The Five Laws of Cyber Security
Based off Nick Espinosa’s TEDx Talk and Forbes article of the same name, this presentation will dive into issues that non-technical users face and how we, as the technical community, can help create an easy framework of understanding for those we help in order to ensure ...
Based off Nick Espinosa’s TEDx Talk and Forbes article of the same name, this presentation will dive into issues that non-technical users face and how we, as the technical community, can help create an easy framework of understanding for those we help in order to ensure their security. The Five Laws of Cybersecurity are designed to make everyone think and challenge that technology they use every day!
WHAT YOU WILL TAKE AWAY FROM THIS SESSION
- Just how prolific hacking and data exposure is
- Why we need to reframe our thinking and approach to technology
- Real life examples of serious flaws in products we know and love
- Five easy to remember laws that will make you safer in whatever you do
Learn More
Hacking the Hackers: Corporate Security Done Right
A deep dive into the threats that corporations and governments face such as Dark Web exposure, types of hacking attacks and a look into the foundational concepts of how to create a well defended organization. Includes live demonstrations of hacking vulnerabilities!
Protecting the Future
An examination of the threats that our children and families face and how to protect and defend those we hold most dear. Includes live demonstrations of hacking vulnerabilities!
The Terrorist in Your Toaster
All things Internet-of-Things. The threats and vulnerabilities of IoT as well as how to properly build defenses to keep them safe and secure. Includes live demonstrations of hacking vulnerabilities!
Securing Skynet
A brief overview of the current threats that we all face today and then a deep dive into the threats of tomorrow and what the Cybersecurity community is doing to combat them. Includes live demonstrations of hacking vulnerabilities!
Exploiting the Masses
An in depth look at how hackers exploit human trust for gain and why we, as humans, are so susceptible to fraud and malfeasance. Includes live demonstrations of hacking vulnerabilities!
Creating the Blockchain
This presentation is all things Bitcoin and cryptocurrency related, from the pros and cons to how it keeps itself secure.
Wrangling the Nerd Herd
– IT Management 101 and how to create an effective, all-encompassing IT staff.
Hide and Seek in the Modern World
An in-depth look at the challenges we face while keeping our personal information private. Includes live demonstrations of hacking vulnerabilities!
Securing a Mobile Workforce
The problems and issues that arise from a mobile workforce and the best ways to secure and defend both the remote worker and job site. Includes live demonstrations of hacking vulnerabilities!
Anatomy of a Social Engineering Attack
A breakdown of how a social engineering attack can go and how to educate yourself against this kind of threat. Includes live demonstrations of hacking vulnerabilities!
Cyberwarfare & Cyberterrorism 101
A look into state sponsored hacking and how it’s shaping our geopolitical future. Includes live demonstrations of hacking vulnerabilities!
Compliance Made Simple
A breakdown of virtually ALL government compliance, where it comes from and how to get your organization 95% of the way to full compliance in just 15 slides!
PCI Compliance
An exploration of PCI compliance, it’s security dimensions and how to properly protect a PCI compliant network.
HIPAA Compliance
An exploration of HIPAA compliance, it’s security dimensions and how to properly protect a HIPAA compliant network.
SOX Compliance
An exploration of SOX compliance, it’s security dimensions and how to properly protect a SOX compliant network.
SEC Compliance
An exploration of SEC compliance, it’s security dimensions and how to properly protect a SEC compliant network.
ITAR Compliance
An exploration of ITAR compliance, it’s security dimensions and how to properly protect a ITAR compliant network.
Custom Speech
Nick is more than happy to work with you to tailor a custom presentation for your event.