accelerate background

downarrow

Upcoming Sessions

Our monthly Distinguished Speakers are comprised of Military, Hackers/Code Breakers, Government Security Agency Professionals, and Motivational/Inspirational Speakers. Limited Seating Available.

July 2021

Dr. Charles Miller & Chris Valasek

Dr. Charles Miller & Chris Valasek

The Mind of a Hacker – What They Do and How They Do It

Tuesday, July 27


Two renowned White Hats give us the 411 on what the hackers are up to today and how to stop them in their tracks.

So buckle up for a high-octane ride through the mean streets of car hacking with Dr. Charlie Miller, Principal Autonomous Vehicle Security Architect at Cruise and Chris Valasek, Director of Product Security.

Register

More About Charles   More About Chris

August 2021

Kevin Mitnick

Kevin Mitnick

 

Tuesday, August 24


Register

More About Kevin

September 2021

Carey Lohrenz

Carey Lohrenz

 

Tuesday, September 28


Register

More About Carey

October 2021

Steve Wozniak

Steve Wozniak

 

Tuesday, October 26


Register

More About Steve

November 2021

TBD

TBD

 

November


December 2021

TBD

TBD

 

December


Last Chance to Watch

After the live session date, for a limited time, you can still catch their message. Request access to watch the video.


Jocko Willink

Jocko Willink

June


"If one part of the team fails, the whole team fails."
-J. Willink

Battle!  Combat!  Defend!
It's how security professionals describe their never-ending war against cybercrime. So, we thought it was time to call in the U.S. army to discuss the matter.
Regular military personnel? Sir! No Sir! Jocko Willink is a former Navy SEAL Commander. Under his bold leadership, he brought stability to one of the most violent regions in the Iraq War.

In this high impact session, Jocko delivers frontline perspectives on ways to take the lead in your fight against cyber threats.

Think of it as data security bootcamp––where you'll quickly learn to deploy the most effective weapons to confront cyber enemies. In addition to helping you understand the powerful benefits of extreme ownership during challenging times, Jocko shares his battle-tested 4 Laws of Combat Leadership:

  1. Cover and Move
  2. The Brilliance of Simplicity
  3. Detach, Prioritize and Execute
  4. Decentralized Command

Together, these insights can turn Sec Ops teams into cyber-SEAL teams, unstoppable forces that are more agile, more aggressive and so fully prepared, it'll make any would be attacker think twice about your response.

Roger that.

Request Access

More About Jocko




Josh Linkner

Josh Linkner

May - Sorry, you missed it!


Big Little Breakthroughs: What notorious hackers and history-making innovators have in common

Josh Linker, author of Hacking Innovation: The New Growth Model from the Sinister World of Hackers, is a self-proclaimed creative troublemaker. Josh presents a home office rattling look at why the most creative and sinister minds on the planet pose the greatest threat to national security.




Eric O'Neill

Eric O'Neill

April - Sorry, you missed it!


Cybersecurity During the Pandemic

Enjoy binge-watching spy thrillers during the pandemic? Well, hit the pause button on those fictional episodes and tune into Eric O'Neill talk about his real-life hunt and capture of Robert Hanssen, one of the most notorious spies in cybersecurity history. 

 In addition to his adrenaline pumping story as an undercover agent for FBI counterintelligence, Eric shares his unique knowledge and perspective to help you confront the alarming rise of vulnerabilities brought on by pandemic-driven digital transformation––a data-threatening symptom of Covid-19. 

 In fact, cyberattacks are now four times higher than in 2019. Resulting in more than $4.3 billion in losses. Spear Phishing, Ransomware and Malware have never been more effective. That's because people have never been more distributed. Eric warns that perimeters and passwords are relics of security past. Active, not reactive strategies must be deployed. Immediately. So, what does a former FBI counterintelligence operative recommend? Access Management and Network Segmentation for starters. But out of respect for the spy genre, we won't give away all of the secrets. 

 You'll just have to watch this fascinating session and discover why the only way to defend against the latest espionage and cyber threats is for the hunted to become the hunter.

partners

Register

Register to join next session or Access last month's recording.

Please enter a valid email.

This is a required field.

By submitting this form I agree to receive information from Thales and its affiliates as described in our Privacy Notice.