Cyber Security Expert James Lyne

A self-professed 'massive geek' and renowned cyber security expert, James Lyne is an information security speaker committed to educating those outside of the industry on security threats and best practice. Energetic, passionate, and charmingly nerdy, he has become a leading keynote presenter by maximizing the impact of his security expertise through engaging presentations.

Using live demonstrations, showing how cyber criminals operate in the real world, James can involve and inspire an audience whether they are a group of tech wizards or your average computer user. One keynote can convert forbidding tech jargon in to human language with the next sharing his technical expertise to those with extensive background knowledge.

His passion to make cyber security accessible and interesting has led to James founding his company Helical Levity, a high-end security research firm developing cyber industry education tools that identifies and develops new talent. His roles as Global Head of Security Research at Sophos and instructor for SANS institute means that keynotes are constantly updating and evolving.

Previous appearances include giving multiple TED talks, including the main TED event and appearing on a long list of national TV programs such as CNN, NBC, BBC News and Bill Maher.

Roles: Head of Research and Development and CyberStart Creator at SANS Institute, Global Research Advisor at Sophos, Founder and Director of Helical Levity.
Specialist areas: Cyber security, cryptography, malware, phishing, social engineering, Internet and new media, technology innovation, history and future of computer security and IOT security.
Email:

Hayley Mcloughlin bookings@jameslyne.com

Social media:

Twitter - @jameslyne

LinkedIn - jameslyne

NSA

Interviews & Keynote Speaking Presentations

With James' ongoing research and cyber security constantly evolving, talks and keynotes are not limited to the below options. James can fine-tune talks around a bespoke brief or current affairs in the security world. However, these are four popular presentations that are widely requested and will get your audience thinking about their security habits.

Hacking with Words and Smiles

If someone put an invoice on your desk with "pay me" written in big red letters across the front, do you think you would consider who it was from before you opened your wallet? What if someone came up to you in the street and said there was someone stuck in space and they needed you to send them some money to get back? You would laugh and turn a blind eye to it. So why don't we apply our security knowledge of the real world to our digital personas?

In this keynote, James gives you the opportunity to see these issues for yourself with live cyber security demos and explains why everyone is a target to modern day hackers. High quality social engineering is being used to access more of your information than you would think so maybe it's time to move away from the laughable stereotypes and open our eyes to the fact that cyber crime has become more convincing than ever before.

Cyber Security Basics - Preventing Your Business from Being Breached

Are your devices, your employees and your intellectual property open to attack? If you're liberally connecting to hotspots offering free internet and not taking additional steps to secure yourself, then the odds are you are vulnerable to hackers and it's your own fault.

Our general behavior with mobile devices is to connect first and worry about it later but it is exactly this careless behavior that is making life easy for hackers and lining their pockets. The Cyber Security Basics keynote will open your eyes to how much information we are really giving away and what we can do to make sure we are protected all the time.

Cyber Security and the Internet of Things

Think it's just governments, large enterprises and high net worth individuals that are vulnerable to a cyber crime? Think again. In today's wired and wireless world, simply owning a refrigerator, baby monitor or CCTV camera makes you a target for hackers.

With the internet of things market exploding and nearly all home gadgets being connected wirelessly, the door for hackers has become a lot easier to unlock. In this keynote, along with live IoT hacking demos, James will discuss how your wireless TV is enough of a reason for a cyber attack to be launched on you and what you need to do to make sure you are safe and secure.

Reverse Engineering Ransomware

With our lives becoming increasingly intertwined with the internet, it is not a question of if but when you may become victim to a cyber crime. Hackers have become experts at finding weak spots in your security and ransomware is quickly becoming one of the most common ways to be targeted.

In this program, learn how ransomware is becoming a massive problem for business, small and large, and the common ways of becoming infected with malicious code. Bringing these issues to life with real ransomware demos, James will chat you through exactly how these hackers find ways to make you trust them and hand over your hard earned cash.

Showreel

Working with James Lyne and his team has been terrific. He recently presented to a long-time customer of mine - a group that has had many different speakers, from many different backgrounds, over the years. It was an event for their senior level executives, and James was diligent in his preparation. He ensured that he understood their issues and concerns, and then tailored a presentation that hit it out of the park. The client was thrilled, and reported back that - "James was GREAT! Very high energy and entertaining - everyone enjoyed him and the topic!".

Keith Lambert, Lambert Speaker Alliance, LLC.

Contributor for

Press Kit

Title:

Cyber security specialist

Short bio:

James Lyne's cyber security expertise is frequently called upon to inspire audiences of all technical backgrounds to take cyber security seriously. Energetic, passionate, and charmingly nerdy, he has become a leading keynote speaker on cyber security and cyber crime.

Social:

@jameslyne on Twitter, or LinkedIn

Photos:

Photo
Square, 1000x1000px, JPEG
Photo
Portrait, 900x1500px, JPEG

Booking Form

JL