skip to Main Content

Tyler Cohen Wood

Topic Categories:

Fee Range: Contact Speaker Exchange Agency

Nationally recognized cyber security, intelligence, national security expert and former Director of cyber risk management for AT&T.

*Fee ranges are presented as a guideline only. Speaker fees are subject to change without notice. For an exact quote, please contact your Speaker Exchange Agency representative.

Tyler is a cyber-authority with 20 years of highly technical experience, 13 of which were spent working for the Department of Defense (DoD). Tyler sits on several cyber advisory boards. In January 2019 she was included in the Cybersecurity Ventures list of “Top 25 Cybersecurity Experts to Follow on Social Media In 2019”.

Before becoming a private consultant, Tyler worked in the private sector as an Executive Director for CyberVista and as a Director of the Cyber Risk Management group at AT&T using thought leadership and her cybersecurity expertise to develop new and inventive solutions to protect customers from hackers and the ever-increasing cyber threat landscape.

Prior to that, Tyler worked at the U.S. Defense Intelligence Agency (DIA) under the DoD, serving as a Senior Intelligence Officer, Deputy Cyber Division Chief of the Special Communications Division and the DIA Science and Technologies Directorate-selected Cyber Subject Matter Expert (SME). While there, she developed highly technical cyber solutions, and made recommendations and decisions significantly interpreting, developing and changing critical cyber policies and directives affecting current and future DoD and intelligence community programs. She has helped the White House, DoD, federal law enforcement, and the intelligence community thwart many threats to United States security.

Her latest book, Catching the Catfishers: Disarm the Online Pretenders, Predators, and Perpetrators Who Are Out to Ruin Your Life, teaches how to safely and successfully navigate the online world, protect yourself, your children, your business and your privacy.

Tyler’s expertise has made her a highly sought-after guest and writer for both national and local television, radio, print and online media. She has been featured on Good Morning America, FOX and Friends, CBS Evening News, ABC World News Tonight, Bloomberg, CNN, FOX, CBS, ABC, NBC, WGN, among others, and in The Wall Street Journal, Washington Post and Huffington Post.

The Intersection of Cybersecurity, Emerging Tech, and AI: Unmasking Deepfakes and Social Engineering

Tyler will spotlight the rise of hyper-realistic deepfakes and the evolution of social engineering tactics, showcasing the potential risks and providing practical tips on detection and defense. Learn how AI is enhancing social engineering attacks and discover ethical considerations and proactive strategies to safeguard our digital future.

Tech for Executives: Mastering Cybersecurity, Emerging Tech, and AI

Tyler Cohen Wood, co-founder and CEO of Dark Cryptonite, brings her unparalleled expertise to help executives master the evolving landscapes of cybersecurity and AI. Gain in-depth analyses, cutting-edge trends, and practical strategies to fortify your organization’s cybersecurity posture and seamlessly integrate AI into your business strategy. With Tyler’s expert guidance, transform tech challenges into strategic advantages and lead your organization with confidence.

Redefining Cyber Security by Employing a New Paradigm

The media is awash with seemingly daily reports of more and more serious cyber-attacks. We are losing the battle with cybersecurity and will continue to in the future unless we make critical and fundamental shifts to our paradigm. Cybersecurity leaders agree that the field has become one in which we find ourselves in a constant reactive loop, where we’re putting out fires without truly identifying underlying problems. Without addressing the problems, how can we even begin to address the solutions?
This presentation will closely align the disconnects and critical failures facing cybersecurity with another industry that has achieved pockets of excellence that go a long way to mitigating failure. Through Wood’s extensive background in multiple aspects of cybersecurity and her experience navigating another equally complex field, she will use her expertise and unique storytelling approach to share how to truly understand cyber challenges in order to fully address the bigger picture with concrete solutions. Through analogies and case studies, Wood will detail the major cyber problems businesses face today and demonstrate how, by employing a new model and paradigm, we can begin to solve the cybersecurity and workforce problems today and those on the threat horizon of tomorrow.

Corporate Cyberwarfare: Real Solutions to Protect your Business and Assets

With cyberattacks already at a critical level, it’s important to understand specific active threats, who’s carrying them out, what is being done and what else can be done about it. Cyber threats have cyber war is being waged today, we can take tactical preventative measures to stave off a lurking disaster that could potentially put a company out of business.

In today’s quickly evolving connected world where business is more frequently done on the go using mobile, IoT and many other smart devices, cyber threats are more of a risk to corporations than ever. What are the threats to businesses and just how realistic are they? Can they really happen? How can we ensure we are armed with the knowledge to protect corporate assets and critical business infrastructure from increasingly aggressive threat actors? Many businesses know that the threats are out there but aren’t sure what to do about it or even how to begin to tackle the problem at hand.

This presentation will focus on the real cyber-attacks being enacted today against businesses of all sizes, and what can be done about them. We’ll cover the current threat landscape and the ever-looming threat horizon of corporate cyber risk. We’ll also explore how the unique challenges of remote work using connected devices, implants, and A.I. affect business cybersecurity. At the end of the presentation the audience will have a close understanding of the main threat actors, the threats themselves and how to protect businesses against them.

What attendees will learn from this presentation:

  • The types of cyber-attacks being carried out against corporations and business infrastructure
  • Concrete counter-measures that can be enacted to protect business assets from cyber threats
  • How to be prepared for a worst-case scenario
The New and Improved Big Data Analytics: Good Enough to Solve a Murder?

There’s been a murder! After detailed forensic data collection, law enforcement officials begin to piece together the facts. They parse through physical data, social media, digitally collected data from witnesses and suspects and other open source intelligence (OSINT) to attempt to piece together the “who done it and why” in order to solve what seems to be an unsolvable case.

We know that social media, digital devices, and apps we rely on collect information on us. But do we know exactly what that means or just how comprehensive and intimate that data is? Most terms of service will tell you exactly what is collected and that apps have the right to distribute collected content to third parties, usually to make your service better. What isn’t said is how the data is put together, the impact that it can have at the personal, company and national security levels and what form future collection techniques might take. This presentation will show just how vast the scope of information collection is now and how it will be in the future. We’ll also demonstrate how, when pieced together in the right order, data can even solve a seemingly unsolvable crime.

The Future of Healthcare: Connected and Intelligent

There are two types of people in this world—those who are happy with the healthcare system and anyone who has ever needed to use the healthcare system. For many, the current model of healthcare is frustrating and, at its worst, negligent. People with chronic illnesses or rare diseases are hit especially hard by the gaps in our system.

Cohen Wood spent her entire career in cybersecurity working with data and understanding the significance of the cyber world in our reality. She used her tech background to develop her idea for a better healthcare system into MyConnectedHealth, an A.I.-driven view of medicine.

Cohen Wood is proof of the concept herself. By using the concept behind MyConnectedHealth Cohen Wood was able to diagnose herself (confirmed by physicians) with her rare disease—so rare only 300,000 people in the United States have it. Just the mere concept of MyConnectedHealth surpassed the medical system that had failed her for years in a matter of minutes.

This presentation will not only share with you the latest technology and trends happening in healthcare; but inspire your team to think “outside of the box” in order to improve patient outcomes by fast tracking patient diagnosis and treatment plans, eliminating duplicate tests, and offering cost-saving efficiencies.

Protecting Your Property: Shielding Your Company’s Assets and Image

In today’s fast-paced business and Internet of Things connected world, working away from the office using mobile and other connected devices for telecommuting and productivity has become mainstream. But how do we know what confidential data, tradecraft or intellectual property this technology might be unknowingly giving away to corporate spies, hackers or data marketers? This presentation will teach you and your employees how to safely and securely protect company confidential information while using mobile devices both inside and outside the workplace, and also how to protect corporate intellectual property and trade secrets that may be at risk through social media and mobile device use. This presentation will also teach how to protect your corporate image and assets

Using the Internet to Hire Right: An Ounce of Prevention – A Ton of Trust

These days it takes more than a meet-and-greet to be sure a potential hire is who they say they are and can do what they claim to do. In-person interviews often don’t give you the whole picture, and certainly, don’t reveal potential threats. However, there’s no hiding from an online profile which has been accumulating ever since that person first logged on to the internet. This presentation will teach HR professionals, recruiters, managers, and executives how to use social media and the internet to help rethink, or reaffirm, their confidence in potential candidates and current employees.

Take Control: Protecting Your Privacy & Managing Your Online Image

In this presentation, you will learn how to shield your personal information and safely and successfully navigate the online world, protect yourself, your children, your company, your privacy, and your communications, and learn to vet if someone is who they claim to be online. You will also learn how to read deception and lies in other people’s online identities and posted content, such as social media, emails, reviews and dating profiles. While learning the skills for personal protection, you will also learn how to apply these same techniques to your professional life, clean up and leverage your online image for social and career success, and develop beneficial relationships online. Whether you’re a seasoned professional, a recent graduate entering the workforce or a working parent concerned about your children’s safety, this presentation will provide valuable information and tips to ensure security and success online.

HACKERNOMICS: Using The Best Practices of Cyber-Criminals to Beat Your Competition

Why are hackers more creative than you? How do they see threats as opportunities? How do they use new technologies as tools to create new sources of revenue? Why are your apathetic and dispassionate workers and customers the best targets to expand their markets. Why is talent and knowledge at a premium for them? Learn this and many more eye-opening insights from one of the leading experts on cyber-crime.

Please contact us to see testimonials.
Related Speakers

Want to bring Tyler Cohen Wood to your next event?  Please tell us a little about your event, and we will get back to you shortly!

  • *Required
  • This field is for validation purposes and should be left unchanged.

Back To Top