Marc Goodman

Marc Goodman

Chair

Policy, Law, Ethics

Request Marc for Your Event

Areas of Expertise

Policy  •   Law  •   Ethics  •  Cybersecurity  •  Cryptocurrency  •  Security

About Marc

Marc Goodman is a New York Times Best-Selling author, global strategist and consultant focused on the profound change technology is having on security, business and international affairs. He is the founder of the Future Crimes Institute and currently serves as the Chair for Policy, Law and Ethics at Silicon Valley’s Singularity University. Over the past twenty years, he has built his expertise in international cyber crime and terrorism working with organizations such as INTERPOL, the UN Counterterrorism Task Force, NATO, the FBI and the US Government.

Mr. Goodman frequently advises industry leaders, security executives and global policy makers on transnational cyber risk and intelligence and has operated in more than 70 countries around the world. His professional experiences include working as a street police officer, undercover investigator and counter-terrorism strategist, as well as briefing myriad cabinet ministers and heads of government, including the White House. Mr. Goodman’s current areas of research include the security implications of emerging technologies such as artificial intelligence, big data, robotics, crypto-currencies, synthetic biology, virtual reality, Internet of Things and the future of financial crime.

Mr. Goodman holds a Master of Public Administration from Harvard University and a Master of Science in the Management of Information Systems from the London School of Economics. In addition, he has served as a Fellow at Stanford University’s Center for International Security and Cooperation and is a Distinguished Visiting Scholar at Stanford’s MediaX Laboratory. He is on the advisory board of The AI Initiative, part of The Future Society at Harvard Kennedy School and a member of the World Economic Forum’s Global Future Council on International Security

Mr. Goodman is the author of Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, from Random House/Doubleday. Future Crimes is a New York Times, Wall Street Journal and USA Today Best-Seller, was selected as Amazon’s Best Business Book of 2015 and has been named one of TheWashington Post’s Top Ten Best Books of 2015. Future Crimes is in its ninth printing and has been translated into 14 languages.

Mr. Goodman has published widely on a variety of emerging technology issues including articles with the The Economist, Wired, The Atlantic, Harvard Business Review, Forbes, Oxford University Press, Jane’s Intelligence Review and the FBI Law Enforcement Bulletin. He has been interviewed by BBC, CNN, Fox News, NPR, NBC, PBS, the Washington Post, LA Times, Le Monde, Larry King, Tim Ferriss, and many others. A sought-after speaker, Mr. Goodman’s TED talk “A Vision of Crimes in the Future,” has been viewed over 1.2 million times and translated into 26 languages.

A vision of crimes in the future

TEDxLosGatos - Future Crimes

Cyber Security, Transhumanism, & Future Crimes - #203

Global security adviser Marc Goodman: ‘Cyber threats are everywhere'

Future Crimes - PART 1/2 | London Real

Speaking Topics

  • A Dynamic Duo: How IT and HR Can Secure a Company from Cyber Threats

    In most companies, the department charged with cyber security issues is the IT department. While technical solutions, policies, and procedures play a large part in keeping a company safe, they alone will never be able to secure a company from security breaches. The key to cybersecurity is the attitude and training of employees—and it is here that HR professional have a vital role to play. In this talk, Marc Goodman will open human resource managers’ eyes to the people problem behind cyber risk and outline the key strategies that HR managers must employ to create a cyber-savvy workplace. Topics to be covered include background check policies and procedures, the importance of social media polices for all employees, and the need to immediately secure access to company systems after an employee leaves an organization. Other topics that Goodman can address as part of this informative talk are the risks of workplace cyber-bullying and the cost it can bear for companies as well as ways to hire and train the best cybersecurity talents in an increasingly competitive marketplace.
    Using case studies from across various industries and relevant research findings, Goodman motivates HR and IT professionals to work together and empowers them to maintain a more secure, and ultimately more productive and enjoyable work environment.

  • Building a Culture of Cybersecurity

    Every day in the news there is story after story a major cyberattack. According to Juniper Research, businesses around the world will lose nearly $2 trillion dollars to data breaches by the year 2019. Most companies respond to these rapidly emerging threats by spending increasing sums on technology—firewalls, intrusion detection systems and the like—but technology alone will never eliminate cyber security risk without considering human factors. According to IBM Security, 95% of security incidents involve human error and employees may unwittingly be putting their organization at increased cyber risk. In this highly engaging and humorous presentation, Marc Goodman explains how to take your weakest link and turn it into your greatest strength. A vigilant and informed workforce can vastly improve your company’s cybersecurity and a human firewall must be a top priority. Goodman will teach your employees to protect themselves, so that they can protect you. Creating a culture of cybersecurity may be the single most important step you can take to protect yourself and your company from the drastic increase in global cyber attacks. After all, cybersecurity not a department, it’s an attitude. In this talk Marc Goodman will show you how to get there.

  • Building an Organizational Culture of Cybersecurity

    Every day in the news there is story after story a major cyberattack. According to Juniper Research, businesses around the world will lose nearly $2 trillion dollars to
    data breaches by the year 2019. Most companies respond to these rapidly emerging threats by spending increasing sums on technology—firewalls, intrusion detection systems and the like—but technology alone will never eliminate cyber security risk without considering human factors. According to IBM Security, 95% of security incidents involve human error and employees may unwittingly be putting their organization at increased cyber risk. In this highly engaging and humorous presentation, Marc Goodman explains how to take your weakest link and turn it into your greatest strength. A vigilant and informed workforce can vastly improve your company’s cybersecurity and a human firewall must be a top priority. Goodman will teach your employees to protect themselves, so that they can protect you. Creating a culture of cybersecurity may be the single most important step you can take to protect yourself and your company from the drastic increase in global cyber attacks. After all, cybersecurity not a department, it’s an attitude. In this talk Marc Goodman will show you how to get there.

  • Emerging Security & Privacy Threats in Medicine and Healthcare

    Increasingly technology is being integrated into every aspect of medicine and healthcare, with radical—and often poorly understood—implications for both privacy and security. Medical records are being digitized at an astounding rate, but are rarely protected adequately. Moreover, implanted medical devices, ranging from cardiac defibrillators to insulin pumps, have recently been successfully targeted by hackers with potentially deadly results. When these devices fail or are compromised, how will care be effectively rendered? Organized crime groups are committing tens of billions of dollars of healthcare fraud globally, to include holding tens of thousands of patient records ransom, unless blackmail demands are met. Counterfeit medicines pose a threat not just to the intellectual property rights of their developers, but also to an unwitting public at large. Even DNA itself—the world’s original computer operating system—is being hacked through a vibrant network of garage synthetic biologists. While these fast-paced advances in science hold phenomenal opportunities to cure disease and diminish human suffering, they also are opening the door for criminals, fraudsters and even terrorists to target the world of medicine and healthcare in ways never previously thought imaginable. In the fascinating discussion, Marc will present a compelling overview on the latest criminal tradecraft affecting the healthcare industry and will reveal which emerging threats to medicine loom on the horizon. Marc will offer his analysis and thoughts on how to detect, prevent and prepare for these threats before they occur.

  • Future Crimes - Innovation from the Underworld

    The topic of his upcoming book, this presentation draws surprising parallels as to what legitimate businesses can learn about innovation from international organized crime_a two trillion dollar a year industry. Global criminals have become sophisticated managers of technology and talent and there are lessons to be learned in innovation and operations management for legitimate enterprises. For example, while businesses around the world are struggling to keep up in the era of big data, international organized crime is masterfully exploiting these opportunities.

  • In Screen We Trust

    We are increasingly living in an intermediated world—one in which the majority of our information no longer comes from our direct observations in the “real world,” but rather through a multitude of computer screens. Computers and other electronic gadgets provide us with a constant flow of information. Caller ID tells us who is phoning. The return address of the email lets us know who has written. A check of the store’s inventory system tells how many products are left in stock. Electronic hospital records tell us the patient’s blood type, which arm is to be operated upon, and list known allergic reactions.

    The friend request from your co-worker had his picture in the profile, so mustn’t it be legitimate? The voice on our answering machine seems to be from our spouse, but is it? In the information age, we rely on digital technologies to serve as the modern day oracle, providing answers to our never-ending questions. Digital information, however, is infinitely malleable. Caller ID, emails, and even GPS locations are easily spoofed. Exact voice replicas can be synthesized to say anything we want them to, and dead celebrities can be brought back to life to appear in commercials via virtual and holographic technologies.

    So, why do we believe anything? How can we tell what is fake and what is not? How might these advances in technology be used against us? This talk will provide the audience with a healthy appreciation for what is possible, what can be spoofed, how to approach digital data with a skeptical eye, and how to survive and thrive in our increasingly intermediated digital world.

  • Lessons in Innovation from the Criminal Underground

    This presentation draws surprising conclusions about what legitimate businesses can learn from international organized crime–a two trillion dollar a year industry. Global criminals have become sophisticated managers of technology and talent. While businesses around the world are struggling to keep up in the era of big data, international organized crime is masterfully exploiting these opportunities. This lecture takes a look at the lessons to be learned from the “early adopters” in the criminal underground.

  • Lessons in Innovation from the Criminal Underground

    The topic of a Harvard Business Review feature article, this presentation draws surprising parallels as to what legitimate businesses can learn about innovation from international organized crime–a two trillion dollar a year industry. Global criminals have become sophisticated managers of technology and talent and there are lessons to be learned in innovation and operations management for legitimate enterprises. For example, while businesses around the world are struggling to keep up in the era of big data, international organized crime is masterfully exploiting these opportunities.

    Criminal groups have become experts in using the breaking news to create opportunities. Moments after a devastating earthquake or the death of a noted celebrity, the digital underground springs into action, releasing new scams and plots to leverage the news to their advantage. Major crime groups have also developed great expertise in outsourcing much of their business to specialists—money launderers, hit men or hackers. Cartels, triads and gangs know that cash is not the only incentive for their workforces and have developed elaborate mechanisms to keep their employees excited and challenged. Moreover, crime groups have become experts in “exploiting the long tail” in their business. Rather than seeking out the million dollar heist, bad guys have learned that it is much easier and sustainable to commit tens of thousands of much smaller digital crimes to keep profits flowing. The illicit transnational networks established for criminal collaboration across borders provides useful lessons for legitimate enterprise in how to thrive and survive in a networked world.

  • Security in a Connected World

    A huge proponent of technology, Marc Goodman knows that the positive aspects of the Internet are manifest. But as one of the world’s leading authorities on global security, he also recognizes that when it comes to technology, the increased scale of influence can be used both for good and for ill. In a global society run by computers, whoever controls the computer code can control the world. Every day we connect more and more devices to the Internet, ranging from laptops and mobile phones, to critical infrastructures including financial systems and electrical grids. We trust what our screens tell us, but all technologies can be hacked to provide a stealth window direct into an unsuspecting user’s home, office, family, or social life. In this eye-opening talk, Goodman provides access to his deep insights about the future of technology and where the next threats will come from, along with the preventative measures we need to take before it’s too late.

  • Security & Privacy in Medicine and Healthcare

    Increasingly technology is being integrated into every aspect of medicine and healthcare. These fast-paced advances in science hold phenomenal opportunities to cure disease and diminish human suffering. But what happens when medical devices, medical records, and even the human body itself is hacked by a vibrant network of organized criminals? In this lecture, Marc Goodman presents a compelling overview of the latest criminal tradecraft affecting the healthcare industry and looks at how practitioners and patients can ensure technology continues to heal rather than harm.

  • The Future of Crime & Global Security

    Explore the current and future effects of security. This session would address the criminal applications of robotics, virtual worlds, nanotechnology, ubiquitous computing, artificial intelligence, cloud computing, bio-hacking, social data and location-based crime.

  • The Future of Financial Crime

    Financial fraud is on the rise and transnational criminal networks are innovating more quickly than business and government can keep up. The result: fraud on a mass scale across all sectors. In this lecture, Marc Goodman will explain how technologies are being leveraged to create vast networks of fraudulent identities and shell accounts. He will share the latest intelligence on criminal tradecraft in the world of financial crime, including a thought-provoking analysis of what industry must do to prevent mass damage to their business moving forward.

  • The Future of Security

    Explore the current and future effects of security. This session would address the criminal applications of robotics, virtual worlds, nanotechnology, ubiquitous computing, artificial intelligence, cloud computing, bio-hacking, social data and location-based crime.

  • The Need for Cyber Executive Protection

    What is your cyber risk profile? What do you look like to the outside world? As a twenty-first century security Sherpa, Marc will lead you on an eye-opening journey of the realities and risks in our cyber-connected, technologically laden world.
    Technology pervades our life. Most of us would be lost without our smartphones, iPads, laptops, Tivos, digital cameras, GPS navigation devices, Facebook, Twitter, and Skype. While these tools can be of great utility, they also harbor an often ignored risk: the capability to threaten one’s business, finances, and family. All technologies can be hacked to provide a stealth window and an open door direct into an unsuspecting user’s home, office, family, or social life. As executives travel the world with their business plans, intellectual property, latest board minutes, and acquisition strategies stored on a panoply of electronic devices, sophisticated adversaries pose a persistent threat ready to steal the data of their choosing.
    It is possible for an adversary to remotely turn on your laptop or smartphone’s microphone, and video camera, while simultaneously disabling the green “on” light. Your mobile phone leaks out your location 24 hours a day, and from this information a sophisticated pattern of your activities and associates can be aggregated and profiled. Your spouse or children could be readily targeted in social networking sites, and even extorted, as a means of getting to you and your business activities.
    Perpetrators are no longer simply teenage hackers, but also sophisticated transnational organized crime groups, highly-effective nation states, and corporate competitors—each seeking to gather as much cyber intelligence on you as you will unwittingly allow. In this fascinating talk, Marc provides both strategy and tactics for executives to manage and mitigate risk in our interconnected world.

  • The Need for Cyber Executive Protection

    What is your cyber risk profile? What do you look like to the outside world? As a twenty-first century security Sherpa, Marc will lead you on an eye-opening journey of the realities and risks in our cyber-connected, technologically laden world.

    Technology pervades our life. Most of us would be lost without our smartphones, iPads, laptops, Tivos, digital cameras, GPS navigation devices, Facebook, Twitter, and Skype. While these tools can be of great utility, they also harbor an often ignored risk: the capability to threaten one’s business, finances, and family. All technologies can be hacked to provide a stealth window and an open door direct into an unsuspecting user’s home, office, family, or social life. As executives travel the world with their business plans, intellectual property, latest board minutes, and acquisition strategies stored on a panoply of electronic devices, sophisticated adversaries pose a persistent threat ready to steal the data of their choosing.

    It is possible for an adversary to remotely turn on your laptop or smartphone’s microphone, and video camera, while simultaneously disabling the green “on” light. Your mobile phone leaks out your location 24 hours a day, and from this information a sophisticated pattern of your activities and associates can be aggregated and profiled. Your spouse or children could be readily targeted in social networking sites, and even extorted, as a means of getting to you and your business activities.

    Perpetrators are no longer simply teenage hackers, but also sophisticated transnational organized crime groups, highly-effective nation states, and corporate competitors—each seeking to gather as much cyber intelligence on you as you will unwittingly allow. In this fascinating talk, Marc provides both strategy and tactics for executives to manage and mitigate risk in our interconnected world.

See All Faculty