Gerri Burns
owner/CEO · IDTSecure
President/CEO IDT Secure .. Identity Theft consultant, speaker, trainer and benefit's broker
Seminar Speaker Employee Benefits Insurance Risk Management Identity Theft
Mack Jackson Jr
Speaker · MJ Computer Concepts Inc
A Speaker For The Digital Age
Identity Theft Credit Card Processing Protecting Business Fraud Finanical Fitness
Mike Rodriguez
Senior Managing Consultant · IBM
Mitigating Risk, Ensuring Compliance and Championing Data Security.
Security Compliance Privacy
Otis Prince
President, CEO · Otis Prince International
Experienced, eloquent and dynamic speaker who fuses authenticity, humor, passion, humility and inspiration to connect and engage.
Small Business Leadership Versus Management Effective Communication
William "Bill" Rials
Associate Director, Professor of Practice, Information Technology · Tulane University
Bill is a nationally recognized subject matter expert on information technology.
Robert J. Sawyer
Science Fiction Writer · SFWRITER.COM Inc.
"Canada's foremost futurist" -- CBC Radio
Tom Holt
Professor of Criminal Justice · Michigan State University
Thomas J. Holt is an expert in Cybercrime, Cyberterror, and Information Warfare Researcher
Terror Malware Information Warfare Cybercrime Identity Theft
Richard Hollis
Director · Risk Crew
Cyber Security Risk Management Speaker
AI Cybersecurity Social Engineering HIPPA IoT Security SOC 2
Byron T. Embry
Leadership and Personal Development Consultant/Motivator · Closing Remarks
"..as dynamic as they come" President Barack Obama
Leadership Assasination Emotional Identity Theft Teamwork
John Jiang
Eli Broad Endowed Professor in Accounting · Michigan State University
John (Xuefeng) Jiang collects novel data to address public policy questions at the interface of accounting and finance.
Corporate Finance Healthcare Management Corporate Governance Public Policy Information Technology Systems
Michael Nowatkowski, PhD
Associate Professor · Augusta University
A leading cybersecurity expert available to discuss online security, ransomware, and device security topics.
Hardware and Embedded Systems Cellular and Mobile Technology Defensive Cyber Operations Cyber Operations Education TCP/IP Protocol Analysis
Anna N. Taylor
Author, Motivational Speaker, Freelance Writer · Entrepreneur
Motivational & Public Speaker | Strategic Communicator
Improve Your Business Practices & Enhance Your Customer Service Enhance Your Confidence
Anna Taylor
Certified & Background Screened Notary Signing Agent; Public Speaker; Document Transcriptionist · Self-employed
Certified & Background Screened Loan Signing Agent, Human Rights Speaker, Document Transcriber
Business Communication Liaison Community Outreach Specialist Legislative Writing Legislative Research Spanish
Dominique-Cédric Brack
CEO · Reputelligence™
Frequent speaker, funny and unconventional, thought provoking and down to earth Information Technology Social Media and Information Security
Green-IT Social Media and Risks Bring Your Own Device (Byod) Cyberwarfare Information Security