901-754-9404
My List0

We've now made it easier for you to research and save your favorite keynotes speakers. Click on the + sign to add a speaker to your Speaker List and email your favorites to colleagues and friends.

using System.Text.RegularExpressions;
Jon Engstrom, speaker

Jon Engstrom

    • 20-year Veteran with a Major U.S. Metropolitan Police Department
    • Certified in Ethical Hacking
Full Bio
In Person-Fee 🛈

$10,000 - $15,000

Virtual Fee:

Please Inquire

Travels From

South Dakota

No videos found.

Jon Engstrom Speaker Biography


Jon Engstrom is a 20-year veteran with a major U.S. metropolitan police department where he serves as the technical lead for the agency’s Criminal Intelligence and Cyber-Crime Sections. He founded and continues to support the organization’s Technical Investigations and Open-Source Intelligence Units, and is the operations lead in charge of threat assessment and incident response for the region’s Real-Time Crime Center. Jon instructs internal department teams as well as outside organizations in the areas of Operational Security for Covert Operations, Countering Electronic Surveillance, Cyber-Crime Investigations, and Open-Source Intelligence. Prior to his current assignments, Jon worked as a Federal Task-Force Officer, running under-cover and electronic surveillance operations for long-term organized crime investigations. With a certification in ethical hacking, he focuses on incorporating an attacker’s perspective into investigations and operational security.

Keynote Part 1- Protecting Your Organization from Cyber-Crime
This session focuses on recent trends of online fraud, computer intrusion, and methods that suspects steal valuable data from your company. The presentation includes the details of how hackers commit their crimes and what every employee must do to protect company assets. The audience will learn immediately how password hacking, email phishing, telephone attacks, social engineering, and online devices are an emerging threat against every business. Live examples of 'hacking' into information will surprise the audience, while detailed solutions will be displayed on how to stop the threats. Your employees will easily modify a few key online habits that will help protect your organization from the next attack.

Workshop Part 2 – Cyber-Security and Privacy: Taking Control of Your Digital Life
This session focuses on looking at the threats to our privacy and security and then defending against the most common attacks against both our organizations and our own personal data. We know that more and more often hackers and criminals are targeting individual employee’s personal information in order to compromise sensitive organizational data. This class will cover basic and more advanced best practices for reducing and security your digital footprint. The audience will learn immediately how to properly create and store passwords, generate proper online security questions, secure their home and work computers from online threats, and apply better overall defensive behavior in regard to technology. Attendees will learn how most hackers can access personal online accounts with only one attempt. More importantly, they will learn how to stop the intrusion into our smart devices and the “Internet of Things”. We live in a time where malicious actors are attempting to steal our information on a daily basis and we will build a foundation of actionable measures to fend off these attacks.

Securing Your Digital Life
This session focuses on the numerous ways that suspects steal your personal information and explains how they benefit from the data obtained. The presentation includes live demonstrations of how you and your family are likely to be attacked and the easy steps that anyone can take to prevent becoming a victim. The audience will learn immediately how to properly create and store passwords, generate proper online security questions, secure their home computers from online threats, and apply better overall defensive behavior in regards to technology in the home. Attendees will learn how most hackers can access personal online accounts with only one attempt. More importantly, they will learn how to stop the intrusion.

Advanced Internet Search Techniques
We have all "Googled" someone and received varied results. This data is only the tip of the iceberg when it comes to proper internet search. This presentation will show the audience how to "dig" into the internet for personal information about themselves, their children, or others. While popular sites such as Twitter, Facebook, and Instagram are covered in great detail, including the ability to access data thought to be private, the presentation goes much deeper into the vast resources available online for researching personal information. The content gathered will give a surprising glimpse of what anyone with an internet connection can find out about you! Each presentation is custom tailored for the audience, and can be very beneficial for conducting background checks, employee screening, customer acquisition, and any type of investigation. Lifetime use of custom search tools will be provided to all attendees.

Speaking Topics:

Reviews

Testimonials

A wonderful bureau to work with! Big ups to everyone who helped make our event a success. Fingers crossed we get the chance to collaborate fo..

MDRT | Testimonial

"As always, you are the best most responsive speaker bureau I've ever worked with!"

Image Media

Angela Schelp was a great partner in finding the right kick-off speaker for our conference. This was my first conference identifying the keyn..

CubeSmart

I just wanted to thank Matt Meyer and Sheryl Moon for their meticulous assistance with identifying, securing and preparing our chosen guest s..

Testimonials | TraceLink | Executive Speakers

This was my first experience using ESB to locate and secure a keynote speaker for my Corporate event. They were extremely easy to work with a..

AngMar Medical Holdings

"Matt Meyer was really wonderful in assisting me to find the correct keynote speaker for our conference. Jenny Foreman was completely on top ..

The Anchor Group

"As always, Executive Speakers Bureau helped us execute another flawless event. It is always so reassuring to know that you have a team behin..

Texas Hospital Association

"What stands out about the times I have worked with Executive Speakers Bureau is their lightning-fast response time. ESB’s account exec..

Keynote Speaker

"I've worked with Richard and ESB for many years and he's always able to deliver for us. He works hard to meet your speaker goals within the ..

Chem Dry

"Angela is the best!!! I can always count on her honest feedback about speakers. She helps me look like a hero to my company!"

Testimonials | Medtronic | Executive Speakers
Need Suggestions? Have Questions?

Need Suggestions? Have Questions?

Call to discuss how we can you help find the right speaker(s) for your organization.

© 2024 Executive Speakers Bureau. All Rights Reserved.

Design and Developed by eBiz Solutions

Get Ideas in 1 hour or less

Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.

Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.