Presentation Topics

01 - Protecting Your Organization from Computer Crime

This updated session focuses on recent trends of online fraud, computer intrusion, and ways that suspects steal valuable data from your company. The presentation includes the details of how hackers commit their crimes and what any employee can do to protect company assets. The audience will learn immediately how password hacking, email phishing, telephone attacks, social engineering, and online devices are an emerging threat against every business. Live examples of 'hacking' into information will surprise the audience, while detailed solutions will be displayed on how to stop the threats.

Minimum Length: 1 Hour
Maximum Length: 2 Hours
Book: Yes

02 - Securing Your Digital Life

This updated session is based on the principles discussed in my book Personal Digital Security. It focuses on the numerous ways that suspects steal your personal information and explains how they benefit from the data obtained. The presentation includes live demonstrations of how you are likely to be attacked and the easy steps that anyone can take to prevent becoming a victim. The audience will learn immediately how strong password routines, good security questions, secure computers, improved email habits, defensive behavior, and guarded social network profiles will protect anyone from unwanted hacker attention. Free software applications will be presented toward the end of the session.

Minimum Length: 1 Hour
Maximum Length: 2 Hours
Book: Yes

03 - Outsmarting Your Kids Online

In this session, I provide tested strategies for parenting in a digital world.  From understanding today's social media concerns to learning about tomorrow’s technology trends; from considering app risks to reporting digital bullies; from enabling monitoring solutions to identifying warning signs, this session empowers overwhelmed parents to make smarter online decisions to properly protect their kids. This training provides parents new and unconventional tools that allow them to look into their child's online life in a way never possible before. It identifies dozens of free resources that simplify and automate in-depth searching of your child's social network activity. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some "hidden" content), the session goes much deeper into the online activity that may be exposing your child to unnecessary risk.  

Minimum Length: 1 Hour
Maximum Length: 2 Hours
Book: Yes


04 - Advanced Internet Search Techniques

We have all "Googled" someone and received varied results. This data is only the tip of the iceberg when it comes to proper internet search. This presentation will show the audience how to "dig" into the internet for personal information about themselves, their children, or others. While popular sites such as Twitter, Facebook, and Instagram are covered in great detail, including the ability to access data thought to be private, the presentation goes much deeper into the vast resources available online for researching personal information. The content gathered will give a surprising glimpse of what anyone with an internet connection can find out about you! Over 200 sources of online information will be discussed and custom search tools will be given to all attendees. Aside from web sites, other technology such as Geo-location services, social network connections, cell phone numbers, online photos, and live communication monitoring will be explained. This session replicates many of the methods in my book Open Source Intelligence Techniques. It is most appropriate for those that conduct background checks or research personal information about employees, family members, or children.

Minimum Length: 1 Hour
Maximum Length: 4 Hours
Book: Yes

05 - Hiding from the Internet

In 2011, I discovered an abundance of personal information about me on several publicly available websites. I soon realized that data collection companies store information about all of us and offer it for a price. I immediately began a campaign to recover my privacy and remove all sensitive information from the internet. I documented my progress and wrote Hiding from the Internet to help others do the same. Since then, this topic has grown into a 300+ page book and an extended speaking session. This presentation will demonstrate the need to protect yourself from the numerous data brokers that make millions of dollars from your private life. Among other techniques, you will learn to: 

Remove your personal information from public databases and people search websites 
Create free anonymous mail addresses, email addresses, and telephone numbers 
Control your privacy settings on social networks and remove sensitive data 
Provide disinformation to conceal true private details 
Use a credit freeze to eliminate the worry of financial identity theft and fraud 
Change your future habits to promote complete privacy and anonymity 

Minimum Length: 1 Hour
Maximum Length: 4 Hours
Book: Yes


Books are an optional purchase as part of the live presentation or training session. Each member of the audience can take home a book authored by the presenter and related to the event at a minimal cost. Contact Us for more details.

Video Presentations

Many organizations prefer a recorded video presentation that can be delivered in a live setting or transmitted through their internal network. We can create a custom training presentation focused specifically toward your industry, outlining the latest threats targeting you. This video is your property for unlimited usage, at a small portion of the cost of a live event. Contact Us for further details.






Free Newsletter



Private VPN

  Buy VPN