From Authentication to Zero Trust

Howard has a keynote for anything your growing business could need to know to stay compliant and safe.

Popular Keynotes

Signature

How to Delegate

You started your business because you liked doing whta you do, not because you liked doing the business part of the business. So while you’re not thinking about cybersecurity, other people are thinking about how to take advantage of you.

Get the Info Sheet

Compliance & Regulations

Their Data is Your Reputation: Playing Nice with the FTC

Gramm-Leach-Bliley. Gold star if you know it requires companies to protect consumer data. There are some serious fines, and new rule changes that likely impact your business and are going to make HIPAA look like a cakewalk.

Get the Info Sheet

Signature

Everyone Has Porn on Their Computers: How to Protect Your Company From Your [Non-Malicious] Employees

Do your employees have porn on their company computers? Yes. Get over it. Even your best employee is going to use the hardware you give them in ways you never intended, risking exposure to a nasty virus that can infect your databases, your customer records, and all the other machines on your network.

Get the Info Sheet

Live Speaking Event

Bespoke Talks

Collaborate with Howard to design an individualized program tailored to your organization.

One of the most entertaining and engaging talks we’ve ever had. Not only did Howard leave our audience with takeaways they could instantly apply to their business, many of them asked when we could have him back again as a speaker.

Kim Walsh Phillips

CEO Powerful Professionals and Keynote Speaker

Booking & Inquiries

Interested in inviting Howard to speaker at your next event?
Provide your event details below, and we’ll be in touch with you shortly.

Please enable JavaScript in your browser to complete this form.
Name