Speaking Request

SPEAKER BOOKING

Jim Nitterauer

With over 30 years in information security — and appearances at DEF CON, RSA Conference, BSides events, NolaCon, CircleCityCon, DerbyCon, and more — Jim brings hard-won practitioner experience to every stage. He doesn’t lecture from theory. He speaks from the front lines of building, breaking, and defending real systems at real organizations.

Jim is available for keynotes, panel discussions, workshops, and training sessions at security conferences, corporate events, and industry summits — both paid engagements and community conferences.


TOPICS

AI Governance & Emerging Threats

AI is moving faster than most organizations can govern it — and the security and compliance implications are significant. Jim addresses the practical realities of building corporate AI governance frameworks that are dynamic enough to keep pace with the technology, covering usage policies, data handling, risk categorization, and the emerging threat landscape that comes with broad AI adoption.

Sample talks: Corporate AI Governance: Best Practices for a Secure and Ethical Future · Taming the Hydra: Managing Security Tool Sprawl Through Strategic Governance

Security Leadership & CISO Strategy

Moving into security leadership requires more than technical depth — it requires a fundamental shift in how you think, communicate, and operate. Jim draws on his own journey from practitioner to executive to help security professionals bridge the gap between the hacker mindset and the business leadership mindset, covering the first 90 days in a new role, building credibility with the board, turning security from a cost center into a revenue enabler, and navigating the political realities of the CISO seat.

Sample talks: From Hacker to CISO: Navigating the First 90 Days · How to Move Cybersecurity From a Cost Center to a Revenue Enabler · Strategy for Responding to Corporate Reputation Attacks

Threat Intelligence & Incident Response

Real-world threat response looks nothing like the textbook. Jim has presented at RSA and briefed the FBIIC-FSSCC joint meeting on corporate impersonation attacks, and has years of experience in hands-on incident response at organizations ranging from SMBs to large enterprises. He brings case studies, evidence, and actionable frameworks — not slides full of vendor logos.

Sample talks: Corporate Reputation Attacks: Dissecting the Latest Job Offer Scams · Extortion, Chaos & Needless Busywork AKA Vendor Risk Management · EVERYONE is Part of the Security Team and Solution

DNS Security & Network Defense

Jim is one of the most recognized voices in DNS security, having spoken on the topic at DEF CON, BSides Las Vegas, NolaCon, CircleCityCon, CypherCon, Hacker Halted, and numerous other conferences. His DNS talks are consistently technical, practical, and demo-driven — covering everything from DNS hardening and privacy to threat detection through log analysis.

Sample talks: DNS — Devious Name Services: Destroying Privacy & Anonymity Without Your Consent (DEF CON 25) · DNS Dark Matter Discovery: There’s Evil In Those Queries · DNS Hardening: Proactive Network Security Using F5 iRules and Open Source Analysis Tools

Security for Small & Midsize Enterprises

Most security content is written for organizations with unlimited budgets and large teams. Jim has spent significant time helping SMBs and midsize enterprises build meaningful security programs with constrained resources — covering compliance frameworks (SOC 2, NIST, HIPAA, PCI DSS), practical risk management, and how to do more with less without cutting corners that matter.

Sample talks: Panel: Security Strategy for Small-Medium Business (Blue Team Con) · Security & Compliance at Small and Medium Businesses · HowTo: Balance Cybersecurity Budgets and Risk in Midsize Enterprises


FORMATS & AVAILABILITY

Jim speaks in a variety of formats to fit your event’s needs:

  • Keynote — 30 to 60 minutes, tailored to your audience and theme
  • Conference Talk — 20 to 45 minutes with or without Q&A
  • Panel Discussion — moderated or participant
  • Workshop / Training — half-day or full-day hands-on sessions (revenue sharing expected)
  • Fireside Chat — conversational format for executive and leadership audiences
  • Virtual Presentations — available for online and hybrid events

Jim is based in the United States and available for events nationwide and internationally. He is an active staff member of BSides Las Vegas and has held planning committee roles at ITEN WIRED, bringing an insider understanding of what conference organizers need from their speakers.


SPEAKER CREDENTIALS

Jim has spoken at over 30 events across more than a decade of active conference participation, including:

DEF CON 25 · RSA Conference · BSides Las Vegas · BSides San Francisco · BSides Atlanta · BSides Charm · Blue Team Con · CircleCityCon · NolaCon · DerbyCon · CypherCon · Hacker Halted · Hackfest Canada · HouSecCon · Graylog GO · ITEN WIRED · FBIIC-FSSCC Joint Meeting

His work has been published in Infosecurity Magazine, CPO Magazine, Security Magazine, Cyber Defense Magazine, RT Insights, Brilliance Security Magazine, and Tripwire’s State of Security blog. He holds CISSP and CISM certifications and brings a unique background as a degreed microbiologist who built and sold technology companies before moving into information security leadership.

See Jim’s complete list here.


BOOK JIM TO SPEAK

Use the form below to submit a speaking inquiry. Please include as much detail as you can about your event — format, audience, date, and any specific topics you have in mind. Jim personally reviews all inquiries and responds within two business days.

[CONTACT FORM]