Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

Filters

Gerri Burns profile photo

Gerri Burns

owner/CEOIDTSecure

President/CEO IDT Secure .. Identity Theft consultant, speaker, trainer and benefit's broker

Seminar SpeakerEmployee BenefitsInsuranceRisk ManagementIdentity Theft
Mack Jackson Jr profile photo

Mack Jackson Jr

SpeakerMJ Computer Concepts Inc

A Speaker For The Digital Age

Identity TheftCredit Card ProcessingProtecting BusinessFraudFinanical Fitness
Mike Rodriguez profile photo

Mike Rodriguez

Senior Managing ConsultantIBM

Mitigating Risk, Ensuring Compliance and Championing Data Security.

SecurityCompliancePrivacy
Otis Prince profile photo

Otis Prince

President, CEOOtis Prince International

Experienced, eloquent and dynamic speaker who fuses authenticity, humor, passion, humility and inspiration to connect and engage.

Small BusinessLeadership Versus ManagementEffective Communication
Robert J. Sawyer profile photo

Robert J. Sawyer

Science Fiction WriterSFWRITER.COM Inc.

"Canada's foremost futurist" -- CBC Radio

Richard Hollis profile photo

Richard Hollis

DirectorRisk Crew

Cyber Security Risk Management Speaker

AI CybersecuritySocial EngineeringHIPPAIoT SecuritySOC 2
Byron T. Embry profile photo

Byron T. Embry

Leadership and Personal Development Consultant/MotivatorClosing Remarks

"..as dynamic as they come" President Barack Obama

Leadership AssasinationEmotional Identity TheftTeamwork
Venkat Margapuri, PhD profile photo

Venkat Margapuri, PhD

Assistant Professor, Computing SciencesVillanova University

Dr. Margapuri researches in the fields of Artificial Intelligence and Machine Learning for applications in agriculture and healthcare.

Artificial IntelligenceMachine LearningComputer VisionHardware SecurityCyber Physical Systems
Michael Nowatkowski, PhD profile photo

Michael Nowatkowski, PhD

Professor; Director, AU Cyber InstituteAugusta University

A leading cybersecurity expert available to discuss online security, ransomware, and device security topics.

Hardware and Embedded SystemsCellular and Mobile TechnologyDefensive Cyber OperationsCyber Operations EducationTCP/IP Protocol Analysis
Anna N. Taylor profile photo

Anna N. Taylor

Author, Motivational Speaker, Freelance WriterEntrepreneur

Motivational & Public Speaker | Strategic Communicator

Improve Your Business Practices & Enhance Your Customer ServiceEnhance Your Confidence