As cybersecurity keynote speakers and digital privacy experts, we’re constantly researching emerging business topics and trends. Recent areas of inquiry we’ve been asked to pursue include:

Managing Enterprise Security in the Age of Digital Privacy – Staying ahead of international threat actors gets more complicated and challenging with each passing year, and it’s only become more difficult in the wake of COVID-19. However, while online networks, virtual desktops, and home offices are under greater siege, a security-first approach to network architecture and data management, and the leveraging of automated and artificially intelligent cybersecurity tools can help you stay one step ahead. We were asked to consider how to reengineer business security operations and workflows to stop cyber threats cold.

Defending Against Digital Dangers: How to Prevent Cyber Security Threats – Mountains of sensitive data are continuing to move online, even as we’re all increasingly shifting to virtual operations. But cybersecurity is also today’s fastest growing source of crime, and despite the fact that incidents happen every 39 seconds, around 85% of organizations have virtually no response plan currently in place. Having written the book Cybersecurity: The Expert Guide we were asked to take a closer look at how to guard against digital dangers using both low-tech (education, cyber awareness) and high-tech (network defense tools, penetration tests, etc.) methodologies.


Protecting the Online, Connected, and Flexible Future of Work – Remote and hybrid work is the new normal; virtual desktops and online connections are standard; and flexibility in scheduling, work assignments, and operating or management models is the new norm. In fact, world’s largest tech companies are already completely reinventing employee management and benefits programs to design them around individuals’ needs, and adopt a more employee-centric vs. employer-first focus. We considered how the working world is changing – and where we need to think about designing security policies, digital defensive procedures, and educational training to adapt to it.


Cybersecurity for Business: How to Build a Digital Threat Response Plan – We were retained to explain the steps that Fortune 500s need to take, and backup plans organizations need to have in place, to effectively address digital dangers as they arise. Keep in mind that this is a multi-step process that involves preparation in multiple areas. Some of it’s on education and skills training; some of it’s having a good communications plan in place; and of course a great deal of it is having the right technology tools and infrastructure to draw on.