Penguin Random House Speakers Bureau or firstname.lastname@example.org.
Who invites Marc Goodman to speak?
Companies, governments and associations interested in answering the following questions:
- How will accelerating technologies impact security, business and international affairs?
- How can executives and high-net worth individuals protect themselves and their families from rapidly emerging technical threats?
- How can corporations and organizations leverage lessons in innovation from the digital underground to drive commercial advantage?
- How can we prevent the unwitting sharing of corporate information and trade secrets with both state and non-state actor adversaries?
- What will be the future of security in our globally networked world?
Lessons in Innovation from the Criminal Underground
The topic of a Harvard Business Review feature article, this presentation draws surprising parallels as to what legitimate businesses can learn about innovation from international organized crime–a two trillion dollar a year industry. Global criminals have become sophisticated managers of technology and talent and there are lessons to be learned in innovation and operations management for legitimate enterprises. For example, while businesses around the world are struggling to keep up in the era of big data, international organized crime is masterfully exploiting these opportunities.
Criminal groups have become experts in using the breaking news to create opportunities. Moments after a devastating earthquake or the death of a noted celebrity, the digital underground springs into action, releasing new scams and plots to leverage the news to their advantage. Major crime groups have also developed great expertise in outsourcing much of their business to specialists—money launderers, hit men or hackers. Cartels, triads and gangs know that cash is not the only incentive for their workforces and have developed elaborate mechanisms to keep their employees excited and challenged. Moreover, crime groups have become experts in “exploiting the long tail” in their business. Rather than seeking out the million dollar heist, bad guys have learned that it is much easier and sustainable to commit tens of thousands of much smaller digital crimes to keep profits flowing. The illicit transnational networks established for criminal collaboration across borders provides useful lessons for legitimate enterprise in how to thrive and survive in a networked world.
The Future of Financial Crime
Financial fraud is on the rise and transnational criminal networks are innovating more quickly than business and government can keep up. The result: fraud on a mass scale across the enterprise in all sectors. In this riveting presentation, Marc Goodman explains how technologies, such as artificial intelligence are being leveraged to create vast networks of fraudulent identities and shell accounts. Discover how new and emerging forms of money, such as virtual encrypted currencies, are being incorporated into the latest criminal modus operandi to circumvent AML and BSA compliance. Hear how algorithmic-based transactions may place firms at risk—especially when the underlying algorithms are poorly understood or easily circumvented by trusted insiders. There is hope, however, including opportunities to proactively leverage emerging forms of open source intelligence (OSINT) to uncover and prevent fraud before it arises. Marc will share the latest intelligence on criminal tradecraft in the world of financial crime, including a thought-provoking analysis of what industry must do to prevent mass disruption to their business models moving forward.
Emerging Security & Privacy Threats in Medicine and Healthcare
Increasingly technology is being integrated into every aspect of medicine and healthcare, with radical—and often poorly understood—implications for both privacy and security. Medical records are being digitized at an astounding rate, but are rarely protected adequately. Moreover, implanted medical devices, ranging from cardiac defibrillators to insulin pumps, have recently been successfully targeted by hackers with potentially deadly results. When these devices fail or are compromised, how will care be effectively rendered? Organized crime groups are committing tens of billions of dollars of healthcare fraud globally, to include holding tens of thousands of patient records ransom, unless blackmail demands are met. Counterfeit medicines pose a threat not just to the intellectual property rights of their developers, but also to an unwitting public at large. Even DNA itself—the world’s original computer operating system—is being hacked through a vibrant network of garage synthetic biologists. While these fast-paced advances in science hold phenomenal opportunities to cure disease and diminish human suffering, they also are opening the door for criminals, fraudsters and even terrorists to target the world of medicine and healthcare in ways never previously thought imaginable. In the fascinating discussion, Marc will present a compelling overview on the latest criminal tradecraft affecting the healthcare industry and will reveal which emerging threats to medicine loom on the horizon. Marc will offer his analysis and thoughts on how to detect, prevent and prepare for these threats before they occur.
The Need for Cyber Executive Protection
What is your cyber risk profile? What do you look like to the outside world? As a twenty-first century security Sherpa, Marc will lead you on an eye-opening journey of the realities and risks in our cyber-connected, technologically laden world.
Technology pervades our life. Most of us would be lost without our smartphones, iPads, laptops, Tivos, digital cameras, GPS navigation devices, Facebook, Twitter, and Skype. While these tools can be of great utility, they also harbor an often ignored risk: the capability to threaten one’s business, finances, and family. All technologies can be hacked to provide a stealth window and an open door direct into an unsuspecting user’s home, office, family, or social life. As executives travel the world with their business plans, intellectual property, latest board minutes, and acquisition strategies stored on a panoply of electronic devices, sophisticated adversaries pose a persistent threat ready to steal the data of their choosing.
It is possible for an adversary to remotely turn on your laptop or smartphone’s microphone, and video camera, while simultaneously disabling the green “on” light. Your mobile phone leaks out your location 24 hours a day, and from this information a sophisticated pattern of your activities and associates can be aggregated and profiled. Your spouse or children could be readily targeted in social networking sites, and even extorted, as a means of getting to you and your business activities.
Perpetrators are no longer simply teenage hackers, but also sophisticated transnational organized crime groups, highly-effective nation states, and corporate competitors—each seeking to gather as much cyber intelligence on you as you will unwittingly allow. In this fascinating talk, Marc provides both strategy and tactics for executives to manage and mitigate risk in our interconnected world.
Your Security Sherpa for the 21st Century