LEARNING OUTCOMES
  • Identifying the privacy risks that could put you into bankruptcy
  • Creating guardrails for your customers’ data
  • Implementing automatic (automatic, as in, it gets done for you) checking and notifications
  • Working with the right partners
Compliance & Regulations

Their Data is Your Reputation: Playing Nice with the FTC

Gramm–Leach–Bliley. Heard of it? Gold star if you know it’s an act of the U.S. Congress containing FTC regulations
that requires companies to protect consumer data.

But did you know that the act was revised to include a whole new crop of company types that must comply with it? Any
firm that has 5,000 individual records or more (Think that’s a lot? It’s not. Smaller companies are involved in this now.) must
now comply with the act. There are some serious fines, but many have taken solace in the fact that enforcement has been lax.

That’s all about to change, and it’s going to make HIPAA look like a cakewalk.

Never fear. I’ll explain everything you need to know about Gramm–Leach–Bliley in plain language and share the steps you
need to take right now to make your company compliant.

Get the Info Sheet

Other Popular Keynotes

Signature

Everyone Has Porn on Their Computers: How to Protect Your Company From Your [Non-Malicious] Employees

Do your employees have porn on their company computers? Yes. Get over it. Even your best employee is going to use the hardware you give them in ways you never intended, risking exposure to a nasty virus that can infect your databases, your customer records, and all the other machines on your network.

Get the Info Sheet

Signature

Cybersecurity is Everyone’s Responsibility

You started your business because you liked doing what you do, not because you liked doing the business part of the business. So while you’re not thinking about cybersecurity, other people are thinking about how to take advantage of you.

Get the Info Sheet

Signature

Data Integrity: The True Currency of Cybersecurity

Data integrity isn’t just a technical issue—it’s the foundation of trust with your clients, your partners, and your entire operation. In a world where cyber threats are targeting not just data theft but data corruption, organizations face a hidden risk that can undermine their reputation and their bottom line.

Live Speaking Event

Bespoke Talks

Collaborate with Howard to design an individualized program tailored to your organization.

One of the most entertaining and engaging talks we’ve ever had. Not only did Howard leave our audience with takeaways they could instantly apply to their business, many of them asked when we could have him back again as a speaker.

Kim Walsh Phillips

CEO Powerful Professionals and Keynote Speaker

Booking & Inquiries

Interested in inviting Howard to speaker at your next event?
Provide your event details below, and we’ll be in touch with you shortly.

Name