Reviews Write New Review
Location
Booking Fee
Fee: $##,###Get Pricing
Virtual Fee: $##,###Get Pricing
[email protected]
The global head of security research at Sophos, James Lyne’s expertise is frequently called upon to inspire organisations and their teams to take cybersecurity seriously. Energetic, passionate, and charmingly nerdy, he has become a leading keynote speaker on cybercrime and technology.
As a big believer that one of the biggest problems of security is making it accessible and interesting to those outside the security industry, Lyne accepts every opportunity to educate on security threats and convert forbidding tech jargon into human language.
As the global head of security research at Sophos and a certified instructor at the SANS institute, Lyne’s expertise lends weight to his words. Frequently called upon for his technical know-how, he has worked with numerous organisations and handled several severe incidents.
In an ever-expanding world of networked mobile devices and security threats, our ignorance of them has become more widespread than ever. Lyne believes that if we continue to ignore basic best practices, security is on a trajectory of failure.
As a speaker, he is highly animated, and his presentations are always packed with demonstrations; ranging from showing how cyber criminals operate in the real world to deep technical presentations that aim to inspire technical thinkers.
Lyne has appeared on many national TV programs, including CNN, NBC, BBC News, and Real Time with Bill Maher. He has given several TED talks on topics such as cybercrime and cryptography, including one at the main TED event.
One session with cybersecurity specialist James Lyne and you will be rushing to your computer to change your password.
Videos
Speech Topics
Hacking with Words and Smiles
If someone put an invoice on your desk with "pay me" written in big red letters across the front, do you think you would consider who it was from before you opened your wallet? What if someone came up to you in the street and said there was someone stuck in space and they needed you to send them some money to get back? You would laugh and turn a blind eye to it. So why don't we apply our security knowledge of the real world to our digital personas?
In this program, James gives you the opportunity to see these issues for yourself with live demos and explains why everyone is a target for modern day cyber criminals. High quality social engineering is being used to access more of your information than you would think so maybe it's time to move away from the laughable stereotypes and open our eyes to the fact that cyber criminals are more convincing than ever before. See an example of the Hacking with Words and Smiles program
Cyber Security Basics - Preventing Your Business from Being Breached
Are your devices, your employees and your intellectual property open to attack? If you're liberally connecting to hotpots offering free internet and not taking additional steps to secure yourself, then the odds are you are vulnerable to cyber criminals and it's your own fault.
Our general behavior with mobile devices is to connect first and worry about it later but it is exactly this careless behavior that is making life easy for cyber criminals and lining their pockets. The Cyber Security Basics program will open your eyes to how much information we are really giving away and what we can do to make sure we are protected all the time. See an example of the Cyber Security Basics program
Reverse Engineering Ransomware
With our lives becoming increasingly intertwined with the internet, it is not a question of if but when you may become victim to a cyber-attack. Cyber criminals have become experts at finding weak spots in your security and ransomware is quickly becoming one of the most common ways to be targeted.
In this program, learn how ransomware is becoming a massive problem for business, small and large, and the common ways of becoming infected with malicious code. Bringing these issues to life with real demos, James will chat you through exactly how these cyber criminals find ways to make you trust them and hand over your hard earned cash.
Hacking the Internet of Things
Think it's just governments, large enterprises and high net worth individuals that are vulnerable to a cyber-attack? Think again. In today's wired and wireless world, simply owning a refrigerator, baby monitor or CCTV camera makes you a target for cyber thieves.
With the smart home market exploding and nearly all home gadgets being connected to the internet, the door for hackers has become a lot easier to unlock. In this program, along with live demos, James will discuss how your wireless TV is enough of a reason for a cyber-attack to be launched on you and what you need to do to make sure you are safe and secure. See an example of the Hacking the Internet of Things program
Related Speakers View all
Matthew Might
Inaugural Director of the Hugh Kaul Personalized Med...
|
|
Gary Miliefsky
Cybersecurity Expert; Founder of SnoopWall
|
|
Avi Rubin
Professor of Computer Science & Technical Director o...
|
|
Tamara Roukaerts
Tamara is Director of TRM&C - a business that provid...
|
|
Jeffrey Ladish
Head of AI Insights at Center For Humane Technology
|
|
Sara Lazarus
Founder & Chief Information Security Officer at Fade...
|
|
Chris Goldsmid
Commander of Cybercrime Operations at the Australian...
|
|
Ross Pambrun
CEO of The Memphis Group; Artificial Intelligence Ex...
|
|
Ken Fanger
Humanizing Security Leader, President of On Technolo...
|
|
Deborah Golden
US Chief Innovation Officer at Deloitte
|
|
Iddris Sandu
Founder of sLABS; Creator of the First Smart Retail ...
|
|
Kemba Walden
Acting National Cyber Director in the Executive Offi...
|
|
Victor Zhora
Chief Digital Transformation Officer at the State Se...
|
|
Evelyn Anderson
IBM Distinguished Engineer, Technical Leader & Maste...
|
|
Melodie Yashar
Space Architect, Technologist, and Researcher
|
|
Anthony Levandowski
Co-Founder & CEO of Pronto; Founder & CEO of Pollen ...
|
|
Arvind Narayanan
Computer Science Professor at Princeton; Expert on D...
|
|
Moxie Marlinspike
Entrepreneur, Cryptographer & Computer Security Expert
|
|
Nadya Bartol
Cybersecurity Strategy and Implementation Expert for...
|
|
Matthieu Faou
Malware Researcher at ESET
|