Home link Books link Press link Security link Briefings link

Need a great speaker?

"One of the best speakers I've ever heard. Brilliant, stimulating and entertaining."

"fantastic brief ... I cannot recall when I have been so entertained and informed at the same time."

"The most entertaining presentation I have ever attended."

Have Bill Neugent tell your group the remarkable story of America’s cyber vulnerabilities, how they might affect you, and what you should do about them. The shocking truth is that our society is built on computer networks that are no more secure than beach cottages on a sand bar. 

Bill Speaking at CIO Summit

Bill Speaking at CIO Summit

star bullet  Entertaining speaker

star bullet  National expert

star bullet  Best-selling novelist

star bullet  Testimonials

Digital Armageddon — Can It Happen?

Why we need a Robin Hood in cyberspace.

Entertaining Speaker:

CIO Summit Participants

CIO Summit Participants

Bill Neugent is one of the country’s leading cybersecurity strategists and has given hundreds of talks to tens of thousands of people, including many keynote speeches. His talk on cyberterrorism is dynamite, especially when accompanied by a book signing for his novel about a cyberterrorist attack on the U.S. A string of computer conferences and dot.com offices have bought copies of the novel in advance for all their attendees because the book, like the talk, informs as it entertains.

Contact Bill to request him as a speaker.

Available talks:

Cybersecurity Points of Light Security is often seen as an impediment to operation. Recent technology advances are changing that perception as both security and operational capability are improved at the same time. All without smoke and mirrors. This talk is highly popular both with computer techies and IT managers.

Cross-Boundary Information Sharing When it comes to sharing, government agencies are introverted. This talk summarizes sharing needs across the intelligence, law enforcement, and homeland security communities, summarizes recent advances in sharing, and identifies security technology investments needed to break down the organizational barriers and enable further improvements.

Cyberterrorism: We're ToastHow we're at risk from cyberterrorism and attacks from other nations.  This talk is in great demand by groups of managers, engineers, and researchers from government, industry, and universities. It's a jaw-dropping expose of underlying issues and threats, and presents strategies at both the enterprise and national levels. The talk is also entertaining, "just this side of Johnny Carson," according to one event planner. Read the abstract.

A Program To Counter Insider Threats There is no greater area of shortfall between what we should be doing and what we actually are doing. Read the abstract.

Sample talks:

Memphis, TN; WYPL TV 18, half-hour interview by Heather Lawson on Book Talk

Memphis, TN; Memphis Chapter of Society for Information Management (SIM), over 60 people, luncheon keynote speaker

Washington D.C.; World Future Society Annual Conference

Falls Church, VA; National Security Institute's 19th annual national security forum, 250 people, opening keynote

Salt Lake City, UT; The Sixteenth Annual Software Technology Conference 2004, 500 people, closing keynote

Laurel, MD; Information Assurance Technical Framework Forum (IATFF), 350 people, featured speaker

Adelphi, MD; Federal Information Systems Security Educators' Association (FISSEA) conference, 80 people, luncheon keynote speaker

Austin, TX; Technology Transfer Institute (TTI)/Vanguard conference, 130 people, featured speaker

Orlando, FL; WKMG TV (CBS), featured interview by Emmy-award-winning reporter Mike Holfeld

Cocoa Beach, FL; Technology for Information Security Conference (TISC 2003), 200 people, featured keynote speaker

Moses Lake, WA; KBSN Radio, live one-hour interview on Butch Bare's "Public Affairs" show

Los Alamos, NM; Los Alamos National Laboratory, 150 people, featured speaker

Willimantic, CT; WILI AM, featured guest for one-hour, live, in-station interview on Wayne Norman show

West Hartford, CT; NBC30 TV, featured guest

Hanscom AFB, MA; Association of Old Crows, luncheon keynote speaker

Tampa, FL; Armed Forces Communications and Electronics Association (AFCEA), 166 people, luncheon keynote speaker

Charlotte, NC; University of North Carolina - Charlotte, Information Security and Privacy Conference, 200 people, luncheon keynote speaker

Washington, D.C.; E-Gov Information Assurance conference, 160 people, luncheon keynote speaker

South Bend, IN; Indiana University South Bend (IUSB), 75 people, featured evening speaker

Elkhart, IN; FOX 28 WSJV TV, featured guest on Wake Up show

Arlington, VA; National Science Foundation, featured speaker

San Francisco, CA; Department of Veterans Affairs, 600 people, keynote speaker

Livermore, CA, Sandia National Laboratories/California and Lawrence Livermore National Laboratory, 100 people, featured speaker

Huntsville, AL; Southeastern Software Engineering Conference, 100 people, keynote speaker

Albuquerque, NM; Sandia National Laboratories, 180 people, featured guest speaker

Savannah, GA; Government Chief Information Officer (CIO) Summit, 170 people, dinner keynote speaker

National Expert — Bill's Techie Bio:

Bill has been a cybersecurity consultant for over thirty years. Please don't do the math. In his day job, he works for MITRE, a not-for-profit think tank that advises the federal government. At MITRE Bill is a MITRE Fellow and is also the chief engineer for over three-hundred cybersecurity experts.

He has developed cybersecurity strategies for a number of agencies and was a primary architect of the Defense-in-Depth strategy that has been implemented throughout the U.S. military. He drafted the first computer security program plan for the overall intelligence community.

Nowadays he advises the top cybersecurity officials within government agencies on technical and programmatic strategies. In his rowdier youth, he wrote not only the first Federal guideline on cybersecurity certification and accreditation, but also a series of humorous security articles that became cult classics. Further back, he created and taught a graduate-level course in computer security at The American University, one of the first such courses in the country.

Best-selling Novelist:

Bill at CIO Summit Book Signing

Bill at CIO Summit Book Signing

Bill’s written a novel about a cyberterrorist attack on the country. Soon after its release, No Outward Sign (Writers Club Press) became one of Amazon.com’s 500 best-selling books. The book raises public awareness of our national vulnerabilities while also being “highly entertaining.” Nine conference or corporate groups have bought well over 1,000 copies to give as free handouts.*

Topical for any conference, office, class, or club:

* Purchase twenty or more copies at a forty percent discount. Ideal as a supplement to training sessions, seminars, and conferences or as a gift to colleagues and clients.


"One of the best speakers I've ever heard. Brilliant, stimulating and entertaining."

M. E. Kabay, PhD, CISSP, Assoc. Prof. Information Assurance, Program Director, MSIA, Norwich University, Vermont

"fantastic brief ... I cannot recall when I have been so entertained and informed at the same time."

Patrick Murphy, IA Liaison, Arlington, VA

"The most entertaining presentation I have ever attended."

John Bumgarner, Founder, Cyber Watch, Charlotte, NC

"Your talk was one of the best we've had in years... I have heard nothing but glowing compliments."

Lisa Costa, Ph.D., Division Chief Engineer and AFCEA technical program chair, Tampa, FL

"... over 100 rave attendee evaluations."

Jim Litchko, President and CEO, Litchko & Associates; Speaker and Member, National Speakers Association, Kensington, MD

Bill at TISC '03

Bill at TISC in 2003

"This was one of the best briefings I have ever attended"

"Both outstanding and enlightening"

"Wonderful speaker - kept audience on the edge"

"Thanks for including Bill Neugent in your program"

"Very informative"

"Very informative, entertaining"

"Great starter presentation"

"Very inspiring, and scarey"

"Most sincere, enjoyable, well thought out, creative presentation. Well informative and outstanding speaker."

"Security, I feel, is more serious and the need for jokes and humor are not required."

Comments on speaker evaluation forms from TISC '03
Cocoa Beach, FL


"I hear great 'hallway' comments about your session from our attendees."

Susan Hotzler, Project Manager, Veterans Health Administration Employee Education System, Department of Veterans Affairs, Minneapolis, MI

"[Bill] was not only interesting and entertaining, he provided valuable current info on malicious code and network vulnerabilities as well as recommending tools to use in finding and stopping them... Bill is doing a good deed to further publicize and flesh-out these issues."

Jana Markowitz, Principal Consultant, The Collective Mind, Memphis, TN

"Really enjoyed your presentation ... It included lots of good information, presented with a nice mix of humor."

Hugh McArthur, Information Systems Security Officer, South Riding, VA

"I enjoyed your colorful and entertaining presentation. If you are ever in Memphis again, I would like you to give a presentation at Christian Brothers University."

John Ventura, Electrical and Computer Engineering Department, Christian Brothers University, Memphis, TN

"Thank you for a most informative and outstanding presentation ... We have been receiving nothing but rave comments on your talk and your graciousness in staying with us to talk."

Ed Hetsko, President, ISSA-NOVA, Stephens City, VA

"I have received many emails from attendees expressing how much they enjoyed your presentation and discussion."

Farideh Moghadami, Program, Sponsorship, & membership Director, ISSA-NOVA (Information System Security Association-Northern Virginia) Chapter

"I have spoken with a number of people since your talk. Everyone enjoyed it very much."

Hossein Hakimzadeh, Ph.D., Chair, Dept. of Computer & Information Sciences, Indiana University South Bend, South Bend, IN

"very, very, very good."

Chrisan Herrod, Professor and Chair, Department of Information Operations and Technology, National Defense University, Information Resources Management College, Centreville, VA

"I really enjoyed the contents and the style of your excellent presentation."

Magdy Attia, Ph.D., Director, Technology Center; Chairman, Computer Science and Engineering Department, Johnson C. Smith University, Charlotte, NC

"Everyone thoroughly enjoyed your presentation."

Bill Chu, Ph.D., Professor and Chairman, Software and Information Systems, The University of North Carolina at Charlotte, Charlotte, NC.

"You were quite a hit. I have received many good comments on your presentation and your book."

Olin Broadway, Executive in Residence, College of Information Technology, UNC Charlotte; Charlotte, NC

"From the audience questions and your book sales/signings, your speech was a Home Run Hit."

Charles Cherry, President, Association of Old Crows, Patriots' Roost chapter, Sharon, MA

"very entertaining and enlightening...several people have come to me to express how much they enjoyed your talk."

Jian Lin, Ph.D., Computer Science Chair, Eastern Connecticut State University, Willimantic, CT

"I too heard Mr. Neugent speak, it was at the e-Gov seminar in Oct 03. He was fascinating, humorous, entertaining and drove home the points as he discussed serious issues. I purchased his book and was lucky enough to have it personalized and autographed. I am neither an autograph seeker nor a huge sci-fi fan but I thoroughly enjoyed his book. I gave it as gifts to several of my friends for Christmas. I hope he has a sequel."

From a note sent in response to Mich Kabay's review posted about No Outward Sign.

Bill also has chaired two conferences, including one on Cyberterrorism that resulted in this review:

"As far as delegate feedback goes, this conference scored the highest of all my conferences."

Shelley Imbeault, Conference Director, Toronto, Canada


Updated: 04-Mar-2003