[x]

CLIENT LOGIN: ADD SPEAKER TO FOLIO

Please enter your username and password below to add this speaker to your folio.


Tabs

Tyler Cohen Wood is an expert in social media and cyber issues.

She is a senior officer and a cyber branch chief for the Defense Intelligence Agency (DIA) within the Department of Defense (DoD) where she makes decisions and recommendations significantly changing, interpreting, and developing important cyber policies and programs affecting current and future DoD and Intelligence Community policies.

With keen insight and an expert’s knowledge, she offers real life answers to questions about online personal and business security, and demonstrates through real world examples that any company is only as safe as every employee who uses its technology.


Tyler Cohen Wood Speaker Videos Back to top

Presentation to Association of Meeting Professionals


With the rise of social media and digital devices, people face an ever- increasing risk of hackers, cyber predators, and manipulation. Tyler reveals how anything you and your children post is permanent and can be used against you.

She explains how recruiters and other organizations piece together your social media postings to create a profile of you, emphasizing that once you know their methodologies, you can make the system work to your advantage. “You can easily put together a target. You can really understand a person based on their social media presence,” Tyler comments on the good aspect of this for businesses. “But the bad news is that they can do that to you. The good news is that once you understand how to control it you can make it appear how you want it to appear.”

How to Manage your Online Identity


Tyler Cohen Wood speaks on the consequences your online persona could have on your career. She details that recruiters not only examine the superficial content of what you’ve posted, but your habits and purpose behind posting.

She surveys various stereotypes of posters that recruiters often group potential job candidates under, including the one-upper, who tries to outdo the posts of others. “It can seem innocuous,” she comments, “but remember when you’re putting these puzzle pieces together the perception a recruiter’s going to have is this person probably isn’t going to work well in a team and may have authority issues.”

Speech



Speeches / Speaking Engagements Back to top


A well-known authority for her work with digital forensics and Cyber Intelligence, Tyler Cohen Wood has presented at conferences across the country. She demystifies the cyber world, illustrating with clear entertaining examples how virtual activity can make an erasable impact on real life.

Tyler’s presentations focus on how businesses can prevent hacking and cyber crime in order to avoid unresolvable damages. She is also a specialist on online profiling, showing organizations how they can take advantage of this tool to hire the right people. On the other side of digital profiling, Tyler gives individuals the secrets to building a positive online persona that companies will want to hire.

Shielding your company’s tradecraft, intellectual property, corporate image, and company assets

In today’s fast paced business world, working away from the office using mobile devices for telecommuting and productivity has become mainstream. But how do we know what confidential financial data, tradecraft or intellectual property this technology might be unknowingly giving away to corporate spies, hackers or data marketers? This presentation will teach you and your employees how to safely and securely protect company confidential information while using mobile devices both inside and outside the workplace, and also how to protect corporate financial intellectual property and trade secrets that may be at risk through social media and mobile device use. This presentation will also teach how to protect your corporate image and assets.

 

Protecting your privacy, managing your company’s online image, hiring right, reading deception in the online domain, and thwarting the insider threat

There’s only so much you can tell about a potential hire in an in-person interview. Often a person’s online profile gives a much better idea of who they are. This presentation will teach human resources professionals, recruiters, managers and executives how to use social media to conduct reconnaissance on potential candidates and current employees and read deception in social media, resumes, emails and other communications. I will demonstrate how these techniques can be used to always hire the right person and thwart potential and existing insider threats before they become serious.

 

Take Control: Protecting your privacy, managing your online image and learning to read deception in the online domain

In this presentation, you will learn how to shield your personal information and safely and successfully navigate the online world, protect yourself, your children, your privacy and your communications, and learn to vet if someone is who they claim to be online. You will also learn how to how to read deception and lies in other people’s online identities and posted content, such as social media, emails, reviews and dating profiles. While learning the skills for personal protection, you will also learn how to apply these same techniques to your professional life, clean up and leverage your online image for social and career success, and develop beneficial relationships online. Whether you’re a seasoned professional, a recent graduate entering the work force or a working mother concerned about her children’s safety, this presentation will provide valuable information and tips to ensure security and success online.





* Please note that while this speaker’s specific speaking fee falls within the range posted above (for Continental U.S. based events), fees are subject to change. For current fee information or international event fees (which are generally 50-75% more than U.S based event fees), please contact us.

Share

  • Share on Twitter
  • Share on LinkedIn
  • Share on Facebook
  • Share on Google Plus

Top25 Speaker Voting

Tyler Cohen Wood needs 21 vote(s) to make it into the Top 25 speakers on Speaking.com!


Speaker Booking Tip

“Tip: some speakers might provide one of their popular book titles as a free gift to your audience. ”

For Event Planners



Keynote Speaker Booking Toolkit.
Booking a Celebrity Speaker.
How to Find and Book the Right Speaker.
Google+ Event Planning Forum.
Tips for International Clients Booking U.S. Based Speakers.


Similar Speakers

  • Dr. Jennifer Golbeck Dr. Jennifer Golbeck is a pioneer in the field of social data analytics, online security, and privacy systems. The military, government, and business industry have…
  • Winn Schwartau Winn Schwartau, one of the country′s leading experts on information security, infrastructure protection and electronic privacy is often referred to as "the civilian architect of…
  • Bill Toliver Bill Toliver grew up in the developing world with a deep understanding of the real work required to make change. He spent 20 years creating…

SPEAKING.com Testimonials

KPMG, Europe

Working with your speakers agency on our training projects during the year proved to be a great business choice. I felt that my account reps were always around when I needed them, willing to help and listen. They showed flexibility when it was required and were reliable and dependable.

KPMG, Europe



About SPEAKING.com

Established in 1994, we are exclusive agents for some of the world's leading experts, celebrities and professional speakers.

We offer event planners a fully staffed speaker logistics planning team, plus a personal SPEAKING.com Account Executive – a knowledgeable and trustworthy partner. We guarantee your satisfaction with your speaker and a smooth booking process.

Contact us today to book your favorite speaker.



Catching the Catfishers: Disarm the Online Pretenders, Predators, and Perpetrators Who Are Out to Ruin Your Life

In her book, Catching the Catfishers: Disarm the Online Pretenders, Predators, and Perpetrators Who Are Out to Ruin Your Life she explains how to safely and successfully navigate the online world, protect yourself, your children, your privacy and your communications. She also describes how to polish and leverage your online image for social and career success, develop relationships online, and learn to detect if someone online is who they claim to be. Wood also explains how to recognize deception and lies in other people’s online identities and posted content, including social media sites, emails, résumés, reviews and dating profiles.

Shielding your company’s tradecraft, intellectual property, corporate image, and company assets

In today’s fast paced business world, working away from the office using mobile devices for telecommuting and productivity has become mainstream. But how do we know what confidential financial data, tradecraft or intellectual property this technology might be unknowingly giving away to corporate spies, hackers or data marketers? This presentation will teach you and your employees how to safely and securely protect company confidential information while using mobile devices both inside and outside the workplace, and also how to protect corporate financial intellectual property and trade secrets that may be at risk through social media and mobile device use. This presentation will also teach how to protect your corporate image and assets.

 

Protecting your privacy, managing your company’s online image, hiring right, reading deception in the online domain, and thwarting the insider threat

There’s only so much you can tell about a potential hire in an in-person interview. Often a person’s online profile gives a much better idea of who they are. This presentation will teach human resources professionals, recruiters, managers and executives how to use social media to conduct reconnaissance on potential candidates and current employees and read deception in social media, resumes, emails and other communications. I will demonstrate how these techniques can be used to always hire the right person and thwart potential and existing insider threats before they become serious.

 

Take Control: Protecting your privacy, managing your online image and learning to read deception in the online domain

In this presentation, you will learn how to shield your personal information and safely and successfully navigate the online world, protect yourself, your children, your privacy and your communications, and learn to vet if someone is who they claim to be online. You will also learn how to how to read deception and lies in other people’s online identities and posted content, such as social media, emails, reviews and dating profiles. While learning the skills for personal protection, you will also learn how to apply these same techniques to your professional life, clean up and leverage your online image for social and career success, and develop beneficial relationships online. Whether you’re a seasoned professional, a recent graduate entering the work force or a working mother concerned about her children’s safety, this presentation will provide valuable information and tips to ensure security and success online.


Presentation to Association of Meeting Professionals


With the rise of social media and digital devices, people face an ever- increasing risk of hackers, cyber predators, and manipulation. Tyler reveals how anything you and your children post is permanent and can be used against you.

She explains how recruiters and other organizations piece together your social media postings to create a profile of you, emphasizing that once you know their methodologies, you can make the system work to your advantage. “You can easily put together a target. You can really understand a person based on their social media presence,” Tyler comments on the good aspect of this for businesses. “But the bad news is that they can do that to you. The good news is that once you understand how to control it you can make it appear how you want it to appear.”

How to Manage your Online Identity


Tyler Cohen Wood speaks on the consequences your online persona could have on your career. She details that recruiters not only examine the superficial content of what you’ve posted, but your habits and purpose behind posting.

She surveys various stereotypes of posters that recruiters often group potential job candidates under, including the one-upper, who tries to outdo the posts of others. “It can seem innocuous,” she comments, “but remember when you’re putting these puzzle pieces together the perception a recruiter’s going to have is this person probably isn’t going to work well in a team and may have authority issues.”

Speech