phishing-hero-bg phishing-hero-bg-mobile

Cybersecurity Awareness Month

Plan Now for a Great October

Deliver a high-impact, risk-informed Cybersecurity Awareness Month program that goes beyond generic buzz. Tailor training to your riskiest users with fast, focused, and engaging content—think espionage keynotes, AI insights, online escape rooms, and family-friendly fun. All designed to reduce real-world cyber risk and prove the impact. 

 

Schedule Now

Supercharge Cybersecurity Awareness Month with OctoberRewired

This October, don’t just "raise awareness"—rewire your organization's approach to cybersecurity. OctoberRewired by Living Security transforms the traditional Cybersecurity Awareness Month into a high-impact, risk-informed initiative that targets your organization's riskiest users. Why settle for basic when you can deliver precision-focused, data-backed training that actually reduces cyber risk?
AdobeStock_548474579-bw
  • Here’s what OctoberRewired delivers: Fast-Track Deployment: Pre-built content and promotional tools to launch in minutes—because speed matters when it comes to protecting your people.
  • Tailored Learning: Choose from 20+ courses of weekly themed content designed to address real-world threats, all available year-round.
  • Engaging Experiences: Keynotes from thought leaders on espionage, AI, and generational risks, plus gamified training and online escape rooms to keep employees hooked and learning.
  • Hollywood-Style Training: Interactive, immersive experiences that bring real-world scenarios to life—so your team is prepared for anything.

Don’t just inform. Transform. Make this October the turning point in your organization’s human risk management journey.

security-training-img-1-1

Pinpoint Riskiest Users

Using your existing tools to target real risk, drive measurable behavior change, and prove impact—without the manual lift.

Team investigating a possible data breach on an office computer screen

Turnkey Program

Utilize a complete program that includes role & industry-specific content for a variety of communication channels including blog posts, webinars, video, and social media.
AdobeStock_646182954-bw

Full Year of Content

Get year-long access to interactive training sessions, simulations, and gamification that make cybersecurity learning engaging, practical, and memorable.

Two Paths. One Outcome that Matters.

Choose Your Impact. Start Now to Target Your Riskiest Users and Maximize October’s ROI.

Phase Toolkit Component October Basics October Rewired
Risk Identification Human Risk Assessment
Correlated human risk insights delivered through Living Security’s Unify—powered by your existing phishing and email data—to identify high-risk users.
 
Expert-Backed Insight Reports
Living Security’s HInT experts supercharge your Unify report with human intelligence—delivering clear, expert-backed recommendations to eliminate your organization’s greatest risks.
 
Planning Risk-Based Engagement Content
Attention-grabbing materials like puzzles and games, and quick-hit videos tailored to drive awareness exactly where your employees need it most.
Execution Speakers
Schedule a sought-after speaker with fascinating topics
Campaign in a Box
Leverage weekly materials with blog posts, email messaging, chat communications, and more
Promotional Assets & Campaign Guides
Easy-to-use templates and campaign plans to boost employee participation and highlight your cybersecurity month success.
CyberEscape Online
Interactive risk challenges and simulations specifically crafted to test and reinforce key cybersecurity topics in an engaging storyline.
Interactive Experience
Participate in a family-friendly event that brings fun and learning to everyone.
Reporting Expert-Backed ROI Report
Prove ROI, show impact, and make the case for future investment in human risk management—with no fluff, just results.
 
Expert-Backed Impact Report
Actionable insights and success metrics delivered by Living Security’s HInT experts after your Cybersecurity Awareness Month activities, tracking behavior change, measuring risk reduction, and seeing what worked.
 

 

Schedule Now

Meet Our Fascinating Keynote Speakers

Our award-winning speakers cover an array of topics including espionage, generational differences, A.I., and more.

 

matthew-hedgerMatthew Hedger is a subject matter expert in organized crime, communications security, and anti-money laundering with specific expertise in alternative remittance systems and cryptocurrencies.

He began his career in the US Navy and has a combined 17 years in the Intelligence Community working for CIA and the NSA. The Director of NSA twice named Matthew as the NSA Pacific Command “Performer of the Year.” He engaged in, developed, and supervised covert finance and sensitive procurement operations in Asia, the Middle East, Europe and elsewhere. Matthew directly managed transferring millions of dollars in fiat and cryptocurrencies to facilitate intelligence and law enforcement operations. While partnering with a U.S. law enforcement agency, Matthew operated several years undercover in transnational organized crime organizations. His successful infiltration of one group directly enabled law enforcement to neutralize a transnational narcotics, weapons smuggling, and money laundering network. Matthew has trained elite law enforcement units in skills ranging from cover operations, counternarcotics techniques, high-risk situations, and sensitive candidate selections.sla

Matthew holds a bachelor’s degree in cryptology, a master’s degree in finance from Kings College London, and specializations in intellectual property theft law and fintech law from the University of Pennsylvania. He is the recipient of the Navy Club of the United States Military Excellence Award. Matthew is a proud supporter of the Six8 Foundation, a charity helping the Special Operations and Intelligence Communities and Children of the Night, a charity focused on rescuing children from human trafficking.

1. The Psychology of Deception - How Spies, Cyber Fraudsters, and AI backed Con Men Manipulate the Brain

Dive into the intricate psychological techniques used by spies and con artists to deceive their targets and explore how these practitioners exploit cognitive biases, emotional responses, and behavioral patterns to manipulate others. Learn the various methods, such as the use of misinformation, building trust, and creating false narratives, that allow these manipulators to influence decision-making and control perceptions. By examining these strategies, the audience will gain insight into how the brain can be easily tricked and how the subtle arts of deception are now being manipulated at scale with unprecedented precision by AI in high-stakes environments. More importantly, they will learn how to recognize digital deception, safeguard their personal and professional data online, and develop critical thinking skills to outmaneuver cyber threats before they strike.

2. The Spy’s Guide to Winning: Leveraging the Dark Arts of Espionage, Cyber Deception, and Cons (for Good!) in Business and Life

Step into the shadowy world of spies, con artists, and master manipulators—only this time, flip the script. Unveil how the same psychological tactics that fuel deception and fraud can be ethically harnessed for business and personal success. From influence and intelligence-gathering to social engineering and risk management, dissect the playbook of the world’s most cunning operators and apply their methods to sharpen leadership, negotiation, and strategic thinking. Real-world case studies from espionage and infamous scams will reveal how persuasion, relationship-building, and deception detection can become powerful tools in high-stakes environments. And in the digital battlefield, where hackers and fraudsters exploit human psychology with alarming precision, uncover how businesses and individuals can stay one step ahead.

3. Crypto, Cartels, Cyber Crime, and Your Capital: Why Everyone is a Combatant in the New Digital Battlefield

From the unique perspective of a former undercover operative who infiltrated international organized crime as a money launderer, uncover how cybercriminals, cartels, and rogue nation-states are exploiting digital finance to reshape the world of cybersecurity and financial crime. Cyber-savvy cartels and sophisticated hackers are using cryptocurrency, AI-driven deception, and digital laundering tactics to bypass traditional safeguards, putting businesses and individuals at unprecedented risk. This talk will expose the impact of the Strategic Crypto Reserve, FinCEN’s Geo-Targeting Order against drug cartels, and emerging money laundering networks, revealing how cybercriminals evade detection and exploit regulatory gaps. As governments tighten their grip on digital assets, the battle between cybersecurity, privacy, and financial freedom is intensifying. Learn how to protect your business, secure your personal finances, and stay ahead of the evolving threats that could compromise your financial world.

shawnee-delaneyShawnee Delaney is the founder and CEO of Vaillance Group and a highly sought after keynote speaker. Shawnee spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zone tours in Iraq and Afghanistan as a Case Officer and Detachment Chief and served as a Supervisory Branch Chief in Europe. After leaving DIA, Shawnee supported the Department of Homeland Security (DHS) in the protection of U.S. critical infrastructure and industrial control systems for the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). Shawnee has built Insider Threat programs for major Fortune 500 companies. She holds an M.A. in International Policy Studies with a Specialization in Counter-Terrorism and Counter-Proliferation, a M.S. in Cyber Security and is currently in process of getting her third Masters in Industrial-Organizational Psychology. She has written articles or been cited on Insider Threat in publications such as the Cipher Brief, USA Today, Fox Business, Yahoo Finance, Business Insider, the Hill, Spyscape, Associated Press, Benzinga, and the Financial Times, among other international periodicals.

The Spy’s Guide to Cybersecurity: Espionage Tactics for Defending Your Enterprise

What if I told you that the best cybersecurity professionals think like spies? The world’s top intelligence operatives master the art of surveillance, targeting, deception detection, and elicitation—the same skills that can make or break an organization’s security posture. In today’s digital battleground, cybercriminals and nation-state actors are using espionage tradecraft to infiltrate businesses, manipulate employees, and exfiltrate critical data.

In this keynote, we’ll explore how time-tested spy tactics can elevate your organization’s cybersecurity, insider threat detection, and risk management strategies, including:

  • Targeting & Reconnaissance – How attackers gather intel on employees, business operations, and vulnerabilities before launching cyber attacks.
  • Trust & Manipulation – How social engineers exploit human psychology to gain unauthorized access, steal credentials, and bypass security controls.
  • Elicitation & Social Engineering Defense – Recognizing subtle conversational tactics used by attackers and preventing accidental leaks of sensitive information.
  • Counterintelligence for the Enterprise – Proactive strategies for detecting, deterring, and disrupting cyber threats before they cause damage.

You’ll leave with practical, spy-approved strategies to help your employees and security teams think like an adversary, spot deception, and protect your organization from cyber threats—before they strike. In the modern world, cybersecurity isn’t just about firewalls and software; it’s about understanding human risk, intelligence tactics, and staying one step ahead of the enemy.

Raising Digital Natives: Protecting Kids in a Hyper-Connected World

Every tap, swipe, and click is shaping your child’s world—are you ready to protect them?

Today’s kids aren’t just using technology—they’re growing up in it. From YouTube rabbit holes to online gaming and social media, the digital world is their playground, their classroom, and sometimes, their greatest risk. In this engaging, eye-opening keynote, we’ll uncover:

  • The real risks of online gaming (Fortnite, Roblox, Minecraft, Dune)—who’s really talking to your child?
  • How social media and YouTube affect developing brains (spoiler: it’s not all bad, but it’s not all good either)
  • Online predators, cyberbullying, and digital addiction—what every parent needs to know
  • Smart strategies to keep kids safe without extreme restrictions (yes, it’s possible!)

This talk is not about fear—it’s about empowerment. You’ll walk away with practical tools, real-world examples, and expert insights to help your child thrive safely in a world where screens are unavoidable. Because in today’s digital age, parenting isn’t just about teaching kids to look both ways before crossing the street—it’s about teaching them to navigate the online world without getting lost in it.

Watched, Tracked, and Hacked: How Ubiquitous Surveillance Controls Your Life (and What You Can Do About It)

From your phone to your smart home, your car to your workplace—you are being watched. In this eye-opening talk, we’ll dive into Ubiquitous Technical Surveillance (UTS) and how it’s quietly shaping your decisions, privacy, and security. Whether you’re a business leader, parent, or everyday citizen, surveillance isn’t just a dystopian concept—it’s your reality.

You'll learn who’s tracking you, why it matters, and how to fight back in a world where data is the most valuable currency. This isn’t just another cybersecurity talk—it’s a wake-up call to take control of your digital life before someone else does.

The Art of Espionage: Understanding the Fundamentals of Spycraft

Espionage isn't just a plot in thrillers; it's a real and present danger. Doubtful you could be enticed into the world of spying? Think again. Our speaker, a former Case Officer (spy), will unveil her methods for identifying and recruiting individuals across various industries—revealing tactics from casual conversations at airport lounges to sophisticated surveillance operations. This insightful presentation dives deep into the clandestine world of espionage and its implications for your organization. Explore the intricate realms of industrial, corporate, and foreign espionage, as we dissect their motivations, the financial stakes involved, recruitment strategies, and provide vivid case studies of threat actors. Learn about the espionage toolkit, which blends traditional human intelligence methods with cutting-edge cyber security tactics. This talk will illuminate how today's adversaries, including hackers, nation-states, and organized crime rings, employ espionage techniques reminiscent of those used by spies. Equip yourself with the knowledge to detect and defend against espionage, whether you're facing a human operative or a cyber threat.

The Human Factor: A Spy’s Guide to Social Engineering and Insider Threats

This presentation will provide an overview on what the term "insider threat" actually encompasses, from unintentional acts to malicious acts, and everything in between. It will provide details and case studies on malicious insider acts, psychological motivations of a malicious actor, and the Critical Pathway. The Critical Pathway, as identified by Shaw and Sellers, explains how personal predispositions, stressors, and concerning behaviors can lead up to Insider Threat-like behaviors and/or malicious acts. In addition, this presentation will discuss:

  • How the human factor impacts organizations
  • How your organizational culture can affect insider threat
  • How both spies and social engineers work similarly to target you and your employees to gain access to your organization's most sensitive data
  • How one's personal motivations and vulnerabilities can leave their organization vulnerable
  • How organizations can establish an employment lifecycle program in order to understand important interdependencies, touchpoints, interactions, and gaps in insider protection strategies

Spy vs. AI: Defending Against Artificial Intelligence's Threats to Your Life, Loved Ones and Livelihood

Have you heard of a deep fake? Would you or your family fall for one? Dive into the dynamic world of artificial intelligence and its intricate relationship with the insider threat landscape. As AI continues to reshape industries, it simultaneously introduces new dimensions of vulnerabilities within organizations that insiders can exploit. In this engaging and insightful keynote, we’ll explore the evolving threats of AI, from deepfakes to voice cloning, and how they can impact individuals, families, and businesses. With real-world examples and case studies, I’ll break down the tactics malicious actors use and, more importantly, provide practical tips on how to protect yourself and your loved ones from these emerging dangers. By the end, you'll not only understand the risks but walk away empowered with actionable strategies to safeguard your digital lives in an increasingly AI-driven world.

Clean Sweep: A Spy’s Guide to Cyber Hygiene and Digital Wellness

In this engaging keynote, "Digital Wellness: The Art of Maintaining Your Cyber Health," taught by a former spy who knows firsthand the tactics threat actors use—because she once used them—we'll explore the vital connection between personal health care and cyber hygiene. This isn’t your typical, boring talk on not reusing passwords. Instead, you'll get actionable, practical advice on how to protect yourself and your family from real-world digital threats. From understanding dangers like phishing and ransomware to adopting strong cyber hygiene practices, you’ll learn how to safeguard your digital life. With insights such as treating antivirus software like your immune system and using regular updates as digital vitamins, this talk equips you to maintain a secure, healthy online presence. By the end, you'll understand how to protect your digital well-being, just as you would your physical health—straight from someone who knows the tricks of the trade.

eva-bennEva Benn is the Chief of Staff for the Microsoft Red Team, where she is at the forefront of innovation, driving strategies that leverage disruptive technology to redefine red teaming and security as we know it. She pushes the boundaries of adversary simulation, red teaming, and threat-informed defense to help strengthen Microsoft’s cyber resilience against real-world attacks. Previously, Eva led the Red Team PM team, securing some of Microsoft’s most critical products and services, including Edge devices, Windows OS, Xbox, and Microsoft Game Studios. Before joining Microsoft, she worked in Big 4 cybersecurity consulting, leading global penetration testing and cybersecurity initiatives across various industries. She is a globally recognized security leader, holding an extensive list of industry certifications, including CISSP, CEH, CCSP, Security+, GSEC, GCIH, GSTRT, GPEN, GWAPT, GRTP, etc.

As an international keynote speaker, Eva is known for her disruptive thinking, unconventional storytelling, and high-energy stage presence. She has a unique ability to break down complex security challenges into captivating, actionable insights that inspire audiences worldwide. She frequently speaks on topics such as red teaming, cyber threat simulation, adversarial tactics, and the future of cyber defense. Eva’s presentations challenge conventional wisdom, offering fresh approaches on how to outpace attackers and rethink security in an AI-driven world.

Beyond her work at Microsoft, Eva is deeply involved in the security community, having served/serving on the leadership boards of the OWASP Seattle Chapter, WiCyS Western Washington, ISACA Puget Sound Chapter, the EC Council CEH Advisory Board, and the GIAC Advisory Board. She is also a Co-Chair of the Microsoft Women in Security and Co-Founder of Women in Tech Global. Her contributions to the industry have earned her global recognition as Top 20 Cybersecurity Women of the World 2024, Top 20 Most Inspiring Women in Cybersecurity 2025 and a finalist for the Cybersecurity Woman of the Year 2024 in the People’s Choice category.

Outside of cybersecurity, Eva is a passionate mountaineer, frequently summiting Washington State’s highest peaks, including Mount Rainier, Mount Adams, and Mount Baker, and taking on challenges in the Swiss Alps. Her love for mountaineering reflects her resilience, strategic mindset, and ability to push limits—qualities that define her both on the mountain and in the world of cybersecurity.

Talk 1: Your Career, Hacked: Rethinking Success with a Hacker’s Mindset

When most people hear the word “hacker,” they picture someone in a hoodie, sitting in a basement, breaking into systems. But hacking is about far more than that—it’s about understanding how things work, thinking creatively, and finding ways around obstacles. Eva Benn, a security expert with years of experience in ethical hacking, will challenge everything you thought you knew about hackers and show how their mindset can be one of the most powerful tools for problem-solving in everyday life.

In this talk, Eva will break down how hacking principles—persistence, adaptability, and unconventional thinking—can help you navigate career growth, break into new industries, and overcome challenges. You’ll leave with a fresh perspective and practical steps to start applying hacker strategies to your own life. Success isn’t about following a set path—it’s about knowing how to break in.

Talk 2: Hack Your Life: Unlocking Personal Growth with a Hacker’s Mindset

Hackers don’t wait for permission—they break in. They analyze, adapt, and execute. If one path doesn’t work, they find another. What if you approached your life the same way?

Most people see obstacles as stop signs. Hackers see them as puzzles to solve. The same mindset that allows hackers to break into systems can help you break through self-doubt, overcome limiting beliefs, and create opportunities where none seem to exist.

In this talk, Eva Benn, a security expert with years of experience in hacking, will teach you how to identify the weaknesses in your own limiting beliefs, exploit opportunities others ignore, and execute your next move with precision. Just like a hacker reverse-engineers a system to gain access, you’ll learn how to rewire your mindset, break old patterns, and create a strategy to get exactly where you want to go.

By the end, you won’t just understand how hackers think—you’ll start thinking like one, unlocking a level of confidence and momentum you never thought possible. If you want to level up, you need to break in.

Talk 3: The Adversary is Within: How to Outsmart Fear and Reach Your Full Potential

Nobody likes discomfort or pain, but these are the greatest catalysts for growth. The moments that push us to our limits are the ones that shape us the most. Yet, modern life is designed to keep us comfortable, avoiding challenge and uncertainty at all costs.

Eva Benn, a lifelong mountaineer and expert in security and hacking, knows that real transformation happens when we embrace discomfort instead of resisting it. In both hacking and mountaineering, success comes down to navigating the unknown, solving problems under pressure, and strategically overcoming obstacles. Just as hackers break into complex systems by thinking differently, climbers push past fear and limitations to reach new heights.

In this talk, Eva shares how the principles of hacking and mountaineering can be applied to career growth, personal resilience, and self-mastery. By reprogramming the way we approach fear and discomfort, we unlock new levels of strength, adaptability, and success. Because in the end, the best version of yourself isn’t found in comfort—it’s forged in the climb.

Title: The AI Survival Kit -- Staying Human (and Sane) in a Machine-Driven World

Abstract:

Everyone’s talking about AI—how fast we can adopt it, scale it, and automate everything. But few are asking the deeper question: What is this doing to us as humans?

In a world racing to integrate AI, overwhelmed by pressure to move faster, we risk burning out the very minds behind the machines. As the noise rises, we begin to lose something essential—our ability to think clearly, feel deeply, and lead with grounded presence.

In this keynote, Eva Benn will give you the hacker cheat sheet on staying sane in the world of AI—blending cybersecurity expertise with human psychology to teach you how to reverse-engineer your inner operating system to:

  • Combat cognitive overload and AI-induced burnout through conscious, grounded leadership
  • Reclaim your mental bandwidth with the Inner Security Stack—a framework for psychological clarity, emotional boundaries, and spiritual resilience
  • Build cultures of safety that protect not just data, but the dignity of those behind the keyboard

This isn’t about slowing down—it’s about optimizing your internal systems to lead with clarity and power. Because in a world run by machines, the best upgrade isn’t artificial intelligence—it’s a resilient, authentic you.

chris-cochranChris Cochran is a US Marine Corps veteran, cybersecurity leader, and strategist with deep expertise in threat intelligence, security operations, and executive leadership. As a Senior Advisor at the SANS Institute, Co-Chair of the Emerging Threats Summit, and Vice President at AKA Identity, he plays a pivotal role in shaping the future of cybersecurity education, strategy, and thought leadership. He has led intelligence, security, and marketing teams at Netflix, US Cyber Command, the U.S. House of Representatives, Mandiant, and the National Security Agency, bridging the gap between cybersecurity, business strategy, and innovation. With a unique ability to distill complex security challenges into clear, usable lessons, Chris is a sought-after speaker known for delivering engaging, insightful, and impactful discussions on emerging threats, security leadership, and our complex cyber landscape.

Talk 1: Threat Intel in 30 Minutes or Less – How to Think Like an Analyst

Cyber threats are becoming mainstream, but not everything you hear is a cause for concern. Even security teams are often overwhelmed with noise, so how can non-security professionals separate real threats from distractions? You are about to learn how to think like a threat intelligence analyst in just 30 minutes.

In this session, Chris Cochran will break down the core skills of a threat intelligence analyst, making it accessible to anyone, whether you work in marketing, HR, IT, or finance. Using a simple but powerful framework, attendees will learn:

  • How to quickly determine whether something is a real cybersecurity threat or just hype.
  • The core mindset and workflows that professional threat analysts use every day.
  • Practical techniques to help organizations cut through the noise and focus on what really matters.

No jargon, no endless security buzzwords. Just immediately usable skills to make better, faster security decisions. If you’ve ever wanted a crash course in cybersecurity analysis without the deep technical dive, this session is for you.

Talk 2: The Cybersecurity Universe – Seven Analogies That Will Change How You See Security Forever

Cybersecurity is admittedly a complex field. But the best way to understand it isn’t through code or complicated textbooks, it’s through stories and universal analogies. What if someone could explain cybersecurity in a way that anyone could never forget?

In this fun and mind-expanding talk, Chris Cochran will take you on a journey across the cybersecurity universe, using seven unforgettable analogies that make security concepts click instantly. From black holes and gravitational forces to superhero origin stories, these metaphors will help you:

  • Explain cybersecurity to executives, employees, and even kids in ways they’ll never forget.
  • Shift the way you think about cyber threats, resilience, and defense.
  • Walk away with engaging stories that make security approachable, relatable, and even fun.

If you’ve ever struggled to communicate security concepts or wanted a fresh perspective on the cyber landscape, this talk will give you a new lens that will stick with you forever.

Talk 3: The Leadership Gap: Why Cybersecurity’s Biggest Threat is Calling From Inside the House

Cybersecurity is more than just a technical challenge, it’s a leadership challenge. Every organization invests in tools, policies, and training to defend against external threats, but the biggest risk to security might be coming from within: ineffective leadership. When experts are promoted into leadership roles without the proper support, the results can be disastrous: low morale, communication breakdowns, and even security vulnerabilities that put the entire company at risk.

In this engaging session, Chris Cochran will unpack the hidden leadership gaps that can undermine cybersecurity efforts across an organization. Through real-world stories, some hard lessons and some victories, he’ll reveal the leadership philosophies and battle-tested strategies that can transform technical teams into high-performing security champions.

Whether you’re an executive, a manager, or an individual contributor, this talk will help you:

  • Recognize and address leadership blind spots before they impact security.
  • Develop the communication and decision-making skills necessary for cybersecurity leadership.
  • Build a culture where everyone, from the SOC to the C-suite, feels empowered to contribute to security.

Cyber threats evolve daily, but strong leadership is the constant that keeps organizations resilient. Join us to learn how to close the leadership gap and strengthen cybersecurity from the inside out.

Talk 4. Me, Myself, and AI: Staying Safe in the Age of Smart Machines

Abstract:

AI is everywhere. From helping us write emails and plan vacations to powering tools we use at work. But with great power comes great… risk. In Me, Myself, and AI, we’ll explore the hidden security challenges that come with living and working alongside artificial intelligence. This isn’t a talk for engineers or hackers—it’s for everyone who uses AI or plans to.

We’ll break down:

  • How AI is changing the cyber threat landscape (yes, attackers are using it too)
  • The surprising ways your personal data can be exposed through everyday AI tools
  • A simple, clear framework for staying safe and smart when using AI—at home or on the job

You don’t need to be technical to understand the risks—or protect yourself. You just need the right mindset, a few smart habits, and a peek behind the curtain at how this fast-moving technology really works. Whether you’re curious, cautious, or just trying to keep up, this session will leave you informed, empowered, and ready to navigate the age of AI with confidence.

angel-n-jordanI’m Angel Jordan, a cybersecurity education strategist and experienced speaker specializing in educating everyday people on protecting their digital lives. I'm excited about the potential opportunity to contribute to your network by delivering dynamic talks on security awareness. I offer engaging presentations that combine real-world insights with actionable takeaways.

Everyday Security Smarts: Tailored Tips for Staying Safe in a Digital World

Different groups, such as seniors, caregivers, busy professionals, and parents, face unique security risks. This engaging presentation offers customized strategies for safer digital habits, identifying scams, and protecting personal information. Attendees will leave with practical advice and the confidence to defend themselves—no technical expertise needed.

Session can be started with a general cybersecurity awareness trivia game (hosted on Kahoot) if desired.

Your Online Footprint: Protecting Your Digital Life for Today and Tomorrow

What you share online can follow you for years — and even outlive you. This powerful session combines digital safety with digital legacy planning, offering practical steps to manage your online presence, safeguard accounts, and control what happens to your data long-term. Attendees gain tools to take charge of their digital identity and protect their personal information now and in the future.

Raising Digital Defenders: A Caregiver’s Guide to Online Safety

Designed for parents, guardians, and educators, this engaging talk empowers caregivers with practical tools to protect children in today’s digital world. Attendees will learn how to recognize threats like social media scams, grooming, and gaming dangers — along with simple strategies to build safer digital habits at home. The session also provides conversation starters to encourage open, judgment-free discussions with kids about online safety. Blending relatable stories with actionable advice, this talk equips caregivers to raise informed, confident digital defenders.

All talks are designed to be engaging, accessible, and empowering, ensuring audiences leave informed and ready to protect themselves in today’s digital landscape.

testimonial bg testimonial mobile bg

Since working with Living Security, Cybersecurity Awareness Month is way, way easier than it used to be. Our team used to lose sleep every October. We see higher-than-expected engagement with the speakers and training provided in the Living Security CSAM program.

Alaina DeGregory, Enterprise Risk & Governance
Human Risk Management

highmark-health-logo

Learn more about Human Risk Management

View All Resources
Human Risk Management Ask Me Anything Series

Feature

Human Risk Management Ask Me Anything Series
link
What Is Human Risk Management? Why Should Cybersecurity Pros Care?

Living Security Blog

What Is Human Risk Management? Why Should Cybersecurity Pros Care?
link
Human Risk Management Maturity Model

Page

Human Risk Management Maturity Model
link

Why Living Security

Fortune 500 companies trust Living Security to deliver human risk management by using existing data to identify risky employees or teams and target immersive 
training to those who need it most. This approach keeps organizations ahead of breaches and enables them to track their progress toward a better security posture. This proactive, automated, efficient approach saves resources while keeping employees and data safe.

Schedule a meeting today and let's get started.

 

 

 

 

# # # # # # # # # # # #