Biography

John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority– being present, every day, for his wife Mary and their dream of starting a family. Six successful years, a $2M business and two precious daughters later, he lost it all to cybercrime.

Because the cybercriminal, a company insider, masked the crimes using John’s identity, John was held legally and financially responsible for the felonies committed. The losses destroyed his company, decimated his finances and consumed two years of his family life as he fought to stay out of jail. John shares his entire story from stage.

During his keynote, John laces his story with humor and interaction to inspire audiences to take security seriously without giving in to the fear. He has molded his first-hand experiences into a string of successes as an award-winning author, 60 Minutes guest and keynote speaker to the Pentagon, Schwab and thousands of audiences ready to take concrete action on cyber security, digital privacy and tech/life balance. John helps organizations defend their data and tap into a depth of human resilience and ownership that provides the greatest security of all.

John’s Professional Profile:

  • Graduated from Harvard University w/ honors
  • Inducted into National Speakers Hall of Fame
  • Award-winning author of more than four books
  • Security expert on Rachel Ray, Anderson Cooper, Dr. Oz, and Fox & Friends
  • Makes cyber security fun, so that it sticks
  • Live-hacks iPhones and humans on stage
  • CEO of The Sileo Group, a hi-tech think tank
  • Contributor to USA Today, the Washington Post & Kiplinger

Everything John does revolves around his family. In addition to working every day with his Mom and Dad (it was their business he destroyed, so it was the least he could do to employ them), John limits his travel so he can spend more time watching The Bachelor with his highly-spirited daughters (which he will deny, if asked), snowshoeing the Rocky Mountains with his adventurous wife, and training for his 3rd-degree black belt in taekwondo (where he’s regularly thrashed by teenagers half his weight). John does in fact like piña coladas and getting caught in the rain. He’s more into bourbon and red wine than he is into champagne. Even though he graduated with honors from Harvard University (I know, we can hardly believe it, too!), he agreed to name his cairn terrier “Oreo” because that’s what his girls wanted. John is more interested in making friends than in making money, but he loves making his living as a speaker and author.

Read More

Videos

Request Availability

Speech TopicsExpand each topic to learn more

The Hacker’s Blacklist: Critical Cybersecurity Threats & Solutions

To avoid becoming the next disastrous data-breach headline, you must foster a healthy culture of security that addresses both the technological and human elements of data defense. Change happens when you create energy and buy-in among the people who handle your mission-critical information. When it comes to the latest data security threats, you can’t possibly do everything—but you must do the right things. This cyber security training crash course forges a high-level, non-technical path through the often confusing web of human decision making, cyber defense, mobile technology, IoT, social media and cloud computing—critical components of your success. This highly-interactive presentation builds on John’s experience losing everything to cybercrime, continues with a live hacking demo of an audience member’s smartphone and ends with an actionable Roadmap of Next Steps.

C-Level Cybersecurity: Building a Bulletproof Culture of Security

Security awareness starts at the top. Cybercriminals lust for your corporate data. Competitors bribe your disgruntled employee for a thumb drive full of confidential files. Social engineers exploit your executives’ social media profiles – a veritable “how to” guide for network security access. Hackers “sniff” unprotected IP addresses and cloud traffic you didn’t even know existed. Cyber extortionists encrypt your mission-critical data and demand a ransom. In the meantime, you end up the next disastrous headline – reputation damaged, customers fleeing. Cybercrime and corporate data breach are a huge financial cost and legal liability to organizations. This
does not have to be your fate. As a leader, you must learn to cope with a wide range of cyber threats with little to no technical background, limited resources and almost no lead time. The answer lies in your preparation and strength of culture. This presentation aims at leaders looking to imbue their culture with security strategies from the boardroom to the break room. John leverages his work with clients like the Pentagon and Schwab to help you develop a prioritized punch list of critical action items.

Think Like a Spy: Personal Identity Theft Protection

Identity theft training is no longer optional. Every move you make in the digital world can be tracked, hacked, recorded and exploited. Threat sources like smartphones, the Internet of Things (IoT), wearable technology, cloud computing and social media have shifted the competitive landscape in favor of cyber-savvy users with strong identity theft training. Due to the power of personally identifying information (PII) and the rapid rate at which information is being compromised, we must leverage the very latest prevention tools to protect everything from our Social Security numbers to bank accounts, from passwords to confidential emails. John delivers these identity theft countermeasures in a highly interactive, disarmingly humorous presentation inspired by his personal loss of more than $300,000, his business and two years of his life to data theft. In Think Like a Spy, John focuses specifically on identity theft prevention tools that apply to every individual in your audience.

The Art of Human Hacking: Social Engineering Self Defense

Anti-fraud and social engineering training only work when your people experience it in person. Human beings can be the weakest link or the strongest competitive advantage in the security and profitability of your information assets. But people are the most commonly underutilized, least expensive weapon in your fight against cybercrime. Social Engineering Training too often fails because of Death by PowerPoint. Fraud training needs to be engaging and interactive to be effective. To put it simply, this session makes security fun, so that it sticks. In this continually-interactive session, John goes deep into social engineering tools and tricks used to separate you from your critical data. By building System-1, Reflex-Based Awareness around how tools like social media, trust shortcuts, ego stroking, greed appeals, and cortisol flushing enable social engineers, John will dramatically reduce the human element of your threat footprint. By the time John finishes his entertaining closing story, your audience will be fully empowered to
detect and deter social engineering, fraud and deception.

Testimonials

If we could quantify the impact of John’s cyber security presentation on our attendees, it would likely be in the millions.
– Young Presidents Organization
Sileo’s security awareness training stopped $300,000 in fraud just days after his presentation.
– Disney/Partners FCU
John is a certified risk killer worth every penny.
– Pfizer
John’s keynote was a key reason why this year’s conference was the best.
– Department of Defense
John was a HUGE hit and everyone loved him! I have never seen a keynote make such a big impact.
– SHARE IBM
Highly inspiring, informative and FUN.
– FDIC
John is part of our secret sauce to connect the human aspects of security at all of our five campus conferences.
– University of Massachusetts
Who thought this incredibly hot topic could be so much fun? Our attendees raved about John’s humorous style.
– Institute of Internal Auditors

Booksby John Sileo

Your Data is Showing

Privacy Means Profit

For Meeting Planners

Blog Posts

Top Keynote Speakers on the Future of Work

What does the future of work look like? The workplace is changing at an unprecedented pace. AI, automation, hybrid work, generational shifts, and evolving leadership dynamics are reshaping how we work, hire, and collaborate. As...

Read More

Innovative Event Networking Tactics for Unforgettable Experiences

Insights on next-level networking strategies for events that help transform passive event experiences into active, connected opportunities.

Read More

Humor Is The Ultimate Business Strategy For Success

Learn how humor drives authentic communication and team cohesion in business with insights from keynote speaker Greg Schwem, the king of corporate comedy.

Read More

Here’s Why Customer Experience is an Essential Skill for Event Planners

Learn customer experience insights in event planning from keynote speaker Dennis Snow—from Disney-level service excellence to seamless event design.

Read More

Top Cybersecurity Experts For Your Event

The only thing standing between your business and a catastrophic data breach is the insight of top cybersecurity experts—are you paying attention? In a world where cyber threats evolve daily, businesses, governments, and individuals face an ever-growing...

Read More

Best Speakers on Remote Work and Productivity

Remote work and productivity are no longer just trends—they’re the future of how we collaborate, innovate, and succeed in a rapidly evolving workplace. Companies that master the art of leading distributed teams, fostering collaboration, and...

Read More

Related Speakers

Reviews & Ratings

Here's how toHit the mark with the perfect speaker!

1. Schedule a call

We’ll connect so we understand your needs to curate a selection of great speakers.

2. Book your speaker

We’ll manage all the details so you will be confident with your choice.

3. Wow your audience

Inform & educate your participants to ideas that transform their work & personal life.

Schedule a Call

Blog Posts

 

Top Keynote Speakers on the Future of Work

What does the future of work look like? The workplace is changing at an unprecedented...

Read More

Innovative Event Networking Tactics for Unforgettable Experiences

Have you ever wondered what truly sets apart the most memorable events? The secret isn’t...

Read More

Humor Is The Ultimate Business Strategy For Success

Feeling weighed down by stress at work? Imagine being in an environment where laughter isn’t...

Read More

Here’s Why Customer Experience is an Essential Skill for Event Planners

Have you ever stepped off a bus at an event and felt immediately welcomed—every detail...

Read More

Top Cybersecurity Experts For Your Event

The only thing standing between your business and a catastrophic data breach is the insight...

Read More

Best Speakers on Remote Work and Productivity

Remote work and productivity are no longer just trends—they’re the future of how we collaborate,...

Read More