploiting information for the purpose of extortion (cyber blackmail). The common mistake is to think that these trends won’t affect an organization like yours or people like you. And that is where the danger lies. Cyber Security 2020 is full of solutions to help you plan and prepare for the latest wave of threats before they land on your shores, saving you time, money and reputational damage.

THE ART OF HUMAN HACKING: SOCIAL ENGINEERING SELF DEFENSE

Human beings are always the weakest link in the security, privacy and profitability of your information assets.

And they are the most overlooked, least expensive weapon in the fight against fraud, data breach and profit erosion. But you can’t train people to detect and deter deception with a dry Power Point presentation. Your audience needs to experience the feelings of fraud first hand; they need to understand the brain science behind manipulation.

In this highly interactive session, John takes a deep dive into the tools and tricks used by social engineers. By building reflex-based awareness around how tools like Facebook, trust shortcuts, ego stroking, greed appeals, and cortisol flushing enable social engineers, John will dramatically reduce the threat profile of your executives, employees and even your customers. Instead of your weakest link, those same humans will become your first line of defense.

THE HACKER'S BLACKLIST: CRITICAL CYBERSECURITY THREATS & SOLUTIONS

To avoid becoming the next disastrous data-breach headline, you must foster a healthy culture of security that addresses both the technological and human elements of data defense. Change happens when you create energy and buy-in among the people who handle your mission-critical information. When it comes to the latest data security threats, you can’t possibly do everything-but you must do the right things. This cyber security training crash course forges a high-level, non-technical path through the often- confusing web of human decision making, cyber defense, mobile technology, IoT, social media and cloud computing-critical components of your success. This highly-interactive presentation builds on John’s experience losing everything to cybercrime, continues with a live hacking demo of an audience member’s smartphone and ends with an actionable Roadmap of Next Steps.

THINK LIKE A SPY: PERSONAL IDENTITY THEFT PROTECTION

Identity theft training is no longer optional. Every move you make in the digital world can be tracked, hacked, recorded and exploited. Threat sources like smartphones, the Internet of Things (IoT), wearable technology, cloud computing and social media have shifted the competitive landscape in favor of cyber-savvy users with strong identity theft training. Due to the power of personally identifying information (PII) and the rapid rate at which information is being compromised, we must leverage the very latest prevention tools to protect everything from our Social Security numbers to bank accounts, from passwords to confidential emails. John delivers these identity theft countermeasures in a highly interactive, disarmingly humorous presentation inspired by his personal loss of more than $300,000, his business and two years of his life to data theft. In Think Like a Spy, John focuses specifically on identity theft prevention tools that apply to every individual in your audience.

C-LEVEL CYBERSECURITY: BUILDING A BULLETPROOF CULTURE OF SECURITY

Security awareness starts at the top. Cybercriminals lust for your corporate data. Competitors bribe your disgruntled employee for a thumb drive full of confidential files. Social engineers exploit your executives’ social media profiles – a veritable “how to” guide for network security access. Hackers “sniff” unprotected IP addresses and cloud traffic you didn’t even know existed. Cyber extortionists encrypt your mission-critical data and demand a ransom. In the meantime, you end up the next disastrous headline – reputation damaged, customers fleeing. Cybercrime and corporate data breach are a huge financial cost and legal liability to organizations. This does not have to be your fate. As a leader, you must learn to cope with a wide range of cyber threats with little to no technical background, limited resources and almost no lead time. The answer lies in your preparation and strength of culture. This presentation aims at leaders looking to imbue their culture with security strategies from the boardroom to the break room. John leverages his work with clients like the Pentagon and Schwab to help you develop a prioritized punch list of critical action items.

Additional options
  • Interactive Breakout Sessions
  • Sileo on Security Video Series
  • Customized Roundtable
  • Extended Q&A
  • Provide Meaningful Takeaways
Details about the John's most popular presentation packages

Keynote Package which includes:

  • 45-60 Minute Main-Stage Presentation
  • In person Q&A During Book Signing (books additional)

Hack the Audience Package which includes:

  • 60-75 Minute Main-Stage Presentation w/ Customization
  • Hack the Audience Segment (funny clips of John live-hacking the audience)
  • 15 Minute Toss-Across Q&A (built-in Q&A session with throwable Mic to raise energy and fun)
  • 50 Copies of John’s latest book + Book Signing

The Whole Cyber Enchilada which includes:

  • 60-75 Minute Main-Stage Presentation w/ Advanced Customization
  • Additional 45-Minute Deep Dive/Breakout (“Next Steps” Action Plan for Implementation)
  • 100 Copies of John’s latest book + Book Signing (Additional books provided at steep discount)
  • Enhanced Hack the Audience Segment (incorporating social media reconnaissance)
  • 15 Minute Toss-Across Q&A
  • Choose One of the Following:
    • VIP Meet & Greet (Meal or Reception within Travel Timeframe)
    • 6 Continuing Education Videos (SileoOnSecurity) keep attendees learning after the event
    • Video and Usage Rights for 1-Year (Record the Event for Use on Member’s Only Site)
    • Rights to Stream or Webcast Presentation (To Reach Multiple Locations)
Virtual presentation available

Includes:

• Up to 90 Minute virtual presentation

• Virtual Q&A

• A PDF of John’s latest work in cybersecurity and privacy

Please contact us to see testimonials.
Related Speakers

Want to bring John Sileo to your next event?  Please tell us a little about your event, and we will get back to you shortly!

  • *Required
  • This field is for validation purposes and should be left unchanged.

Back To Top