As both a Cybersecurity expert and professional Nerd-to-English translator, Nick takes the technologically complex and makes it easy for everyone to understand. In his quest to secure one hundred thousand networks before he retires, his goal is to educate and entertain while making your life easier and more secure!
An expert in cybersecurity and network infrastructure, Nick Espinosa has consulted with clients ranging from the small business owners up to Fortune 100 level companies. Nick has designed, built, and implemented multinational networks, encryption systems, and multi-tiered infrastructures as well as small business environments. He is passionate about emerging technology and enjoys creating, breaking, and fixing test environments.
As a member of the Board of Advisors for both Roosevelt University's College of Arts and Sciences as well as their Center for Cyber and Information Security and Bits N' Bytes Cybersecurity Education, Nick helped to create an NSA certified curriculum that will help the Cybersecurity/Cyberwarfare community to keep defending our government, people and corporations from Cyber threats globally. In 2017 Nick was accepted into the Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs and technology executives, and is a regular contributor of articles which are published on forbes.com as well as smerconish.com.
Award winning co-author of the bestselling cybersecurity book "Easy Prey," TEDx Speaker and host of The Deep Dive nationally syndicated radio show on various stations, Nick is known as an industry thought leader and sought after for his advice on the future of technology and how it will impact every day businesses and consumers. Nick is an accomplished speaker and regularly speaks to audiences about Cybersecurity, technology and business management.
The Five Laws of Cyber Security
Based off Nick Espinosa’s TEDx Talk and Forbes article of the same name, this presentation will dive into issues that non-technical users face and how we, as the technical community, can help create an easy framework of understanding for those we help in order to ensure their security. The Five Laws of Cybersecurity are designed to make everyone think and challenge that technology they use every day!WHAT YOU WILL TAKE AWAY FROM THIS SESSION:
• Just how prolific hacking and data exposure is
• Why we need to reframe our thinking and approach to technology
• Real life examples of serious flaws in products we know and love
• Five easy to remember laws that will make you safer in whatever you do
Hacking the Hackers: Corporate Security Done Right
A deep dive into the threats that corporations and governments face such as Dark Web exposure, types of hacking attacks and a look into the foundational concepts of how to create a well defended organization. Includes live demonstrations of hacking vulnerabilities!
Protecting the Future
An examination of the threats that our children and families face and how to protect and defend those we hold most dear. Includes live demonstrations of hacking vulnerabilities!
The Terrorist in Your Toaster
All things Internet-of-Things. The threats and vulnerabilities of IoT as well as how to properly build defenses to keep them safe and secure. Includes live demonstrations of hacking vulnerabilities!
A brief overview of the current threats that we all face today and then a deep dive into the threats of tomorrow and what the Cybersecurity community is doing to combat them. Includes live demonstrations of hacking vulnerabilities!
Exploiting the Masses
An in depth look at how hackers exploit human trust for gain and why we, as humans, are so susceptible to fraud and malfeasance. Includes live demonstrations of hacking vulnerabilities!
Creating the Blockchain
This presentation is all things Bitcoin and cryptocurrency related, from the pros and cons to how it keeps itself secure.
Cyberwarfare & Cyberterrorism 101
A look into state sponsored hacking and how it’s shaping our geopolitical future. Includes live demonstrations of hacking vulnerabilities!
We can help ideate, source and book speakers that aren't on our website, too. Leave an inquiry or call us at