The wall of AWESOME!
Jeremy speaks with students at the University of Advancing Technology, Tempe AZ

Knows how to speak to our level. Always entertaining while educating. Appreciate the dry humor and especially the 1-2 page summary handout of key notes.

Attendee
National OPSEC Conference

This is a signature briefing! Outstanding in presentation and content. Should be expanded to include additional sessions.

Attendee
National OPSEC Conference

[Corkboard source]

Why invite Jeremy to speak?

Why a geek?

This is a given… or it should be. Yet sometimes I've seen very charismatic speakers bluff their way through a topic they knew almost nothing about and I've seen coworkers in technical positions who could barely use their computer. How can you tell the difference and avoid the frauds?

Look for the "geeks".

Can you imagine spending thousands of hours sitting in front a computer writing code, playing with virtual computing, building and modifying web systems for fun? The reason that we're called "computer geeks" is that it's not just a job or even a hobby, it's part of who we are.

Why Jeremy?

My people are often very smart and skilled, but aren't the best public speakers. Maybe you've seen it: someone whose abilities were obvious, but their presentation so dry or deeply technical that it did no one any good.

In a departure from the norm, I'm a geek who's passionate for teaching, training, and awareness. I've designed and delivered training to as few as twenty and as many as a thousand or more at military bases, businesses, universities, and government facilities like the State Department, the FBI, and the Pentagon. The goal is edutainment – You'll like what you see, but you'll always learn something in the process!

Mission

What I do, I do because people are taken advantage of and put at risk solely because they lack the information to protect themselves. If only victims of e-mail scams had been warned; if people knew how their online posts could be used against them; if only the knew what I know.

That frustration has led to my mission – I will use my expertise to help people control information risks. The goal, every time, is that anyone who attends my training will leave better defended and prepared than before they came. It only counts as a success for me if I make a tangible and lasting impact on my audiences' lives!

Please read about my prepared topics below

OSPEC is a Waste of Time (50 minutes)

If you've worked for the govrernment as an employee, military, or contractor, there's a good chance you've taken an OPSEC course. OPSEC is critically important, but the training leaves a lot to be desired. Instead of focusing on the mentality and behaviors that make someone successful at practicing OPSEC, they spend all their time talking about the five steps, the math, and all the other things that OPSEC Program Managers need to know (but no one else cares about).

I've been teaching OPSEC and privacy principles for more than a decade and I can show your organization not only what they need to know, but how to teach it to others. Select this briefing to learn why OPSEC is a Waste of Time and how to make it not be.

Protecting your Identity On and Offline (50 minutes)

ID theft is a heartbreaking crime. Someone hasn't just attacked your material possessions or bank accounts, they've attacked your very being. In response the government publishes weak and incomplete advice while sketchy businesses offer "protection services" that do very little. Invite me to speak, and I will teach your audience the techniques and tools they can use to truly take control of ID theft risk.

Six Ways to Destroy Yourself Online (60 minutes)

When repairing a screen-door, you may not have time to fix everything so it's sensible to patch the biggest holes first. Likewise, Internet safety is too big a topic for an hour-long seminar, but we can still cover some of the biggest holes. In this talk, I cover risk-mitigation during common online activities such as posting online, uploading photos, and using web-services. Originally designed with students in mind, this talk has helped people of all ages and backgrounds to avoid Internet threats.

Reclaiming Your Online Identity (50 minutes)

Once you learn more about the ways that over-exposure online can put you at risk, you may wonder if it's too late to do anything about it. Rest assured, it's not. Using information and reputation management techniques, I will show you how it may not always be true that "once posted you can never get it back"!

Passwords and Authentication Bootcamp (50 minutes)

If someone uses employee credentials to access your building or computer network, it could quickly become a disaster. Similarly, no employee wants some thief masquerading as them when they commit crimes. This session will teach both risks and countermeasures of biometrics, keys, and passwords that are used to access buildings and computer systems.

Didn't see what you were looking for?

Every article, every video, every topic you see on this page is something that could make a good talk for your organization. Just contact me if you have a request and we'll discuss what kind of presentation works best for you!

"Fantastic course!!! It should absolutely be mandatory for all federal employees even if their job doesn't directly deal with the web. Great use of photos and multimedia video clips."
Class attendee
National Defense University
IDENTITY THEFT
How to Steal Identities - Why It's So Easy
Credit Freeze
Data Defense
Credit Monitoring
Id Theft Insurance
The Identity Theft Victim's Mini-Guide to Recovery
PRIVACY
The Geek Privacy Principle
Nothing to Hide
Data Abuse
RFID - Radio Frequency IDentification
Privacy Alias/Persona
Data Defense
INTERNET SAFETY
Online Addiction
The Consequences of Posting Online
Photo Safety
Tricks and Scams
Account Hijacking
Trusting Companies
PASSWORDS
Bad Passwords
Password Tips and Tricks
Password Protection
Password Mugging
Computer Security
E-mail Safety
Kids and Computers
Shopping Online
Retailers
All About Warranties