READ | WATCH | USE | ABOUT | TALKS

 

Sports and Entertainment

 

Why can’t I keep my jersey? – FIFA’s Mismanagement and Corruption in Central America

 

Description: A first-hand account of conditions and events leading up, and contributing, to the highly publicized FIFA scandal of 2015 from the perspective of a player on one of the National and Olympic teams.

Duration: 30-45 minutes

Audience: teens to adults; all levels

 

Backstreet to the Kremlin – A journey behind the broken Iron Curtain

 

Description: A first-hand account of an independent band’s voyage to Russia with a multi-platinum music group; how a nascent turn of the century social media landscape allowed them to build a following large enough that they almost caused a shutdown of Sheremetyevo International Airport; and how free CDs and USB MP3 players may have averted war.

Duration: 30-45 minutes

Audience: teens to adults; all levels

 

Digital Self-Defense

 

Digital Self-Defense for All

 

Description: A brief seminar on basic tips, tricks, and methods to proactively protect yourself against 21st century digitally enabled threats. This goes beyond cybersecurity and addresses the convergence of real-world and virtual identity and existence.

Duration: 30-45 minutes

Audience: teens to adults; uninitiated to novice

 

Digital Self-Defense for Teens

 

Description: A brief seminar covering topics relevant to teen safety in the 21st century. Attendees are introduced to threat actors which leverage previously unavailable tools to enable old scams targeting teens. The goal is not to prevent teens from using social media, but to educate them as to the relevant dangers and equip them with tools to protect themselves.

Duration: 30-60 minutes

Audience: teens to adults; uninitiated to novice

 

Welcome to 1984 Series

 

Welcome to 1984: Ubiquitous Technical Surveillance (UTS) for All

 

Description: A brief introduction to the concept of Ubiquitous Technical Surveillance (UTS), the technologies which enable it, and examples of how it is, and will continue to be, an inextricable part of our lives.

Duration: 1 hour

Audience: adults; uninitiated; public or private sector

 

Welcome to 1984: A Survival Guide to the 21st Century

 

Description: A wide overview to the technologies that underlie Ubiquitous Technical Surveillance (UTS), their applicability across a variety of industries, the vulnerabilities they introduce, the threats they enable, and the resulting consequential effects on one’s personal life.

Duration: 2 hours

Audience: adults; uninitiated to intermediate; public or private sector

 

Welcome to 1984: How to Achieve Privacy as a Public Figure in the 21st Century

 

Description: An interactive session aimed at conveying the most significant 21st century vulnerabilities and threats facing notable individuals, their professional circles, their friends, and their families. Attendees will be introduced to practical commercially available tools and open-source methods by which to mitigate those threats and minimize future vulnerabilities. Topics include secure personal communications, personal information protection, public persona management, and more.

Duration: 1-2 hours

Audience: adults; executives, celebrities, athletes, artists, lawyers, government officials, etc.; uninitiated to intermediate; public or private sector

 

Welcome to 1984: Travel Edition

 

Description: A deep dive into the consequential effect of Ubiquitous Technical Surveillance (UTS) on personal and group travel. This is ideal for music tour organizers, sports teams, movie production crews, professional wrestling promoters, large delegations, etc. This is how you ensure stalkers and other unwanted individuals don’t show up at your hotel.

Duration: 2-4 hours

Audience: adults; novice to advanced; public or private sector

 

Welcome to 1984: A Digital Hitchhiker’s Guide to the 21st Century

 

Description: A deep dive into the concepts and technologies that underpin 21st century existence such as Ubiquitous Technical Surveillance (UTS), generative artificial intelligence (AI), the data ecosystem, personal privacy, ubiquitous data collection (UDC), etc.; the vulnerabilities they create, the threat actors they empower, and mitigation tools/strategies/methodologies which can help attendees survive, and even thrive in the 21st century.

Duration: 12-16 hours (spread out across 2 days)

Audience: adults; novice to advanced; public or private sector

 

 

Welcome to 1984: Artificial Intelligence (AI) Meets Ubiquitous Technical Surveillance (UTS)

 

Description: An exploration of the challenges and opportunities in cybersecurity posed by the convergence of AI and UTS.

Duration: 45 minutes

Audience: adults; intermediate to advanced; public or private sector


This is a personal page that is not affiliated with, representative of, or endorsed by, any company, government, organization, or third-party.