Stacey M. Jenkins, M. Psych

Stacey M. Jenkins, M. Psych

Stacey Jenkins, Jenkins - Motivational Speaker

SpeakerMatch

Crisis Intervention Expert and survivor.

My passion is to integrate people skills, psychology, and personal testimonies, using methods associated with Oculesics (the study of body language), Psychological profiling and Behavioral observation.

Fee Range: Open
Travels from Fort Wayne, IN (US)

For more information about booking Stacey M. Jenkins, M. Psych, visit
https://www.speakermatch.com/profile/CruxConception

Or call SpeakerMatch at 1-866-372-8768.

Stacey M. Jenkins, M. Psych
Stacey Jenkins, Jenkins - Motivational Speaker

CRUX CONCEPTION

Crisis Intervention Expert and survivor.

My passion is to integrate people skills, psychology, and personal testimonies, using methods associated with Oculesics (the study of body language), Psychological profiling and Behavioral observation.

Fee Range: Open
Travels from Fort Wayne, IN

Affiliations:
Stacey M. Jenkins, M. Psych - Motivational Speaker

Stacey M. Jenkins, M. Psych

CRUX CONCEPTION

Crisis Intervention Expert and survivor.

My passion is to integrate people skills, psychology, and personal testimonies, using methods associated with Oculesics (the study of body language), Psychological profiling and Behavioral observation.

Fee Range: Open
Travels from: Fort Wayne, IN

Affiliations:

For more information about booking Stacey M. Jenkins, M. Psych,
Visit https://www.speakermatch.com/profile/CruxConception/
Or call SpeakerMatch at 1-866-372-8768.

We talk Cyber Security But: What about Protecting your company's data, by psychologically evaluating potential Espionage and Spy activity?
Corporate Security; The Psychological Factors of Espionage and Spying

•The audience will be engaged when we will focus on the psychological motivations, to identify the emotional precursors, which lead to CORPORATE ESPIONAGE and SPYING. Company’s today should be equipped to safeguard administrative tools for their company to complement its data security effectively. The Board of directors and its administration treat the protection of their data to warrant the risk of a breach of data, and this includes PERSONNEL. In today’s world of CYBER-RISK and CYBER-SECURITY, we sometimes forget about the individuals, or dare I say SUSPECTS behind the BREACH, ATTACH or THEFT. We neglect these individuals until it is too late, and the damage has been done. Individuals such as: EDWARD J. SNOWDEN The media hails him as a “whistleblower,” but MR. SNOWDEN stole DATA belonging to the NSA and disseminated said data to individuals with unauthorized access. •William Binney (NSA) •Jose Ignacio Lopez (GM) Chief of productions accused of corporate espionage. •Steven Louis Davis (Gillette) Pled guilty to theft of trade secrets. •Patricia Dunn (Hewlett-Packard) Involved in a spying scandal. •Ross Klein and Amar Lalvani (Starwood Hotels) downloaded confidential Starwood information to use later at Hilton. •Combining open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, and SPYING. •The presentation/workshop will give participants innovative insights to conduct psychological field profile/assessments and verify potential risk factors. •The presentation/workshop will outline the psychological aspects regarding a Data Breaching and possible prevention Data Loss. •Furthermore, this presentation/workshop will demonstrate that with the proper preparation, one can evaluate an individual whose psychological profile dictates that they retain the potential to perform CORPORATE ESPIONAGE. •We talk about protecting data; we talk about outside forces seeking to obtain our data by unconventional means. •My Presentation/Workshop will speak about PROTECTING or DATA that is stolen from trusted individuals within. •One of the most severe threats facing our Businesses and Corporations is the threat of a DATA BREACH. •Regardless of the motivation, nature of their associated tactics, techniques, and procedures; the breach in DATA pose a severe challenge to the existence of your organizations future. •The persistent nature of this threat and the expectation that it will continue to rank as the most likely scenario; Board executives and administrators will need to contend with soon. •The goal of my presentation is to inform Executives/Administrators key signs to help reduce/prevent DATA loss using corporate espionage and theft. INTENDED AUDIENCE: *Security Systems Integrators *IT and Cybersecurity Leaders *Integration Engineers *Product Developers and Manufacturers *Senior Technology Business Executives *Security Specifiers and Engineers *Security Consultants *CSOs/CISOs/Security Leadership *Anyone who is responsible for the cybersecurity of integrated security systems! PREREQUISITE KNOWLEDGE FOR ATTENDEES: Good observation skills, Communication skills, and People skills