The wall of AWESOME!

Excellent presenter and very knowledgable. He presents things to the attendees that is relevant to work and home. Keep him on the agenda

Attendee
National OPSEC Conference

Mr. Duffy owned the room, I could have sat there for another hour and not minded. Give him more time next year.

Attendee
National OPSEC Conference

Jeremy speaks with students at the University of Advancing Technology, Tempe AZ

Opened my eyes to much needed information and to have a better grasp of the Internet.

Class attendee
Interagency OPSEC Support Staff

One of my favorite seminars. Very informative and animated.

Attendee
National OPSEC Conference

[Corkboard source]

Protecting Your Identity – On and Offline

At it's root, ID theft is an information risk management problem where, due to a flaw in someone's information practices, a thief gets your data and uses it for their own benefit. Without the knowledge of how this happens and what tools you can use to block it, you're left defenseless against the thief who steals your ID or the ones who run companies that pretend to offer you "protection" that don't actually.

It would be my great honor if you allowed me to speak to your audience and teach them how to cut through the rhetoric and really protect themselves without having to pay anyone monthly "protection" fees.

Learn More First

All the same informaion you'll learn in my talk is also available here on my website. Feel free to look around and learn about protecting your ID. Then, if you believe the information I have to offer will be of benefit to other people you know. please share this site or have me come to you and show your organization directly:

Talk Outline

Subject to change without notification of course.
  1. Online Identity
  2. Protecting your online accounts – passwords, using shared computers safely.
  3. Phone and laptop safety – Locks, App safety, encryption
  4. Computer Safety
  5. Doxxing – How to find and protect your information like the attackers do.
  6. Offline Identity
  7. About non-credit identity theft
  8. Protecting against non-credit identity theft
  9. About credit based identity theft
  10. Protecting against credit identity theft
  11. A special note on credit card fraud and RFID and identity theft

Ready to go?

If you'd like to discuss the seminar for use with company security days, private events, conferences, etc., please click here. Please feel free to use any of the below resources in connection with a scheduled talk.

Supporting Materials

"Jeremy presented the topic on a personnel level. He speaks from experience and has vast knowledge on his subject. He does not speak down to the audience nor does he assume that we should know what he is presenting. "
Attendee
National OPSEC Conference

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

seminar destroy Tutorial
|INDEX|next: The Consequences of Posting Online
Online Addiction: From gambling to surfing and online gaming, people can destroy themselves and others with online addiction.
Posting Online: The Internet never forgets anything completely. Make sure you don't make mistakes that will stick with you for the rest of your life.
Protecting Photos: The Internet never forgets anything completely. Make sure you don't make mistakes that will stick with you for the rest of your life.
Getting Tricked: You WERE doing fine... until someone convinced you to install a virus or give away your passwords. Don't fall for it!
Account Hijacking: One of the most common security risks today is people getting their accounts taken over and then used to trick their friends and family.
Trusting Webservices: An online service promises they'll 'Never abuse or misuse your data' and you believe them? Think again.

... or check out any of my other guides and tutorials by clicking here!

Out and About Defense

The best defense against non-credit ID Theft and a variety of other risks is to adopt a mindset of protection: Data Defense. Learn how to protect your information with simple and sometimes free countermeasures all based on a simple philosophy that the less people who have your information, the safer you are.

[Click for full description]

Credit Freeze

Setting a credit report freeze is the fastest and most effective way to actually block and reduce your risk of ID Theft. And it's free.

[Click for full description]

Federal Credit Card Liability Limit

Because of a federal law protecting you from unauthorized charges, you're better off in most cases using credit cards rather than debit cards for purchases (especially online purchases).

[Click for full description]

RFID - Radio Frequency IDentification

One of the most risky technology when it comes to your privacy is Radio Frequency Identification Tags (RFID). These radio chips broadcast your identity sometimes hundreds of feet and can be found in passports, farecards, credit cards, and even some clothing.

[Click for full description]

Out and About Defense

The best defense against non-credit ID Theft and a variety of other risks is to adopt a mindset of protection: Data Defense. Learn how to protect your information with simple and sometimes free countermeasures all based on a simple philosophy that the less people who have your information, the safer you are.

[Click for full description]

Credit Freeze

Setting a credit report freeze is the fastest and most effective way to actually block and reduce your risk of ID Theft. And it's free.

[Click for full description]

Federal Credit Card Liability Limit

Because of a federal law protecting you from unauthorized charges, you're better off in most cases using credit cards rather than debit cards for purchases (especially online purchases).

[Click for full description]

RFID - Radio Frequency IDentification

One of the most risky technology when it comes to your privacy is Radio Frequency Identification Tags (RFID). These radio chips broadcast your identity sometimes hundreds of feet and can be found in passports, farecards, credit cards, and even some clothing.

[Click for full description]

Online Addiction

Concerned about online addiction? You should be. Learn the types, the signs, and the preventions.

[Click for full description]

The Consequences of Posting Online

It's fun to post online. What you think, what you feel. But words typed and posted on the Internet can come back to bite you more than anything you could say with your mouth.

[Click for full description]

Photo Safety

You can reveal far more than you intended when you post a photo online. Don't make a critical mistake and check your photos before they're online.

[Click for full description]

Tricks and Scams

Just because you won't willing give up data doesn't mean that I can't trick you out of it. Don't fall for these well known tricks!

[Click for full description]

Account Hijacking

One of the newest threats we face is the risk of someone getting control of your online account and using it against you and the people you know. Do everything you can to prevent that from happening!

[Click for full description]

Trusting Companies

Store, online or off, are not known for being fair and helpful unless it benefits them to be so. Good deals exist, but many are bad deals in disguise. It's not in your best interests to be too trusting with any of them.

[Click for full description]