Since 1987, Jeff has personally addressed over 350,000 in live audiences across the U.S. as well as countless others through radio, television and news interviews. He is a contributing writer to several state and national trade publications, and author of the book, Power Proverbs for Personal Defense. In addition to platform presentations, Jeff conducts employee...
read the rest
Since 1987, Jeff has personally addressed over 350,000 in live audiences across the U.S. as well as countless others through radio, television and news interviews. He is a contributing writer to several state and national trade publications, and author of the book, Power Proverbs for Personal Defense.
In addition to platform presentations, Jeff conducts employee training events for companies and corporations as well as continuing education events within the educational, medical, legal, financial, real estate, human resource, risk management, and insurance industries.
read less
Speaker Programs
Luring Your Money
This presentation is about those who seek to fiscally exploit others -- not through mail, email or phone scams -- but through in-person social engineering that could cost certain individuals millions of dollars. It can ...more
This presentation is about those who seek to fiscally exploit others -- not through mail, email or phone scams -- but through in-person social engineering that could cost certain individuals millions of dollars. It can be tailored both to those who work with such high-net individuals, such as bankers, financial advisors, wealth managers, CPA firms, insurance brokers, etc. as well as directly to such clients via value-add events hosted by these same trusted advisors. ...less
High Touch - High Risk
This presentation is more for those who work with high-net individuals, noting certain personality, investment, lifestyle, and spending patterns that may indicate someone is working their way into the life and finances of the advisor ...more
This presentation is more for those who work with high-net individuals, noting certain personality, investment, lifestyle, and spending patterns that may indicate someone is working their way into the life and finances of the advisor or wealth manager's client. ...less
Safety, Security & Social Engineering
This presentation addresses the more "covert" aspects of data mining and data theft, noting three particular strategies often employed by data thieves to gain access to sensitive areas of a business directly themselves or indirectly ...more
This presentation addresses the more "covert" aspects of data mining and data theft, noting three particular strategies often employed by data thieves to gain access to sensitive areas of a business directly themselves or indirectly through the compromising of internal employees. The three strategies are impersonation, bribery, and blackmail and these are broken down noting which employees are typically targeted for these specific approaches. ...less
* Fee ranges listed on this website are intended to serve as a guideline. The speaker's speaking fee should fall within this “fee range” listed. A speaker's fee may be at the high end or low end (or possibly outside of) the listed “fee range”. Additionally, a speaker may change his/her fee without notice. For a speaker's most current speaking fee or to check availability, please contact us.