Book Jim

Speaking Request

Jim personally reviews every inquiry and responds within two business days. Fill out the form below with as much detail as you can. It helps prepare a relevant response quickly.

About Jim

Cybersecurity executive with 30+ years of frontline experience. Jim has presented at DEF CON, RSA Conference, BSides events, NolaCon, CircleCityCon, DerbyCon, and more — bringing practical insight from the SOC to the boardroom.

He holds CISSP and CISM certifications, is published in CPO Magazine, Infosecurity Magazine, and Security Magazine, and has a background as a degreed microbiologist who built and sold technology companies.

View full speaking history

Speaking Topics

  • AI Governance & Emerging Threats
  • Security Leadership & CISO Strategy
  • Threat Intelligence & Incident Response
  • DNS Security & Network Defense
  • Security for Small & Midsize Enterprises

Presentation Formats

  • Keynote (30–60 min)
  • Conference Talk (20–45 min)
  • Panel Discussion
  • Workshop / Training
  • Fireside Chat
  • Virtual Presentation

Your Contact Information

Event Details

Session Details

Jim personally reviews all requests and responds within two business days.

Topics

Speaking Topics & Sample Talks

AI Governance & Emerging Threats

Jim addresses how organizations can build dynamic AI governance frameworks that keep pace with rapid technological change. The focus covers usage policies, data handling, risk categorization, and security implications of widespread AI adoption.

Sample Talks

  • Corporate AI Governance: Best Practices for a Secure and Ethical Future
  • Taming the Hydra: Managing Security Tool Sprawl Through Strategic Governance

Security Leadership & CISO Strategy

This topic helps security professionals transition from technical roles to leadership positions. Content covers bridging the hacker mindset with business leadership, first 90 days in new roles, board credibility, and positioning security as a revenue enabler rather than a cost center.

Sample Talks

  • From Hacker to CISO: Navigating the First 90 Days
  • How to Move Cybersecurity From a Cost Center to a Revenue Enabler
  • Strategy for Responding to Corporate Reputation Attacks

Threat Intelligence & Incident Response

Drawing from real-world experience, Jim discusses practical incident response with case studies and actionable frameworks, including corporate impersonation attacks and vendor risk management.

Sample Talks

  • Corporate Reputation Attacks: Dissecting the Latest Job Offer Scams
  • Extortion, Chaos & Needless Busywork AKA Vendor Risk Management
  • EVERYONE is Part of the Security Team and Solution

DNS Security & Network Defense

Technical, demo-driven discussions on DNS hardening, privacy, and threat detection through log analysis.

Sample Talks

  • DNS — Devious Name Services: Destroying Privacy & Anonymity Without Your Consent (DEF CON 25)
  • DNS Dark Matter Discovery: There's Evil In Those Queries
  • DNS Hardening: Proactive Network Security Using F5 iRules and Open Source Analysis Tools

Security for Small & Midsize Enterprises

Practical guidance on building meaningful security programs with constrained resources, covering compliance frameworks like SOC 2, NIST, HIPAA, and PCI DSS.

Sample Talks

  • Panel: Security Strategy for Small-Medium Business (Blue Team Con)
  • Security & Compliance at Small and Medium Businesses
  • HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises