Donnie Wendt

Thought Leader in Cybersecurity & Artificial Intelligence; VCAIO at WhitegloveAI; Author of "The Cybersecurity Trinity: AI, Automation, and Active Cyber Defense"

Travels From Travels From:
St. Louis, MO, USA
Speaking Fee Speaking Fee:
REQUEST BOOKING INFORMATION

Profile

Donnie Wendt Biography

BOOK Donnie Wendt

Speaker profile last updated by AAE Talent Team on 03/13/2025.

Donnie Wendt Speaking Topics

  • The Cybersecurity Trinity: Artificial Intelligence, Automation & Active Cyber Defense

    This talk explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. Security teams often treat AI, automation, and ACD as disparate solutions, addressing specific problems. However, there is much overlap, and security teams must develop a cohesive approach to realize the full potential.

    With the growth of AI and machine learning (ML), cybersecurity professionals must understand its core concepts to defend AI and ML-based systems. Next, we turn our attention to security automation. We will discuss strategies for a successful security automation implementation and strategies that can lead to failure. However, accelerating the defense is only one side of the equation. Defenders can also implement ACD methods to disrupt and slow the attacker. Finally, we will combine these three concepts to form a comprehensive strategy aligned with the NIST Cybersecurity Framework. The resulting strategy will have AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker.

    Attendee Objectives:

    • Learn how to protect AI and ML systems by recognizing the vulnerabilities throughout their lifecycle.
    • Integrate AI and ML-based systems to enhance cybersecurity.
    • Develop security automation processes to enhance situation awareness, speed the time to respond, and increase the bandwidth of the limited security operations staff.
    • Develop an ACD strategy to slow the attackers while minimizing legal and ethical concerns.
    • Design a comprehensive strategy with AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker.

  • Artificial Intelligence: Cybersecurity’s Friend & Foe

    Artificial intelligence (AI) is fundamentally improving the capabilities of defenders and attackers. Security strategies must account for the dual nature, friend and foe, of AI. Ensuring the security staff is prepared for the future is vital to any strategy. Cybersecurity professionals of the future must understand AI – how to use it, protect it, and defend against it.

    Employing AI for cybersecurity offers tremendous benefits and great promise, for both groups. This discussion seeks to demystify machine learning for the non-data scientist so that cyber security professionals can harness its full potential. This presentation will briefly cover some underlying machine learning concepts and how AI can improve security. We will investigate the vulnerabilities when using AI within cybersecurity and the use of adversarial AI. Finally, we will look at strategies to improve AI-enhanced cybersecurity to ensure your security team is ready for the future. This discussion focuses on using machine learning for cybersecurity; however, the concepts could apply to employing machine learning in any adversarial environment.

    Attendee Objectives

    • Describe the benefits and potential of machine learning for defenders and attackers.
    • Understand the types of attacks that can target AI in an adversarial environment and the associated mitigation tactics.
    • Understand how to increase the security, robustness, and resiliency of AI for cybersecurity by leveraging both traditional methods and adversarial machine learning processes.
    • Develop strategies to improve readiness to defend against emergent AI threats.

  • Security Automation: Strategies for Success (and Failure)

    This presentation will explore why companies need security automation and how they can ensure success. Leveraging professional experience and doctoral research into security automation, the presenter will examine the keys to successful security automation, including how to prioritize use cases and build enterprise support. This session will look at how to decide what to automate (and what not to automate), strategies to help ensure a successful security automation program, and lessons learned from success. As a younger brother, the speaker understands the value of learning from his older brothers’ mistakes. Therefore, we will look also look at strategies for failure, including viewing security automation as a cost saving effort.

    Attendee Objectives

    • Describe the benefits of successfully implementing security automation.
    • Develop stategies to ensure success of a security automation program.
    • Understand how to fail when implementing security automation.

  • Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience

    Inviting attackers into your network can have serious repercussions, much like inviting vampires into your home. Furthermore, engaging them or watching them move about can be very risky. In most cases, companies should leave this type of engagement to the professionals, such as external security vendors and researchers, or in the case of vampires, let Buffy handle them. Alternatively, if you prefer, contact Von Helsing, Abraham Lincoln, or Anita Blake, all of whom, according to popular literature and film, are renowned vampire slayers. Often, the best approach when encountering a vampire is to drive a wooden stake through his heart as soon as possible. Similarly, in most situations, organizations want to evict and block the attacker quickly and effectively once a suspected attacker is identified. Toying with vampires after they have entered your home can be fatal. Likewise, allowing an attacker to move about in your network so you can observe him can result in additional damage, especially if the attacker can escape the honeynet and begin moving laterally throughout the environment.

    Vampires are known for their social engineering skills. They will try to deceive their victims into inviting them in. Likewise, attackers often use social engineering to get unsuspecting users to invite them in. Unfortunately, unlike vampires, the attackers that target organizations can also enter without an invitation. Fortunately, defenders can use deception to identify the attacker within their network. Deception tactics are not limited to external-facing honeypots and honeynets. You do not have to invite the vampire into your home. In fact, you probably should not (unless you are sure of your abilities at wielding a wooden stake). The same goes for the cyber attacker. Instead of using deception to invite the attacker in, defenders can use deception as a warning system of possible intruders.

    So when your perimeter defenses, such as firewalls, IDPSs, garlic, and crosses, do not work, and the cyber attacker or vampire enters your premises, you can leverage deception to shine a light on them. Deception within your environment can act as an early warning system of possible intrusions, much like using mirrors to detect vampires. Then, once you are alerted to their presence, you can vanquish them by shining sunlight on them or driving a stake through their heart. Of course, I am not encouraging you to drive a stake through the cyber attacker's heart. That would be illegal. But you can evict the attacker from your network.

    Attendee Objectives

    • Understand the deception methods that companies can implement, including their strengths and weaknesses.
    • Develop strategies for a practical deception program to enhance cybersecurity while reducing risks.
    • Learn the best approaches to deal with vampires and cyber adversaries.

Donnie Wendt Videos

  • How malicious actors can poison machine learning

Donnie Wendt Books

  • The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense
    The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense

FAQs on booking Donnie Wendt

  • How do I book Donnie Wendt to speak at my event?

    Our experienced booking agents have successfully helped clients around the world secure speakers like Donnie Wendt for speaking engagements, personal appearances, product endorsements, or corporate entertainment since 2002. Click the Check Availability button above and complete the form on this page to check availability for Donnie Wendt, or call our office at 1.800.698.2536 to discuss your upcoming event. One of our experienced agents will be happy to help you get speaking fee information and check availability for Donnie Wendt or any other speaker of your choice.
  • What are the speaker fees for Donnie Wendt

    Speaking fees for Donnie Wendt, or any other speakers and celebrities, are determined based on a number of factors and may change without notice. The estimated fees to book Donnie Wendt are for live events and for virtual events. For the most current speaking fee to hire Donnie Wendt, click the Check Availability button above and complete the form on this page, or call our office at 1.800.698.2536 to speak directly with an experienced booking agent.
  • What topics does Donnie Wendt speak about?

    Donnie Wendt is a keynote speaker and industry expert whose speaking topics include Artificial Intelligence, Authors, Cybersecurity, Disruptive Thinking, Innovation, Security & Defense, Thought Leadership.
  • Where does Donnie Wendt travel from?

    Donnie Wendt generally travels from St. Louis, MO, USA, but can be booked for private corporate events, personal appearances, keynote speeches, or other performances. For more details, please contact an AAE Booking agent.
  • Who is Donnie Wendt’s agent?

    AAE Speakers Bureau has successfully booked keynote speakers like Donnie Wendt for clients worldwide since 2002. As a full-service speaker booking agency, we have access to virtually any speaker or celebrity in the world. Our agents are happy and able to submit an offer to the speaker or celebrity of your choice, letting you benefit from our reputation and long-standing relationships in the industry. Please click the Check Availability button above and complete the form on this page including the details of your event, or call our office at 1.800.698.2536, and one of our agents will assist you to book Donnie Wendt for your next private or corporate function.
  • What is a full-service speaker booking agency?

    AAE Speakers Bureau is a full-service speaker booking agency, meaning we can completely manage the speaker’s or celebrity’s engagement with your organization from the time of booking your speaker through the event’s completion. We provide all of the services you need to host Donnie Wendt or any other speaker of your choice, including offer negotiation, contractual assistance, accounting and billing, and event speaker travel and logistics services. When you book a speaker with us, we manage the process of hosting a speaker for you as an extension of your team. Our goal is to give our clients peace of mind and a best-in-class service experience when booking a speaker with us.
  • Why is AAE Speakers Bureau different from other booking agencies?

    If you’re looking for the best, unbiased speaker recommendations, paired with a top-notch customer service experience, you’re in the right place. At AAE Speakers Bureau, we exclusively represent the interests of our clients - professional organizations, companies, universities, and associations. We intentionally do not represent the speakers we feature or book. That is so we can present our clients with the broadest and best performing set of speaker options in the market today, and we can make these recommendations without any obligation to promote a specific speaker over another. This is why when our agents suggest a speaker for your event, you can be assured that they are of the highest quality with a history of proven success with our other clients.

Donnie Wendt is a keynote speaker and industry expert who speaks on a wide range of topics such as The Cybersecurity Trinity: Artificial Intelligence, Automation & Active Cyber Defense, Artificial Intelligence: Cybersecurity’s Friend & Foe, Security Automation: Strategies for Success (and Failure) and Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience. The estimated speaking fee range to book Donnie Wendt for your event is $5,000 - $10,000. Donnie Wendt generally travels from St. Louis, MO, USA and can be booked for (private) corporate events, personal appearances, keynote speeches, or other performances. Similar motivational celebrity speakers are Alex Hamilton, Alex Goryachev, Michael Kanaan, Maia Brenner and Seth Dobrin. Contact All American Speakers for ratings, reviews, videos and information on scheduling Donnie Wendt for an upcoming live or virtual event.

Topics

Video

Books

FAQs

Check Availability

Tell us about your event!

During normal business hours, we respond to most inquiries within 4 hours.

  • Customized Service

    Our agents find the right fit for your event

  • Unparalleled Database

    Full access to all speakers & celebrities

  • One Stop Shopping

    A reliable and unbiased point of contact

  • Logistics Management

    Your personal Logistics Manager who takes care of all event details

This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.

All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.

If you are the talent and wish to request a profile update or removal from our online directory, please submit a profile request form.