Embracing Future Opportunities and Respecting Past Accomplishments
Welcome to the Hunter Storm Speaking Engagements page.
Upcoming Presentations
Here are my upcoming speaking engagements. Join me to explore a wide range of topics, including insider threat lessons, enterprise protection strategies, and actionable guidance from decades of hands-on experience.
ISACA Central Ohio Chapter | Femme Fatale to Federal Whistleblower: Lessons in Risk, Governance, and Resilience
January 8, 2026, 12:00 PM Eastern Standard Time (EST)
Register for Hunter Storm’s presentation at the ISACA Central Ohio Chapter event link
Summary:
Hunter Storm, CISO, SOC Black Ops veteran, and creator of Hacking Humans | The Ports and Services Model of Social Engineering, takes audiences on a journey from insider perspective to federal whistleblower. In this session, she shares her unique insights into organizational risk, insider threats, and navigating retaliation while maintaining integrity.
Drawing on high-stakes operations, The Storm Project | AI, Cybersecurity, Quantum, and the Future of Intelligence, and cross-disciplinary experience in AI, cybersecurity, and cyber-physical systems, Hunter provides actionable strategies for spotting threats, strengthening governance, and making decisions in complex environments. Expect a session that is sharp, memorable, and full of practical takeaways—with a touch of irreverence that ensures these lessons are unforgettable.
Read more about this presentation and related lessons in her detailed article: Hunter Storm Presents | Femme Fatale to Federal Whistleblower: Lessons in Risk, Governance, and Resiliance | ISACA Central Ohio Chapter 2026.
Hunter Storm Past Speaking Engagements
- Department of Homeland Security (DHS) and Phoenix Information and Security Privacy Office (ISPO) Spooky Security.
- Texas A&M Department of Computer Science and Engineering (April 2025) Career Panel panelist along with head of Tesla cybersecurity, Level 3 cybersecurity, and more.
- University of Advancing Technology (UAT) Guest Instructor, Security Operations Center Intrusion Detection and Event Correlation.
- Interface Conference Keynote Speaker, Phoenix (2013) Hacking Humans | The Ports and Services Model of Social Engineering.
- Information Security Systems Association (ISSA) Phoenix (2019) The Overlooked Cyber Strategy: Protection from the New Wave of CyberThreats (Professional Attacks, Character Assassination, Doxing, Impersonation, and More).
- NCS Madison CIO Strategy Meeting (Digitize, Transform, Lead, Secure) Phoenix 2019 round table discussion, The Shift in Corporate Cybersecurity Strategies.
- Cybersecurity Council of Arizona (2018) panel, Career Conversations.
- Southwest Cybersecurity Forum (SWCF) formerly known as Arizona Security Practitioner’s Forum (AZSFP) (2007) Hacking Humans | The Ports and Services Model of Social Engineering and BCP / DR Superheroes: How to Save the World from Perilous Pitfalls, Sneaky Scoundrels, and Dastardly Disasters.
- University of Advancing Technology (UAT): Guest instructor on cybersecurity, intrusion detection systems (IDS), intrusion prevention systems (IPS), security operations, and social engineering with Hacking Humans | The Ports and Services Model of Social Engineering.
- Social Engineering Awareness and Prevention: multiple companies and groups
- Wells Fargo: Beginning, Intermediate, and Advanced Information Security
- Wells Fargo: Quantum Technology; Post-Quantum Cryptography (PQC); Information Security Risk Assessments; and Beginning, Intermediate, and Advanced Information Security courses for Enterprise Learning and Development.
Explore More About Hunter Storm
Intrigued by the list of Hunter Storm speaking engagements? Dive into her strategic research and articles. Delve into her speaking topics or choose one of your own and contact her for your next event.
- AI, Cybersecurity, Quantum, and Emerging Technology Consulting
- AI Art | Embracing AI-Generated Images
- Celebrating Your Support | How Hunter Storm’s Metrics Are Rocking the Stage
- Conversations With a Ghost | People in High Stakes Roles
- Hunter Storm Official Site
- Legal
- Navigating the Storm | Historical Cybersecurity Outage Lessons and Best Practices
- Online Reputation Protection | The Ultimate Guide
- Professional Services
- Profile and Career Highlights Hub
- Projects
- Speaker
- Strategic Research and Intelligence
- The Ghosts of IRC | How Early Cybersecurity and PsyOps Pioneers Crossed Paths Without Knowing It
- The Storm Project | AI, Cybersecurity, Quantum, Intelligence, and the Future of Intelligence
About the Author | Hunter Storm: Technology Executive, Global Thought Leader, Keynote Speaker
CISO | Advisory Board Member | Strategic Policy & Intelligence Advisor | SOC Black Ops Team | QED-C TAC Relationship Leader | Systems Architect | Artificial Intelligence (AI), Cybersecurity, Quantum Innovator | Cyber-Physical-Psychological Hybrid Threat Expert | Ultimate Asymmetric Advantage
Background
Hunter Storm is a veteran Fortune 100 Chief Information Security Officer (CISO); Advisory Board Member; Strategic Policy and Intelligence Advisor; SOC Black Ops Team Member; QED-C TAC Relationship Leader; Systems Architect; Risk Assessor; Artificial Intelligence (AI), Cybersecurity, Quantum Innovator; Cyber-Physical-Psychological (Cyber-Phys-Psy) Hybrid Threat Expert; and Keynote Speaker with deep expertise in AI, cybersecurity, quantum technologies, and human behavior. Explore more in her Profile and Career Highlights.
Drawing on decades of experience in global Fortune 100 enterprises, including Wells Fargo, Charles Schwab, and American Express; aerospace and high-tech manufacturing leaders such as Alcoa and Special Devices (SDI) / Daicel Safety Systems (DSS); and leading technology services firms such as CompuCom, she guides organizations through complex technical, strategic, and operational challenges.
Global Expert and Subject Matter Expert (SME) | AI, Cybersecurity, Quantum, and Strategic Intelligence
Hunter Storm is a globally recognized Subject Matter Expert (SME) in artificial intelligence (AI), cybersecurity, quantum technology, intelligence, strategy, and emerging and disruptive technologies (EDTs) as defined by NATO and other international frameworks.
A recognized SME with top-tier expert networks including GLG (Top 1%), AlphaSights, and Third Bridge, Hunter Storm advises Board Members, CEOs, CTOs, CISOs, Founders, and Senior Executives across technology, finance, and consulting sectors. Her insights have shaped policy, strategy, and high-risk decision-making at the intersection of AI, cybersecurity, quantum technology, and human-technical threat surfaces.
Bridging Technical Mastery and Operational Agility
Hunter Storm combines technical mastery with real-world operational resilience in high-stakes environments. She builds and protects systems that often align with defense priorities, but serve critical industries and public infrastructure. She combines first-hand; hands-on; real-world cross-domain expertise in risk assessment, security, and ethical governance; and field-tested theoretical research with a proven track record in high-stakes environments that demand both technical acumen and strategic foresight.
Projects | Research and Development (R&D) | Frameworks
Hunter Storm is the creator of The Storm Project | AI, Cybersecurity, Quantum, and the Future of Intelligence, the largest AI research initiative in history.
Hunter Storm pioneered Hacking Humans | The Ports and Services Model of Social Engineering, introducing foundational concepts that have profoundly shaped modern human-centric security disciplines, including behavioral security, cognitive defense, human risk modeling, red teaming, social engineering, psychological operations (PsyOps), and biohacking. It continues to inform the practice and theory of cybersecurity today, adopted by governments, enterprises, and global security communities.
Hunter Storm also pioneered the first global forensic mapping of digital repression architecture, suppression, and censorship through her project Viewpoint Discrimination by Design | The First Global Forensic Mapping of Digital Repression Architecture, monitoring platform accountability and digital suppression worldwide.
Achievements and Awards
Hunter Storm is a Mensa member and recipient of the Marquis Who’s Who Lifetime Achievement Award, reflecting her enduring influence on AI, cybersecurity, quantum, technology, strategy, and global security.
She is a distinguished member of the Industry Advisory Board at Texas A&M School of Computer Science, where she advises on curricula and strategic initiatives in AI, cybersecurity, and quantum technology.
Hunter Storm is a trusted contributor to ANSI X9, FS-ISAC, NIST, and QED-C, shaping policy, standards, and strategy at the highest levels.
Hunter Storm | The Ultimate Asymmetric Advantage
Hunter Storm is known for solving problems most won’t touch. She combines technical mastery, operational agility, and strategic foresight to protect critical assets and shape the future at the intersection of technology, strategy, and high-risk decision-making.
Hunter Storm reframes human-technical threat surfaces to expose vulnerabilities others miss, delivering the ultimate asymmetric advantage.
Discover Hunter Storm’s full Professional Profile and Career Highlights.
Confidential Contact
Contact Hunter Storm for: Consultations, engagements, board memberships, leadership roles, policy advisory, legal strategy, expert witness, or unconventional problems that require highly unconventional solutions.

Securing the Future | AI, Cybersecurity, Quantum computing, innovation, risk management, hybrid threats, security. Hunter Storm (“The Fourth Option”) is here. Let’s get to work.
