Home Wes O'Donnell

Wes O'Donnell

A veteran of both the US Army and US Air Force, Professor Wes O’Donnell is a highly sought after presenter who has recently spoken at TEDx on Data Visualization and the US Air Force Academy on Leadership. He is noted for his fascinating, informative, dynamic and entertaining keynotes. Wes educates companies and government organizations on a number of topics ranging from emerging technology and big data visualization to veteran’s issues and leadership. But Wes’ best talks tend to center around his personal journey from poverty to distinguished entrepreneur and professor; a truly inspiring journey.

A New Trojan Horse: The Kaspersky Software Hack of US Intelligence

According to legend, when the warring Greeks were unable to pierce the defenses of the city of Troy, they presented Troy with a gift – a huge, hollow wooden horse known as the "Trojan Horse." Since then, the term "Trojan horse" has come to refer to subversion or sabotage from within.

Creating a Mature Cybersecurity Program Requires Going Back to the Basics

Cybersecurity remains among the hottest points of debate among corporate leaders, boards of directors and company executives. The issue: What an organization needs to be secure depends significantly on many different variables, and no one seems to understand what cybersecurity is or how to manage it.

Cybersecurity in the Workplace Needs to Be Everyone's Concern

To prevent future breaches that harm organizations, it is vital for everyone within an organization to get involved in protecting company cybersecurity.

Sharing Personal Information: When Is It Worth the Risk of a Cybersecurity Breach?

We are all confused by the bombardment of daily news informing us of cyber breaches that involve our personal information. Our anxiety level is constantly on "hyperdrive" as we worry about the impact on ourselves and our loved ones.

Cybersecurity's Evolution and Future Ways to Deter Cybersecurity Lapses

Over the past decades, technology has developed and become more powerful, forcing cybersecurity to evolve along with it. Hackers have progressed from mere phone phreaking, worms and viruses to ransomware attacks and highly sophisticated hacks on high-profile targets.

Regular Software Patches Could Have Prevented Equifax Breach

The havoc caused by the Equifax breach will last for years. And it could all have been avoided by simply updating the system with the new software patches.

Why Do Organizations Still Remain Vulnerable to Security Breaches?

Companies that fail to protect their data suffer financial losses. Despite news of these breaches, some organizations still fail to protect themselves.

Security Considerations for the Rapidly Growing Internet of Things

Ideally, data transmitted through IoT devices will be secure from query to response. But has our ability to collect data outpaced our ability to protect it?

Student Profile: Blocking Evolving Cybersecurity Threats and Maintaining Computer Security

After serving in the Marine Corps, Michael Woods went on to pursue his interests by obtaining a degree through AMU in the field of Information Systems Security.

Will Artificial Intelligence Become Our Lifelong Friend or Our Eventual Foe?

Artificial intelligence has its roots in both myth and science. In the 20th century, artificial intelligence started its transformation from ancient myth and legend to man-made reality.