APB is a Global Speaker, Celebrity & Entertainment Agency
John  Sileo

John Sileo

Cybersecurity Expert, CEO & President of The Sileo Group

John Sileo

Cybersecurity Expert, CEO & President of The Sileo Group

Biography

John Sileo lost his million-dollar startup, his wealth, and two years of his life to cybercrime. It began when a cybercriminal (and trusted insider) embezzled from the company’s clients using John’s identity. John was held legally and financially responsible for the felonies committed while proving his innocence. The losses not only destroyed his company and decimated his life savings, but consumed two years of young fatherhood as he fought to stay out of jail.

Thankfully, John’s story has a happy ending. After two years, he was exonerated of all crimes and has spent the better part of two decades sharing his story and hard-earned wisdom as a cybersecurity expert, award winning author, 60 Minutes guest and keynote speaker for the Pentagon, Amazon, and thousands of audiences worldwide. He seeks to keep organizations from becoming the next disastrous data breach headline. John specializes in the human elements of cybersecurity and uses disarming humor, audience interaction and cutting-edge research to keep his training relevant and entertaining.

John is President of The Sileo Group, a Colorado-based think tank, and serves on several boards as a director. He graduated with honors from Harvard University and was recently inducted into the National Speakers Hall of Fame. John finds his greatest pleasure hiking in the Rocky Mountains with his amazing wife and strong daughters – the lovely family who helped him turn life’s lemons into something much sweeter and more fulfilling.

Speaker Videos

Human Powered Cyber Security

Security Through Humor Not Fear

Loss Inspires Change

Bridging Personal & Business

Live iPhone Hacking

Speech Topics

Savvy Cybersecurity in a World of Weaponized A.I.

Artificial Intelligence makes hacking your organization easier. Generative A.I. models evolved from ChatGPT give novice cybercriminals free tools to code malware, create adaptive ransomware, and author sophisticated phishing emails around the clock. Deepfake videos imitate people in power to manipulate your performance, profits and reputation while disinformation campaigns blur the lines of trust. And quantum computing is about to render current defenses nearly useless. Are you prepared? While technology is also part of the solution, it is not the primary answer to the quiz. In this keynote, cyber expert John Sileo leverages his experience of losing everything to cybercrime to bridge the security gap between human beings, technology and rapidly emerging threats.

Blockbuster Cybersecurity in a Zero Trust World

Hackers don’t just adapt to change; they bank on it. Has your mindset evolved? The rapid expansion of remote workforces, ransomware gangs, cloud jacking, IoT hacking, supply chain attacks, social engineering and disinformation campaigns have altered the way we must defend our data, reputation, and profits. A faulty adage asserts that humans are your weakest link when in reality, they can be your greatest defense. Cybersecurity doesn’t grow from shinier tools, but from the powerful intersection between human beings and technology. In this keynote presentation, John will leverage potent lessons learned from losing everything to cybercrime as well as a humorous live-hacking demonstration to build a Blockbuster Framework for analyzing, organizing, and communicating your powerful cyber defense strategy.

The Art of Human Hacking: Social Engineering Self Defense

Anti-fraud and social engineering training only work when your people experience it first-hand. Humans can be the weakest link or the strongest competitive advantage in the security and profitability of your information. But people are often the most underutilized weapon in your fight against cybercrime. Don’t surrender to Death by PowerPoint; fraud training needs to be engaging to be effective. This presentation makes security interactive, so that it sticks. In it, John will use his own losses at the hands of social engineering to illustrate the tools and tricks used to separate you from your critical data, including: System 1 & 2 reflexes, social media harvesting, trust shortcuts, ego stroking, greed appeals, and cortisol flushing. By John’s closing story, you will be fully empowered to detect and deter social engineering and fraud.

Building a Bulletproof Culture of Security: A Crash Course for Savvy Leaders

To avoid becoming the next disastrous data-breach headline, you must foster a healthy culture of security that addresses both the technological and human elements of data defense. Change happens when you create energy and buy-in among the people who handle your mission-critical information. When it comes to the latest data security threats, you can’t possibly do everything—but you must do the right things. This cyber-leadership crash course forges a high-level, non-technical path through the often-confusing web of cybersecurity. It is a highly interactive presentation that leverages John’s first-hand experience of losing everything to cybercrime, continues with a live hacking demo of an audience member’s smartphone and ends with an actionable Roadmap of Leadership Next Steps.

Think Like a Spy: Identity Theft & Online Privacy Protection

Smart speakers and digital assistants like Alexa, Google and Siri eavesdrop on the conversations you have at home and work, sharing your behaviors with their “partners”. Super cookies collect your browsing history, selling your privacy to the highest bidder. Mobile phone providers track and trade your location while social media sites build psychographic dossiers that classify you according to your psycho-social profile. Identity thieves hack these sources, banking on your data and wealth. Think Like A Spy focuses on taking control of your identity and privacy. Due to the rapid rate at which information is being compromised, you must leverage the very latest prevention tools to protect everything from your Social Security number to bank account, from passwords to confidential emails. John delivers these identity theft and privacy countermeasures in a highly interactive speech inspired by his loss of more than $300,000 to ID theft

Testimonials