Gerri Burns

owner/CEO · IDTSecure

President/CEO IDT Secure .. Identity Theft consultant, speaker, trainer and benefit's broker

Seminar Speaker Employee Benefits Insurance Risk Management Identity Theft

Mack Jackson Jr

Speaker · MJ Computer Concepts Inc

A Speaker For The Digital Age

Identity Theft Credit Card Processing Protecting Business Fraud Finanical Fitness

Mike Rodriguez

Senior Managing Consultant · IBM

Mitigating Risk, Ensuring Compliance and Championing Data Security.

Security Compliance Privacy

Otis Prince

President, CEO · Otis Prince International

Experienced, eloquent and dynamic speaker who fuses authenticity, humor, passion, humility and inspiration to connect and engage.

Small Business Leadership Versus Management Effective Communication

William "Bill" Rials

Associate Director, Professor of Practice, Information Technology · Tulane University

Bill is a nationally recognized subject matter expert on information technology.

Robert J. Sawyer

Science Fiction Writer · SFWRITER.COM Inc.

"Canada's foremost futurist" -- CBC Radio

Tom Holt

Professor of Criminal Justice · Michigan State University

Thomas J. Holt is an expert in Cybercrime, Cyberterror, and Information Warfare Researcher

Terror Malware Information Warfare Cybercrime Identity Theft

Richard Hollis

Director · Risk Crew

Cyber Security Risk Management Speaker

AI Cybersecurity Social Engineering HIPPA IoT Security SOC 2

Byron T. Embry

Leadership and Personal Development Consultant/Motivator · Closing Remarks

"..as dynamic as they come" President Barack Obama

Leadership Assasination Emotional Identity Theft Teamwork

John Jiang

Eli Broad Endowed Professor in Accounting · Michigan State University

John (Xuefeng) Jiang collects novel data to address public policy questions at the interface of accounting and finance.

Corporate Finance Healthcare Management Corporate Governance Public Policy Information Technology Systems

Michael Nowatkowski, PhD

Associate Professor · Augusta University

A leading cybersecurity expert available to discuss online security, ransomware, and device security topics.

Hardware and Embedded Systems Cellular and Mobile Technology Defensive Cyber Operations Cyber Operations Education TCP/IP Protocol Analysis

Anna N. Taylor

Author, Motivational Speaker, Freelance Writer · Entrepreneur

Motivational & Public Speaker | Strategic Communicator

Improve Your Business Practices & Enhance Your Customer Service Enhance Your Confidence

Anna Taylor

Certified & Background Screened Notary Signing Agent; Public Speaker; Document Transcriptionist · Self-employed

Certified & Background Screened Loan Signing Agent, Human Rights Speaker, Document Transcriber

Business Communication Liaison Community Outreach Specialist Legislative Writing Legislative Research Spanish

Dominique-Cédric Brack

CEO · Reputelligence™

Frequent speaker, funny and unconventional, thought provoking and down to earth Information Technology Social Media and Information Security

Green-IT Social Media and Risks Bring Your Own Device (Byod) Cyberwarfare Information Security