Speaking Request
Jim personally reviews every inquiry and responds within two business days. Fill out the form below with as much detail as you can. It helps prepare a relevant response quickly.
About Jim
Cybersecurity executive with 30+ years of frontline experience. Jim has presented at DEF CON, RSA Conference, BSides events, NolaCon, CircleCityCon, DerbyCon, and more — bringing practical insight from the SOC to the boardroom.
He holds CISSP and CISM certifications, is published in CPO Magazine, Infosecurity Magazine, and Security Magazine, and has a background as a degreed microbiologist who built and sold technology companies.
View full speaking historySpeaking Topics
- AI Governance & Emerging Threats
- Security Leadership & CISO Strategy
- Threat Intelligence & Incident Response
- DNS Security & Network Defense
- Security for Small & Midsize Enterprises
Presentation Formats
- Keynote (30–60 min)
- Conference Talk (20–45 min)
- Panel Discussion
- Workshop / Training
- Fireside Chat
- Virtual Presentation
Speaking Topics & Sample Talks
AI Governance & Emerging Threats
Jim addresses how organizations can build dynamic AI governance frameworks that keep pace with rapid technological change. The focus covers usage policies, data handling, risk categorization, and security implications of widespread AI adoption.
Sample Talks
- Corporate AI Governance: Best Practices for a Secure and Ethical Future
- Taming the Hydra: Managing Security Tool Sprawl Through Strategic Governance
Security Leadership & CISO Strategy
This topic helps security professionals transition from technical roles to leadership positions. Content covers bridging the hacker mindset with business leadership, first 90 days in new roles, board credibility, and positioning security as a revenue enabler rather than a cost center.
Sample Talks
- From Hacker to CISO: Navigating the First 90 Days
- How to Move Cybersecurity From a Cost Center to a Revenue Enabler
- Strategy for Responding to Corporate Reputation Attacks
Threat Intelligence & Incident Response
Drawing from real-world experience, Jim discusses practical incident response with case studies and actionable frameworks, including corporate impersonation attacks and vendor risk management.
Sample Talks
- Corporate Reputation Attacks: Dissecting the Latest Job Offer Scams
- Extortion, Chaos & Needless Busywork AKA Vendor Risk Management
- EVERYONE is Part of the Security Team and Solution
DNS Security & Network Defense
Technical, demo-driven discussions on DNS hardening, privacy, and threat detection through log analysis.
Sample Talks
- DNS — Devious Name Services: Destroying Privacy & Anonymity Without Your Consent (DEF CON 25)
- DNS Dark Matter Discovery: There's Evil In Those Queries
- DNS Hardening: Proactive Network Security Using F5 iRules and Open Source Analysis Tools
Security for Small & Midsize Enterprises
Practical guidance on building meaningful security programs with constrained resources, covering compliance frameworks like SOC 2, NIST, HIPAA, and PCI DSS.
Sample Talks
- Panel: Security Strategy for Small-Medium Business (Blue Team Con)
- Security & Compliance at Small and Medium Businesses
- HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises