Michael Goetzman has lectured at conferences, user groups, or in the community over 35 times. If you happened to be in the audience and are seeking additional details on any of the below content, please contact him for his slides. Michael is also available to speak on these topics or a new emerging topic upon request.
ISACA Milwaukee Symposium - The Dark Fate of IoT Security v2 - Embedded IoT Devices and application ecosystems on September 23, 2020
MSOE - IoT Security - Dark Fate - How companies can get caught up in securing internet of things devices on December 5th, 2019
The Israeli-Palestine Conflict/Crisis Past, Present & Future Dual-Narrative Discussion at Fox Point on December 3, 2019
CypherCon 4.0 (2019) "Things hidden in plain sight" opening and closing ceremony - 1000 attendees
Guest on the CypherCon 0 Podcast with Kyle Puckhaber on March 3, 2019 - Check it out at podcast.cyphercon.com or on your favorite podcast app.
"The Dark Dark Web" In Fox Point on February 3, 2018 - Discussion on what parts of the internet hide what kind of secrets.
CypherCon 3.0 (2018) "Telephreaks" opening and closing ceremony, 700 attendees
“Know Thyself” Microsoft Community Connection at the Microsoft Chicago regional office on November 3, 2017
“Security Keynote Panelist” at Technology Hub Conference in Appleton, Wisconsin on September 28, 2017
“Manufacturing and Cybersecurity in a Digital Era” at the OnRamp Manufacturing Conference in Milwaukee, WI on September 6, 2017.
The 15th Annual Wisconsin IT Symposium as a Security Panelist in Milwaukee, WI on May 4, 2017.
Cyber Security Expert Panel: Your Best Defensive & Offensive Strategies to Reduce Risk & Secure the Enterprise.
CypherCon 2.0 on March 30 & March 31, 2017 – Host and Organizer-Second Wisconsin hacker conference with over 520 attendees: CypherCon 2.0 – Education: Shaping children for the future of hacking, organized curiosity and technology guidance. Find out more at http://cyphercon.com
The future State of Information Security at NWTC – Marinette on March 14, 2017 - Discussion with students from my childhood town on where security is present and where security is going in the future.
Guest on Open Source Security Podcast on Monday, December 6, 2016 Discussion on all things CypherCon! Check it out: http://www.opensourcesecuritypodcast.com
Security Panelist at Marquette’s Cyber Security Colloquium on Friday, October 28, 2016 - Information: Agenda beneficial to organizations that have responsibility for educating the general public, while others educate customers and employees or students about cyber security. For policy makers, educators, and security professionals who often have dual responsibility for technology and administration. The focus of the panels remains the same. lecture after keynote: Lt Governor, Rebecca Kleefisch
Security Panelist at WTA’s (Wisconsin Technology Association) on Friday, October 21, 2016 The WTA is a nonprofit organization
Department of Homeland Security: IMPACT focus group industry speaker in Madison, WI on Thursday, September 29, 2016. Industry representative on Cyber Security R&D data needs that the Department of Homeland Security: IMPACT (Information Marketplace for Policy and Analysis of Cyber-risk & Trust) IMPACT accommodates a wide variety of data types and enables data discovery, analytics, visualization and integration by international researchers in industry, academia and the government.
BioHacking Village Lead at DEF CON in Las Vegas, NV @ on August 4th-7th, 2016: The DEFCON BHV focused on the two major areas of biohacking: human augmentation and genetic engineering. We also showed interested in quantified self or health related content! Individuals/Companies presented demos and prototypes, injections, finished products, with the content being compelling and clearly worth the audience’s time.
The 14th Wisconsin IT Symposium as a Security Panelist in Pewaukee, WI on Wednesday, May 4, 2016. - Cybersecurity 2016 & Beyond: The New Normal
Technology continues to evolve as the network perimeter evaporates into the cloud and electrons become the new global currency. Enterprises are continuously challenged by an elusive and morphing cyber threat from bad actors and opportunists who use the vulnerabilities in our Information Systems as weapons. From fraudsters to nation state-sponsored cyber warfare, these attacks come at us from every direction as the ingenuity of criminal minds seek new and creative ways to infiltrate our valuable information resources and engage in cyber warfare against our businesses and our way of life–compromising our financial and national security. We are bombarded daily with newspaper headlines and digital media reports about the latest cyber security breach. This breakout session will allow our panel of Executives the opportunity to share hard won experience and best practices with the Wisconsin IT Symposium audience.
Tribeca Film Festival – Representing critically acclaimed TV Series Mr. Robot & DEF CON in New York on Thursday, April 14-April 19, 2016. Discussing to thousands of attendees regarding traditional ‘hacking’ and niche topic demonstrations on biohacking: Genetic Procurement & Privacy
CypherCon 1.0 (2016) – "Theme: Espionage" Opening and Closing Ceremony at Pfister Hotel & Safe House in Milwaukee on Friday, March 11, 2016. First ever Wisconsin hacker conference: CYPHERCON, did the introduction and guidance. find out more at http://cyphercon.com
IBM’s Qradar Users Group Meeting at Kohl’s Innovation Center on Wednesday, October 28, 2015. Event involving my assistance with an information security colleague on a customer case study regarding IBM Qradar’s network hierarchy. Our traffic data represented a local midwestern chain of hospitals. Also at the event SEIM reporting was discussed.
EC Council’s annual conference: “Hacker Halted – Cyber Pandemic” in Altanta, Georgia on September 17th, 2015 - Abstract: You were warned in 1997 that a not-too-distant future was approaching. This dystopian future is here now due to rapid technological advances, much quicker than we initially imagined. These breakthrough DNA technologies are exposing your deepest darkest secrets. Who can see this information? What will they do with this information? Little does anyone know they are only one data breach away from public exposure.
“Social Implications of DNA Acquisition & Storage” at DEF CON in Las Vegas, NV @ on August 6th-9th, 2015 - Abstract: The advent of rapid ‘Next-Generation’ DNA sequencing methods has greatly accelerated biological and medical discovery steering society into a paradigm shift, the genomic era, of personalized medicine. This trend promises an affordable insight into your personal genome potentially giving individual’s personal advantages. What information is hidden within a strand of DNA and what are implications of accessing this data? Will these rapid advancements enhance humanity without sacrificing ethics and personal exposure? Can society overcome challenges stemming from emerging technologies such as massive internet accessible databases and cloud storage?
Co-founder DEFCON's Biohacking Village (2015) - One of three individuals to plan and select speakers for DEFCON's first Biohacking village.
“GATTACA – Final Warning!” at Thotcon in Chicago, IL on 5/14/2015! - Abstract: You were warned in 1997 that a not-too-distant future was approaching. This dystopian future is here now due to rapid technological advances, much quicker than we initially imagined. These breakthrough DNA technologies are exposing your deepest darkest secrets. Who can see this information? What will they do with this information? Little does anyone know they are only one data breach away from public exposure.
Herd Mentality & Modern Media Trolling at DEFCON Milwaukee on 03/06/2015 - Abstract: Do you trust your news sources? After my experiments… I don’t recommend it. We dive in the wacky world of trolling modern journalism, nobody is safe
Advanced DNA Security at DEFCON Milwaukee on 02/06/2015 - Abstract: Continued discussion on what does the future hold in the confidentiality of raw DNA? My presentation discussed the DNA data and how the information can get leaked to an individual and the ramification if the data gets released. We also went over the public databases for connecting an individual to another unknown individual.
SC Congress Chicago on 12/04/2014 - Abstract/Presentation to the Chicago Information Security community on information security in healthcare organizations.
Data protection of Electronic Medical Records (EMR) containing DNA at DEFCON Milwaukee on 11/07/2014 - Abstract: DNA Sequencing is becoming cheaper and more commonly requested by medical staff. The protection of data storage is becoming increasingly difficult. Therefore, what does the future hold in the confidentiality of patient DNA? If patient DNA data is indeed leaked to the public this knowledge is irreversible. My presentation discusses the implications of patient health records containing DNA data, the ramification if the data gets released, and the challenges health organizations will encounter in the near future.
Google Apps Class teaching teachers at Kewaskum School District on 08/27/2013 - Abstract: As a Google Apps for Education Certified Trainer, I provide professional development services designed to make the most of school’s Google Apps implementation. Kewaskum’s new and existing staff members attend my classes regarding Google Mail, Google Apps/Drive, Google Calendar, and other tools that Google offers for the educational sector. Being a Certified Trainer requires a lot of additional side preparation and the certification is carefully vetted by Google and meet rigorous qualification standards.
“Shhh, it’s a secret” in Vegas on August 1st-4th, 2013 - Top Secret! You’ll have to ask…
Windows 7 Class at Kewaskum School District on 05/21/2013 & 06/12/2013 Abstract: As the Director of InformationTechnology at Kewaskum School District I taught teaching staff best practices of Microsoft’s Windows 7 operating system. In addition, all those who attended also received Lenovo T530 i5 laptops to improve the mobility of our teaching staff. Wireless has been activated at nearly all the schools in the last 6 months and VPN access activated in the last week. The changes we are implementing push our vision for teachers to be able to work anywhere and everywhere!
Google Apps / Office 365 Round-table at Brainstorm on 03/11/201 -Abstract: Assisting the Director of Instructional Technology at Kewaskum School District, Michael helped moderate a round-table discussion regarding Google Apps / Office 365 roll outs in education. The next generation of mail/office showdown within K/12 education seems to be in favor of Google apps with a ratio of about 50 to 1 when compared to Office 365. Their platforms differ greatly in usability, functionality, and mobile support for students and staff.
Bring your own Device (BYOD) in education at SLATE on 9/09/2012 - Abstract: Along with his business partner John, Michael spoke at an educational conference called SLATE. Our session focused on new educational methods of implementing various devices using wireless technology. Teaching efficient strategies for introducing random modern technology into the classroom can be a challenge in rural Wisconsin. The goal of speaking at SLATE follows the mindset that spreading ideas and sharing best practice knowledge at conferences saves money and headaches freeing time and resources for other projects that impact children learning.
“shhh, it’s a secret” in Vegas on July 26-29th, 2012 Top Secret! You’ll have to ask…
The State of Information Technology in Havana, Cuba at UW-Green Bay on 5/03/2011 - Abstract: Discussing my graduate studies in Havana, Cuba. My lecture touches on the antiquated network infrastructures of Cuba. The United State’s blockade has set Cuba further back then the rest of the world. Oddly, during the trip the first undersea cable was set into a test operations from Venezuela.
Michael Goetzman has been working with SEO/SEM for over 10 years. Most people find that natural website positioning can be difficult and time intensive. Learn efficient strategies for web site optimization. Mike teaches sophisticated methodologies together with the least known methods behind Google’s present search algorithm in a very practical hands on way.
Michael has a bachelors degree in Information Security Systems and attends local def con meetings sharing ideas of the 10 domains of security.
Getting past physical locks in a non-destructive method can be tricky. Methods used by professionals to unlock a common pin tumbler lock very quickly seems like a trick out of the movies! Michael has successfully taught methods of opening a lock in under 5 seconds during his lectures. In the United States alone more than 90% of home and commercial locks are believed to be pin tumbler locks – this means 90% of the locks in the United States are susceptible to attacks.