Free Miscellaneous Topics in Chicago
It’s as easy as 1, 2, 3: Browse for a topic, Click the orange request button, Fill out the contact form.
Now the speaker will contact you in the next few days to coordinate details.
In today’s media-rich environment, many policy issues are in the news, but, often not at a significant level of depth. One of the topics of growing interest to many engaged groups is the topic of Climate Change. MORE >The discussion related to Climate Change can be confusing to many. Often, there is uncertainty of what Climate Change is, what are its effects and what can be done about it.
The Citizens Climate Lobby, is a national nonprofit, non-partisan organization that provides presentations to groups such as Rotary Clubs, Kiwanis Clubs, League of Women Voters groups, college clubs and other local groups.
The presentation will educate, enable, and entertain your group members. The presentation can include short videos, slides, stories and time for audience questions. While the length of the presentation is at your discretion, the following topics will be covered:
• How will climate change impact the Chicago area ?
• What climate solutions exist ?
• How can we solve the problem and create jobs, grow GDP, increase household income and improve US competitiveness at the same time ?
• What actions can ordinary citizens take to ensure a stable climate in the future ?
After participating in our meetings, participants often feel more informed, energized and hopeful for a future stable climate. There will be no solicitation of donations or attempts to sell anything.
Please contact me if you would like to discuss this opportunity for a presentation of this timely topic.
This husband/wife team has been successfully training individuals, families and groups in effective communications for 12 years.
Especially if you haven't moved for a long time or feel overwhelmed with change, you will learn how to deal with the challenges home owners face when they are hesitant to sell their homes, even though they know that they should. Join the discussion on what to do and how to do it to make your next move less stressful. MORE >We'll talk about the process of selling your home, getting help with your stuff, the professionals involved and more... A must for adult children and Baby Boomers.
Often travel is seen as a luxury and an expensive hobby, but there is a way to access the world with less money or resources - travel hacking. Edwin dives into this incredibly hot and trending hobby that has picked up the pace globally with people of all ages and backgrounds.
Remodeling our homes is something we may do once in our lifetime. Don't walk into it blindly. Stephanie Bullwinkel, a Certified Bathroom Designer through the National Kitchen and Bath Association, will give you a good feel of what to look for in a contractor, how to assess a budget for your project and designing a space that will continue to look "current" in years to come. MORE >
Joe will tell how to recognize and avoid dangerous situations and how to react to them if necessary. Programs are available for realtors, healthcare professionals as well as the general audience.
Dr. Brickman will discuss the religious topics covered in media like FoxTV, such as “to be religious, you must be judgmental,” “how many religions will kill you if you leave it?” and “as Americans with our PC, and our priorities, we should all have our heads examined.”
Faith is an increasingly controversial topic in US politics. Can diverse faith and secular communities find common ground on our nation’s most pressing issues? Should faith remain personal or can people of faith contribute to US politics? Ted’s non-partisan and holistic conversation offers a new vision for faith-based civic engagement.
UNDERSTANDING AND IMPROVING TEAM DYNAMICS (FOR YOUR BUSINESS & CUSTOMER SERVICE): USING HOSTAGE & CRISIS NEGOTIATION METHODS WITH ACTIVE LISTENING SKILLS
Understanding and Improving Team Dynamics (For Your Business & Customer Service):
Using Hostage & Crisis Negotiation Methods with Active listening skills
Attendees will discover (Learning Points): MORE >The individualities of a Team concept
The difference between Team concept and group concept
The methods by which Teams are utilized within their Company/ Establishment
The idea of self-managing teams
The value of how things are said
The different messages that can be conveyed through how someone hears a word.
How Team Dynamics in the business sector has changed over time.
The loss of translation in a message when used in text/email.
Utilization of Communication skills to increase work and business productivity
As a Homicide Detective and Hostage Negotiator, Stacey not only uses ACTIVE LISTENING SKILLS (ALS) in situations of crisis involving expressive individuals, he also uses the skills to help resolve everyday life and business situations.
This presentation will allow businesses to use the TEAM PROJECT MODEL to help their team members cooperate with each other, with the focus on utilizing distinctive intensities within individual elements among members of a team.
Stacey’s presentation will illustrate that the above model is acceptable. However, a team will not communicate effectively if a team that has been taken apart and separated due to disconnection and lack of communication.
As with all teams, each team was placed together because at the initial conception of the team; it was assumed that the team element is within the excellent working order. However, the appreciation of the team model must be well-oiled, and if not, members of the team will individually lack the proper function that is necessitated for TEAMWORK and fail to produce.
RESEARCH HAS PROVEN THAT THE KEY CATALYST REGARDING TEAM FAILURE IS COMMUNICATION AND THE LACK OF PROPER USAGE OF ONE’S COMMUNICATION SKILLS.
By using ACTIVE LISTENING SKILLS (ALS), a method developed by the FBI, every team member will increase productivity regarding their specific missions, and when united, the team members will form successful finalization of their team-goal. By applying ALS, the team’s entire task will be the result of a collective productive representation of their work.
Stacey’s experience as a Scholar (Forensic Psychology), Adjunct Professor (Group Dynamics/Psychology), and Hostage Negotiator has allowed him the ability to create a method for CIVILIANS to use regarding the application of Communication Skills.
The attendees will take with them SKILLS used by Hostage/Crisis Negotiators, which have been Converted for personal, business, and everyday use.
Minimal Reassurances (Building rapport and encourage individuals to continue talking):
* Attendees will learn to use sounds especially on the phone, to let one person know the other is there and listening. Such as, “Oh?” “When?” and “Really?”
* Attendees will learn to utilize these forms of questions, comments, or sounds that do not interfere with the flow of conversation but will let the other individual know that you are there and listening.
Paraphrasing (This skill clarifies content, highlights issues and promotes a give and take between you and another, it tends to make the other individual a better listener):
* Attendees will appreciate the skill of summarizing what they have just heard and repeated it back in their own words.
* The skill demonstrates listening, creates responsiveness and establishes rapport because it is evident that you have heard and understood.
* Usually, paraphrasing begins with the words, “Are you telling me…” “Are you saying…” or “So, what your saying is….
Mirroring/Reflecting (useful when you are at a loss for words)
* Attendees will learn to use this skill when they need clarification.
* The skill provides an opportunity for the individual to think about what you have said.
* This skill allows the listener to asks for more input without guiding the direction of the other individual’s thoughts
* This skill elicits information when you do not have enough to ask a pertinent question.
Open-Ended Questions (The primary use of this skill is to get individuals to talk)
* Attendees will learn to encourage individuals to say more without directing the conversation.
* This skill is used to have your questions answered with more than just a “yes” or “no.”
* This skill gets information using fewer questions, they typically begin with: how, what, when and where.
* Attendees will discover how to avoid using Closed-end questions such as “why.”
* “Why” questions tend to steer the conversation toward blame and shut down communication.
* “Why” questions also tend to pass judgment.
* This skill gives a feeling of interrogation that makes rapport building difficult and causes you to work harder at thinking up new questions.
“I” Messages (Used when communication is difficult and intense):
* The attendees will discover that “I” messages enable them to let the other individual know how he/she is making you feel, why you think that way, and what the other individual can do to remedy the situation.
* “When you said that, I feel….” or “I feel…. when you said….”
Effective Pauses (Silence)
* The attendees will develop this skill to use when emphasizing their point.
* Silence can be very useful on several levels because most people are not comfortable with silence and will fill it with talk.
* The attendees will discover to use silence just before or just after saying something important.
This lecture/workshop can last from 30 minutes to 1.5 hours.
The lecture is approximately 30 minutes.
The workshop is 1 hour.
The workshop consists of PARTICIPATION from the attendees, using ROLE PLAYING scenarios to give them an authentic feel applying their skills.
Further, if time is not permitted for a 1.5-hour session, at least 1 ROLE PLAYING scenario will be implemented into the 30-minute lecture.
Protecting your company's data: by psychologically evaluating potential Espionage and Spy activity MORE >The audience will be engaged when we will focus on the psychological motivations, to identify the emotional precursors, which lead to CORPORATE ESPIONAGE and SPYING. Combining open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, and SPYING. The presentation/workshop will give participants innovative insights to conduct psychological field profile/assessments and verify potential risk factors. The presentation/workshop will outline the psychological aspects regarding a Data Breaching and possible prevention Data Loss. Furthermore, this presentation/workshop will demonstrate that with the proper preparation, one can evaluate an individual whose psychological profile dictates that they retain the potential to perform CORPORATE ESPIONAGE.
We talk about protecting data; we talk about outside forces seeking to obtain our data by unconventional means. My Presentation/Workshop will speak about PROTECTING or DATA that is stolen from trusted individuals within. One of the most severe threats facing our Businesses and Corporations is the threat of a DATA BREACH. Regardless of the motivation, nature of their associated tactics, techniques, and procedures; the breach in DATA pose a severe challenge to the existence of your organizations future. The persistent nature of this threat and the expectation that it will continue to rank as the most likely scenario; Board executives and administrators will need to contend with soon. The goal of my presentation is to inform Executives/Administrators key signs to help reduce/prevent DATA loss using corporate espionage and theft.
•We talk about protecting data.
•We talk about outside forces seeking to obtain our data by unconventional means.
•I will speak about PROTECTING or DATA that is stolen from trusted individuals within.
MY PRESENTATION WILL ENGAGE THE AUDIENCE:
We will focus on their psychological motivations, to identify the emotional precursors.
Combining open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, and SPYING.
The presentation will give participants innovative insights to conduct psychological field profile/assessments and verify potential risk factors. This presentation will outline the mental aspects regarding a Data Breaching and possible prevention Data Loss.
Furthermore, this presentation will demonstrate that with the proper preparation, one can evaluate an individual whose psychological profile dictates that they retain the potential to perform CORPORATE ESPIONAGE.
One of the most severe threats facing our Businesses and Corporations is the threat of a DATA BREACH. Regardless of the motivation, nature of their associated tactics, techniques, and procedures; the breach in DATA pose a stiff challenge to the existence of your organizations future.
The persistent nature of this threat and the expectation that it will continue to rank as the most likely scenario; Board executives and administrators will need to contend with soon.
The goal of my presentation is to inform Executives/Administrators key signs to help reduce/prevent DATA loss using corporate espionage and theft.
My workshop will contain two main sections:
• The first section will discuss the PSYCHOLOGY of spy/thief,
• The second section will deal with the process of identifying individuals who seek to harm the company.
The first section will cover a brief history of CORPORATE ESPIONAGE and incidents involving same.
The psychological concepts behind DATA BREACHES (within) and CORPORATE will be discussed thoroughly.
For this segment, I will be utilizing role-playing scenarios to introduce to the PARTICIPANTS how “everyday people skills” can be used to conduct a Criminal/Psychological profile to aid in determining potential corporate spies/thieves.
That said, executives should safeguard administrative tools for their company to complement its data security effectively. The Board of directors and its administration treat the protection of their data to warrant the risk of a breach of data, and this includes PERSONNEL.
In today's world of CYBER-RISK and CYBER-SECURITY, we sometimes forget about the individuals, or dare I say SUSPECTS behind the BREACH, ATTACH or THEFT. We neglect these individuals until it is too late, and the damage has been done.
Individuals such as:
EDWARD J. SNOWDEN
The media hails him as a “whistleblower,” but MR. SNOWDEN stole DATA belonging to the NSA and disseminated said data to individuals with unauthorized access.
•William Binney (NSA)
•Jose Ignacio Lopez (GM)
Chief of productions accused of corporate espionage.
•Steven Louis Davis (Gillette)
Pled guilty to theft of trade secrets
•Patricia Dunn (Hewlett-Packard)
Involved in a spying scandal
•Ross Klein and Amar Lalvani (Starwood Hotels)
downloaded confidential Starwood information to use later at Hilton.
This second section will focus more on people reading skills and identifying micro-expressions.
This segment of the workshop will help the PARTICIPANTS identify the traits, behaviors, and body language of individuals.
The conclusion at the end the second section will consist of a hands-on practice session:
I will ask PARTICIPANTS to apply what they have learned by identifying potential RISKS by profiling random social media accounts of individual, based on photographs, social media postings, likes, friends, and so forth.
• Note: not only have past participants found this method fun, but they have also found it to be reliable and proven reliable. I utilize this method throughout my profiles of gang members, narcotics traffickers, white-collar criminals and more.
The protection of a company's data is not just an issue for the IT department. Data security is a crucial element of a corporation's security mainframe, necessitating executive surveillance. The breach of data has immediate licit consequences, which executives must comprehend.
The topic of data security must be addressed in every board meeting and said boards should be equipped with the tools to obtain proficiency, which will allow them to encounter with matters surrounding data security.
MY PRESENTATION WILL ENGAGE THE AUDIENCE:
Therefore, for this workshop, we will combine open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, and SPYING.
The presentation is fun, excite, informative and addictive.
Further, the presentation is lengthy (but not dry nor ever dull), it averages about 1.5 hours. However, it can be condensed to approximately 45 minutes. What I would do (and this involves summarizing all my lectures/presentations) is to reduce my open discussions (Q&A from the audience) and limit my role-playing scenarios.
However, the role-play segment gets the attendees involved and some even attempt to test their new-found aptitudes soon after. For example, some would attempt to use said skills while at dinner, lounge, and so forth. However, it can be reduced to one or two “mock-type scenarios.”
This segment is vital because it proves sound regarding the utilization of one’s everyday skills to psychologically profile.
I have used this method in the past regarding COLD HOMICIDE CASES, PREPARATIONS before INTERVIEWING SUSPECTS and PROFILING current cases.
This lecture/presentation will conform to discussions regarding cyber-attacks/incidents and will entail the psychological unmasking of individuals behind the attacks.
For example; a car thief would look at the vulnerability of the anti-theft system protecting a vehicle. However, how does that thief know what weaknesses to look for, the same goes for
The necessity for societal psychosomatic tactics is also suggested by the fact that significant cybersecurity episodes from motivations as wide-ranging as monetary profit and radical/philosophical dissent. These are frequently initiated by cliques, as opposed to a single person acting by him/herself.
My goal is to offer attendees additional preventive measures by exposing abilities they have within, the purpose of this segment is to make individuals aware of influences that they have, using one's observational skills to detect the behavior of potential attackers.
Key takeaways from the:
Performing assessments on a psychological and cybersecurity platform
Enhanced abilities to evaluate security efficiency within his/her organizational structure
Authentic mock scenarios regarding attack vectors and how to respond or set up a novel response system in response to same (this method is formatted to my active shooter drill, it pertains to the aftermath and the preparation to make a quick recovery and training for the aftershock)
*Security Systems Integrators
*IT and Cybersecurity Leaders
*Product Developers and Manufacturers
*Senior Technology Business Executives
*Security Specifiers and Engineers
*Anyone who is responsible for the cybersecurity of integrated security systems!
PREREQUISITE KNOWLEDGE FOR ATTENDEES:
Good observation skills, Communication skills, and People skills