mobile menu
Search Speakers
By Topic
By Type
By Fee Range
$5k $100k+
To Search by Fees
Select Event Location

5 Cyber Security Speaker For 2019 & 2020 Events

5 Cyber Security Speaker For 2019 & 2020 Events

It feels that almost each week, we hear of a new, wide-scale corporate breach by hackers. We expect many clients to be considering the theme of cyber security for their autumn meetings. 

Here are five speakers who break explore everything from the “insider threat” to how to lock down your personal data to consider.

5 Cyber Security Speaker For Autumn Events

  1. For a heart-pounding true story that takes you into the world of cyber crime, consider Mustafa Al-Bassam
  2. For a review of how it got so bad – and what to do about it, consider Sir John Scarlett
  3. For a full overview of the scope of the threat, consider Sir John Sawers
  4. For best practices and personal stories of cyber security crisis management, consider Graham Cluley
  5. For a look at human side of cyber security, and the insider threat, consider Jenny Radcliffe

Mustafa Al-Bassam 

Former Hacker, Security Advisor at Secure Trading, & Doctoral Researcher at University College London

For a heart-pounding true story that takes you into the world of cyber crime, consider booking Mustafa Al-Bassam. At the age of 16, Al-Bassam co-founded LulzSec, the infamous hacking group that made headlines for its attacks on Sony, Fox, and the FBI. He was legally banned from the Internet for almost two years as a condition of his bail before becoming an information security advisor at Secure Trading in London and a doctoral researcher at University College London. His work has been cited in publications such as ForbesVICEThe Washington Post, and the BBC, and has appeared on national television programmes to educate the public about cyber security. He uses case studies and insider stories to enrich a dynamic, real-world look at how hackers compromise companies, and what companies can do to stop them. . | See more on Mustafa Al-Bassam.

Sir John Scarlett 

Former Chief of the British Secret Intelligence Service

For a review of how it got so bad—and what to do about it, consider booking Sir John Scarlett. Sir John Scarlett served as Chief of the British Secret Intelligence Service (SIS or MI6) from 2004 to 2009. He offers audiences a personal look at the state of the world today, and the bad actors about which audiences should be “in the know.” Providing the ultimate “insider’s glimpse” into the new cyber security players and methods on the rise, Sir John shares a powerful and compelling look at the unpredictable and rapidly changing global landscape. Plus, he talks through how organizations can get ahead of threats before it’s too late. | See more on Sir John Scarlett.

Sir John Sawers 

Former Chief of the British Secret Intelligence Service (SIS or MI6)

For a full overview of the scope of the threat, consider booking Sir John Sawers. Sir John Sawers understands our nation’s need to adapt to our ever-changing informational landscape and the dangers, risks, and potential rewards of our digital security environment. He looks at the current cyber threats, the policy of cyber security, the likelihood of a wide scale attack, and what organisations can do to protect themselves. As “cyber attacks are not much impressed by international borders,” he also discusses a need for an international approach to cyber security and shares insights on privacy versus security concerns and how audiences should be managing that balance in their own businesses. | See more on Sir John Sawers.

Graham Cluley 

Award-Winning Tech Security Analyst

For best practices and personal stories of cyber security crisis management, consider booking Graham Cluley. Graham Cluley is an award-winning security blogger, well-known for writing the first ever version of Dr. Solomon's Anti-Virus Toolkit for Windows. Drawing upon examples like Sony, TalkTalk, and Ashley Madison, Graham Cluley describes the damage that can be done to corporations—not just through the theft of customer data and intellectual property, but also to a company's brand image. Looking to the future, Cluley discusses how all companies have to be aware that they are potentially fighting a new enemy online—the state-sponsored attacker. | See more on Graham Cluley.

Jenny Radcliffe 

People Hacker and Social Engineer

For a look at human side of cyber security, and the insider threat, consider booking Jenny Radcliffe. Jenny Radcliffe—aka “The People Hacker”—is a force to be reckoned with. She is an expert in social engineering (the human element of security), negotiation, persuasion and influence, and non-verbal communication, and deception—using her skills to help clients ranging from global corporations and law enforcement organisations to poker players, politicians, and the security industry. Radcliffe is an impactful speaker who uses a combination of anecdotes, science, and humour to share lessons that help executives understand and protect against their own internal vulnerabilities. | See more on Jenny Radcliffe.

BRING A CYBER SECURITY SPEAKER TO YOUR NEXT EVENT

Are you interested in bringing one of our top cyber security speakers for an upcoming conference? 

Contact our team to find out more about one of these individuals and their speaking topics, to check their speaking fees and availability, to book one of these experts for your next event, or if there is another type of speaker you’re looking for.

If there is another type of speaker you’re looking for, simply let us know and our team can send you a customized list of speaker recommendations tailored specifically to your event's topic, theme, audience, and more.

To get in touch with us right away, you can also fill out the form below, email us at Contact@lauthorities.comlive chat with a member of our team online, or call us at 1-800-SPEAKER.

Continue Reading »

Let's Talk Next Steps
Selecting the perfect speaker for your event can be a daunting task, but our team is here to help. We’ll save you time by providing a customized list of speaker recommendations tailored to your event.