Bryce Austin is the CEO of TCE Strategy and a leading voice on emerging technology and cybersecurity issues. With over 10 years of experience as a Chief Information Officer and Chief Information Security Officer, Bryce actively advises the boards of companies in industries as diverse as financial services, retail, healthcare, technology and manufacturing industries. He was the CIO and CISO of Wells Fargo Business Payroll Services from 2004 to 2012, and a Senior Group Manager at Target Corporation during the 2013/2014 PCI data breach.
Bryce holds a CISM certification and is known as a thought leader, cybersecurity expert and internationally-recognized professional speaker. He started his technology career on a Commodore PET computer and a cassette tape drive.
When Bryce isn't spending time with his wife and two young sons, he spends his weekends as a high-speed track driver and coach at venues across the USA. He has over 15 years experience, and has driven cars as diverse as a n 85 horsepower Saturn to a 650 horsepower Porsche 911 Turbo. He has had well over 100 students, none of whom have died while under his instruction.
As a CISO and a public speaker, it takes a lot to dazzle me with content, and even more to dazzle me with presentation style. Bryce does both. His keynote presentations are built from real-world experience. They deliver meaningful and actionable takeaways that will help both small companies just beginning their cybersecurity journey and F500 companies with established cybersecurity teams alike.
My event company has scheduled Bryce in several of our cities. Raleigh was one of the last ones he did and my first chance to see him. Normally, I'll give a speaker a few minutes but there are always other things to do and prepare for. He came on stage... "I was there, in the room, when it happened?" He had me. He spoke for the next 50 minutes and was articulate, knew his topic and spoke with authority. Cybersecurity is a key topic that won't go away and we now have an ace up our sleeve. Bryce Austin - if you aren't using him, you have no idea what you're missing.
Bryce has a unique way of communicating complex topics in a way that is easy to understand and makes sense! He possesses that rare combination of being an IT professional who can publicly speak comfortably and confidently in front of large audiences. Bryce demonstrates a passionate command of his subject matter and leaves you wanting to know more.
Assessing your company’s cyber secruity risk
How proper communication with the C-suite will lead to good decision around technology and cybersecurity
How proper communication with the C-Suite will lead to good decisions around technology and cybersecurity.
There are three reasonable things to do with any risk a business faces: accept it as-is, mitigate down to an acceptable level, or insure against it. Unfortunately, many companies see risks as complex as cybersecurity to be so challenging that they choose a 4th option: sticking their head in the sand and hoping that nothing bad happens.
My presentation will teach business leaders:
- How to assess the cyber risks in their industry relative to other business risks.
- How to make rational decisions on which risks to accept, which to mitigate, and which to insure against.
- How to make presentations to C-suite executives on technology topics, even if the presenter is not a technologist as their profession.
This presentation will focus on ideas to engage the hearts and minds of executives on topics that are too often overlooked in board room discussions.
Prospective from inside a major retail cybersecuity breach
Lessons learned from immovable objects, the Target breach, how to win at auto racing and other cybersecurity topics
Lessons learned from immovable objects, the Target breach, how to win at auto racing and other cybersecurity topics.
Discussion: Automobile racing goes from smooth sailing to out of control in a very short timespan. So does cybersecurity. Learn from someone that had a "resume generating event" due to one of the largest data breaches of the past several years, and what could have been done beforehand to prevent the breach from ever taking place. The budget required to bring necessary focus to technology security can be elusive, and the user experience is often in opposition to security "best practices."
Your audience will learn:
- Real world lessons learned from major recent cybersecurity breaches and how they could have been prevented
- How to respond to a cybersecurity incident from a non-technical standpoint: public relations, law enforcement involvement, and contract negotiation with vendors
- How to develop an emotional connection with teams in times of crisis
- How to make new regulations into a competitive advantage for your company
- What new technologies offer to combine an improved user experience with tightened security
The Unintended Consequences of the Internet of Things
Let’s talk about how your company, your products and your reputation can be impacted, both negatively and positively by the Interent of Things.Learn More
The Unintended Consequences of the Internet of Things
Let's talk about the security of the Internet of Things, or IoT. The devices are everywhere...
From garage doors to thermostats to coffee makers to baby video monitors to security systems, we are living our lives with more connectivity than ever before. This raises some important questions: Questions on reliability. Questions on hacking vectors. Questions on how to add value to our lives with these devices without giving up security in our own homes. Let's talk about the recent attack that took down large parts of the Internet on 10/21/2016. Let's talk about the Nest thermometer glitch that left families without heat in their homes. Let's talk about the Russian website that posted babycams that were still set on their default password. Let's talk about how big business could take advantage of an IoT "army" of devices in ways that would make the VW diesel hack look like a ticket for jaywalking.
Let's talk about how your company, your products, and your reputation can be impacted, both positively and negatively, by the Internet of Things.
Thanks For Your Message
We'll get back to you shortly.