accelerate background


Upcoming Sessions

Our monthly Distinguished Speakers are comprised of Military, Hackers/Code Breakers, Government Security Agency Professionals, and Motivational/Inspirational Speakers. Limited Seating Available.

September 2021

Carey Lohrenz

Carey Lohrenz


Tuesday, September 28

Our next speaker gets off to a flying start. Carey Lohrenz, author of Fearless Leadership: High-Performance Lessons from the Flight Deck sees the challenges facing business from a higher altitude.

As the first female F-14 Tomcat Fighter Pilot in the U.S. Navy, Carey offers a unique perspective on working in fast moving, dynamic environments where inconsistent execution can generate catastrophic results.


More About Carey

October 2021

Steve Wozniak

Steve Wozniak


Tuesday, October 26


More About Steve

December 2021


Chris Krebs


December 7


More About Chris

Last Chance to Watch

After the live session date, for a limited time, you can still catch their message. Request access to watch the video.

Kevin Mitnick

Kevin Mitnick

August - Sorry, you missed it!

More fuel for thought from the most elusive computer break-in artist in history. Once wanted by the FBI, Mitnick is now wanted by Fortune 500 companies and governments worldwide to challenge their security systems. Other hackers hang pictures of Kevin in their lockers. 

Request Access

More About Kevin

Dr. Charles Miller & Chris Valasek

Dr. Charles Miller & Chris Valasek

July - Sorry, you missed it!

The Mind of a Hacker – What They Do and How They Do It

A.k.a. “Razor and Blade.” Cruise Automation's Principal Autonomous Vehicle Security Architects. And, according to, two of the world’s most brilliant hackers (for good, of course).

“Our infamous Jeep Cherokee hack? No pay, just grief. But worth it.”
- Dr. C. Miller/C. Valasek

Charlie and Chris live by an unbreakable code: The un-hackable is indeed hackable. To drive home their strongly held belief, they wrangled control of a Jeep Cherokee...from miles away.

Result? Tons of media attention. More importantly, Fiat Chrysler got the message. The company recalled 1.4 million vulnerable vehicles for the fix. And even though there were other susceptible cars (they really wanted to commandeer that $100,000 Viper) the hacking duo hit the brakes.

Most ethical hackers would consider that a triumph. Not these guys. Fact is, they saw it as an ominous sign of things to come. On the road. And on the Internet.

To hear the amazing details about how they pwned that Jeep, park your device and tune into their fast and furious tale. You’ll learn about the problems which led to the Jeep hack, how they did it, the aftermath, and the critical steps Fiat Chrysler took to address the security flaws.

From there, they go into overdrive. Charlie and Chris speed through the numerous vulnerabilities baked into The Internet of Things, as well as a little segment they call Last Hack Tonight, a John Oliver-esque review of the latest devastating hacks including the slick Colonial Pipeline cyberattack, the meaty JBS Foods ransomware attack and the recent Pegasus spyware scandal, proving yet again that even Apple the “unhackable” is indeed hackable.

So buckle up security pros, it’s quite a ride through some rough cyberthreat terrain with a few pitstops for smart solutions and mitigations.

More About Charles   More About Chris

Jocko Willink

Jocko Willink

June - Sorry you missed it!

"If one part of the team fails, the whole team fails."
-J. Willink

Battle!  Combat!  Defend!
It's how security professionals describe their never-ending war against cybercrime. So, we thought it was time to call in the U.S. army to discuss the matter.
Regular military personnel? Sir! No Sir! Jocko Willink is a former Navy SEAL Commander. Under his bold leadership, he brought stability to one of the most violent regions in the Iraq War.

In this high impact session, Jocko delivers frontline perspectives on ways to take the lead in your fight against cyber threats.

Think of it as data security bootcamp––where you'll quickly learn to deploy the most effective weapons to confront cyber enemies. In addition to helping you understand the powerful benefits of extreme ownership during challenging times, Jocko shares his battle-tested 4 Laws of Combat Leadership:

  1. Cover and Move
  2. The Brilliance of Simplicity
  3. Detach, Prioritize and Execute
  4. Decentralized Command

Together, these insights can turn Sec Ops teams into cyber-SEAL teams, unstoppable forces that are more agile, more aggressive and so fully prepared, it'll make any would be attacker think twice about your response.

Roger that.

More About Jocko

Josh Linkner

Josh Linkner

May - Sorry, you missed it!

Big Little Breakthroughs: What notorious hackers and history-making innovators have in common

Josh Linker, author of Hacking Innovation: The New Growth Model from the Sinister World of Hackers, is a self-proclaimed creative troublemaker. Josh presents a home office rattling look at why the most creative and sinister minds on the planet pose the greatest threat to national security.

Eric O'Neill

Eric O'Neill

April - Sorry, you missed it!

Cybersecurity During the Pandemic

Enjoy binge-watching spy thrillers during the pandemic? Well, hit the pause button on those fictional episodes and tune into Eric O'Neill talk about his real-life hunt and capture of Robert Hanssen, one of the most notorious spies in cybersecurity history. 

 In addition to his adrenaline pumping story as an undercover agent for FBI counterintelligence, Eric shares his unique knowledge and perspective to help you confront the alarming rise of vulnerabilities brought on by pandemic-driven digital transformation––a data-threatening symptom of Covid-19. 

 In fact, cyberattacks are now four times higher than in 2019. Resulting in more than $4.3 billion in losses. Spear Phishing, Ransomware and Malware have never been more effective. That's because people have never been more distributed. Eric warns that perimeters and passwords are relics of security past. Active, not reactive strategies must be deployed. Immediately. So, what does a former FBI counterintelligence operative recommend? Access Management and Network Segmentation for starters. But out of respect for the spy genre, we won't give away all of the secrets. 

 You'll just have to watch this fascinating session and discover why the only way to defend against the latest espionage and cyber threats is for the hunted to become the hunter.



Register to join next session or Access last month's recording.

Please enter a valid email.

This is a required field.

By submitting this form I agree to receive information from Thales and its affiliates as described in our Privacy Notice.