•
The wall of AWESOME!

Knows how to speak to our level. Always entertaining while educating. Appreciate the dry humor and especially the 1-2 page summary handout of key notes.

Attendee
National OPSEC Conference

Jeremy speaks with students at the University of Advancing Technology, Tempe AZ

This should be mandatory training for the base.

Briefing Attendee
Wright-Patterson Air Force Base

Up tempo brief that provided current and relevant data. Particularly enjoyed vectors to best practices, sites, tools and products.

Attendee
National OPSEC Conference

FBI Letter of Appreciation
[Corkboard source]

Prepared Workshops

Computer Security Bootcamp

Designed for colleges and other community centers, but useful for businesses as well, this workshop is designed to demonstrate the proper configuration and use of general-use computers. Topics include:

This workshop is intended to improve your computing experience permanently so it is is BOYC: Bring your own computer. Preferably the one you use and work on every day.

While many of the tools described are PC only, Linux or Mac users will still be able to utilize the techniques and methodologies described.

Customizable Workshops

Let's face it; you can scream till you're blue in the face. You might read everything here (or know it already) and try to share it with others. "Read this site", you say. "Be safer and smarter", you say. It won't work and we both know it.

Human nature has a way of making you ignore people you know and favor information from complete strangers. That's where I come in. I will come and teach your people in a few hours tips, tricks, and rules; maybe even the same ones you've always taught them. But this time they'll hear it. I use humor and relevant examples to present information that has impact!

After attending my seminars, expect your people to have a different view of safety and security and to be armed with the mentality and tools that will keep your people safe, your information secure, and lessen your chances of being the next news scandal.

Workshop Topics

Every need is different. Whether it be an "office security day", a forum, or conference, the time and topics you require may vary. That's each topic is listed with approximate times so you can mix and match to make a session that suits you:

Passwords and authentication (20 to 30 minutes)
Recommended audience: Good for anyone who uses computers at any level

Protecting your assets (physical and virtual) means keeping out intruders. This is done with passwords, biometrics, badges, access cards, etc (but mostly passwords). But when your people don't understand the basics of protecting these authentication methods, your adversaries can easily exploit them. For the first time, your people will learn not only why it's important to protect their passwords, but how easy it is to do so. Also included is some discussion of alternate authentication methods; what works, what doesn't, and risk mitigation strategies.

Internet safety (40 to 50 minutes)
Recommended audience: Anyone who uses the Internet to send (e-mail, chat, messaging) or receive (browsing, research) information

You don't want to see a virus alert at work
Most of Internet safety is just a matter of adjusting the way you think about things along with a little background on how the Internet actually works. Whether it's keeping employees from accidentally downloading a virus or teaching them how to tell which e-mails and websites are fake, a lot of pain can be avoided with comparatively little instruction.

Home and family safety (40 to 50 minutes)
Recommended audience: Anyone.

Keep your family safe and anonymous
This is designed for employers who's employees work with sensitive information (government, defense contracts, police, lawyers etc). Bad guys will be more motivated to get to you through your employees so make sure they aren't unprepared for the threat. This session will mostly cover home computing, social networking, and privacy skills. Also good for employers who just want to make it clear that they care about their employees on a personal level!

Portable computing defense (20 to 30 minutes)
Recommended audience: Anyone who stores or transports sensitive information on tablets, phones, or media

An Android tablet device
Portable computing may add freedom and efficiency, but it also adds risk. I will show your employees the risks they face and give them concrete countermeasures to defend againt them. Be certain you give your employees the training they need and not just the devices.

Internet Research Skills (40 to 50 minutes)
Recommended audience: Employees in human resources, public relations, or the press office

Find or monitor. Put the power of the Internet in your hands.
This session is all about finding information. Do you want to screen new recruits? Do you want to know and manage your company's reputation online? Do you want to make sure your employees aren't posting too much work information online? Want to keep tabs on the competition? Or maybe you just want your employees to be able to efficiently find answers to problems online? No matter the need, efficient work comes from efficient use of the Internet as a fact-finding tool.

Business data defense (40 to 50 minutes)
Recommended audience: Anyone responsible for sensitive information

Learn how to protect your data (Photo source)
This is a rapid-pace session pointing out the most common ways that businesses lose their personnel, proprietary, or secret data. This will show techniques for stealing information, but focus on practical tips and a defensive mentality that will help your employees avoid current and future data theft.
Feel free to mix and match workshop topics and seminar topics to suit your needs!

Common topics:

For college/high school students (1 to 4 hours)

  • Internet Search skills
  • Reclaiming your privacy from the Internet
  • Internet Safety
  • Home and family safety

Students who are going to be heading out into the workforce are more marketable if they have strong Internet skills and lack embarrassing personal information or photos. This workshop is focused on giving potential hires a better mindset when it comes to the Internet making them more efficient and more hireable.

Businesses (1 to 6 hours)

  • Passwords and authentication
  • Internet safety
  • Business data-defense
  • Public speaking and communication
  • Collaborative leadership

Kept intentionally short out of respect for the time commitment needed, these workshops answer the question: how can I best improve my employees' handling of sensitive data in the least amount of time, with the least cost and effort?

Additionally, communication is the key to business success. If your workforce struggles to express their experience or your leaders are failing to listen, Jeremy can help.

"This highly-informative presentation was filled with practical, relevant information, and Jeremy was energetic and very entertaining.... he should give lessons on how to get lots of points across to a broad audiences in a timely manner! outstanding session - one of the week's best!"
Attendee
National OPSEC Conference

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]