Free Miscellaneous Topics in Chicago

It’s as easy as 1, 2, 3: Browse for a topic, Click the orange request button, Fill out the contact form.
Now the speaker will contact you in the next few days to coordinate details.

SORT: MOST RECENT | A - Z
  • Carbon Pricing – What’s In It for You?

    Mike Zanillo, Volunteer and Illinois State Co-Coordinator, Citizens Climate Lobby (CCL)

    In today’s media-rich environment, many policy issues are in the news, but, often not at a significant level of depth. One of the topics of growing interest to many engaged groups is the topic of Climate Change. MORE >

    The discussion related to Climate Change can be confusing to many. Often, there is uncertainty of what Climate Change is, what are its effects and what can be done about it.

    The Citizens Climate Lobby, is a national nonprofit, non-partisan organization that provides presentations to groups such as Rotary Clubs, Kiwanis Clubs, League of Women Voters groups, college clubs and other local groups.

    The presentation will educate, enable, and entertain your group members. The presentation can include short videos, slides, stories and time for audience questions. While the length of the presentation is at your discretion, the following topics will be covered:
    • How will climate change impact the Chicago area ?
    • What climate solutions exist ?
    • How can we solve the problem and create jobs, grow GDP, increase household income and improve US competitiveness at the same time ?
    • What actions can ordinary citizens take to ensure a stable climate in the future ?

    After participating in our meetings, participants often feel more informed, energized and hopeful for a future stable climate. There will be no solicitation of donations or attempts to sell anything.

    Please contact me if you would like to discuss this opportunity for a presentation of this timely topic.

    Request This Free Speech
  • We talk Cyber Security But: What about Protecting your company’s data, by psychologically evaluating potential Espionage and Spy activity?

    Stacey Jenkins, M. Psych, Founder, Adjunct Professor, Crux Conception

    Company’s today should be equipped to safeguard administrative tools for their company to complement its data security effectively. The Board of directors and its administration treat the protection of their data to warrant the risk of a breach of data, and this includes PERSONNEL. MORE >

    In today’s world of CYBER-RISK and CYBER-SECURITY, we sometimes forget about the individuals, or dare I say SUSPECTS behind the BREACH, ATTACH or THEFT. We neglect these individuals until it is too late, and the damage has been done. Individuals such as:

    EDWARD J. SNOWDEN The media hails him as a “whistleblower,” but MR. SNOWDEN stole DATA belonging to the NSA and disseminated said data to individuals with unauthorized access.

    •William Binney (NSA) •Jose Ignacio Lopez (GM) Chief of productions accused of corporate espionage. •Steven Louis Davis (Gillette) Pled guilty to theft of trade secrets.

    •Patricia Dunn (Hewlett-Packard) Involved in a spying scandal.

    •Ross Klein and Amar Lalvani (Starwood Hotels) downloaded confidential Starwood information to use later at Hilton.

    •We talk about protecting data. •We talk about outside forces seeking to obtain our data by unconventional means. •I will speak about PROTECTING or DATA that is stolen from trusted individuals within.

    MY PRESENTATION WILL ENGAGE THE AUDIENCE: We will focus on their psychological motivations, to identify the emotional precursors. Combining open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, mental autopsy, precursors to ESPIONAGE, and SPYING.

    The presentation will give participants innovative insights to conduct psychological field profile/assessments and verify potential risk factors. This presentation will outline the mental aspects regarding a Data Breaching and possible prevention Data Loss.

    Furthermore, this presentation will demonstrate that with the proper preparation, one can evaluate an individual whose psychological profile dictates that they retain the potential to perform CORPORATE ESPIONAGE.

    One of the most severe threats facing our Businesses and Corporations is the threat of a DATA BREACH. Regardless of the motivation, nature of their associated tactics, techniques, and procedures; the breach in DATA pose a stiff challenge to the existence of your organizations future.

    The persistent nature of this threat and the expectation that it will continue to rank as the most likely scenario; Board executives and administrators will need to contend with soon. The goal of my presentation is to inform Executives/Administrators key signs to help reduce/prevent DATA loss using corporate espionage and theft.

    My workshop will contain two main sections: • The first section will discuss the PSYCHOLOGY of spy/thief, • The second section will deal with the process of identifying individuals who seek to harm the company.

    The first section will cover a brief history of CORPORATE ESPIONAGE and incidents involving same.

    The psychological concepts behind DATA BREACHES (within) and CORPORATE will be discussed thoroughly.

    For this segment, I will be utilizing role-playing scenarios to introduce to the PARTICIPANTS how “everyday people skills” can be used to conduct a Criminal/Psychological profile to aid in determining potential corporate spies/thieves.

    As stated earlier:

    That said, executives should safeguard administrative tools for their company to complement its data security effectively. The Board of directors and its administration treat the protection of their data to warrant the risk of a breach of data, and this includes PERSONNEL.

    In today’s world of CYBER-RISK and CYBER-SECURITY, we sometimes forget about the individuals, or dare I say SUSPECTS behind the BREACH, ATTACH or THEFT. We neglect these individuals until it is too late, and the damage has been done. Individuals such as:

    EDWARD J. SNOWDEN The media hails him as a “whistleblower,” but MR. SNOWDEN stole DATA belonging to the NSA and disseminated said data to individuals with unauthorized access.

    •William Binney (NSA) •Jose Ignacio Lopez (GM) Chief of productions accused of corporate espionage. •Steven Louis Davis (Gillette) Pled guilty to theft of trade secrets.

    •Patricia Dunn (Hewlett-Packard) Involved in a spying scandal.

    •Ross Klein and Amar Lalvani (Starwood Hotels) downloaded confidential Starwood information to use later at Hilton.

    This second section will focus more on people reading skills and identifying micro-expressions. This segment of the workshop will help the PARTICIPANTS identify the traits, behaviors, and body language of individuals.

    The conclusion at the end the second section will consist of a hands-on practice session: I will ask PARTICIPANTS to apply what they have learned by identifying potential RISKS by profiling random social media accounts of individual, based on photographs, social media postings, likes, friends, and so forth.

    • Note: not only have past participants found this method fun, but they have also found it to be reliable and proven reliable. I utilize this method throughout my profiles of gang members, narcotics traffickers, white-collar criminals and more.

    The protection of a company’s data is not just an issue for the IT department. Data security is a crucial element of a corporation’s security mainframe, necessitating executive surveillance. The breach of data has immediate licit consequences, which executives must comprehend.

    The topic of data security must be addressed in every board meeting and said boards should be equipped with the tools to obtain proficiency, which will allow them to encounter with matters surrounding data security.

    MY PRESENTATION WILL ENGAGE THE AUDIENCE: Therefore, for this workshop, we will combine open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, and SPYING.

    The presentation is fun, excite, informative and addictive.

    Further, the presentation is lengthy (but not dry nor ever dull), it averages about 1.5 hours. However, it can be condensed to approximately 45 minutes. What I would do (and this involves summarizing all my lectures/presentations) is to reduce my open discussions (Q&A from the audience) and limit my role-playing scenarios.

    However, the role-play segment gets the attendees involved and some even attempt to test their new-found aptitudes soon after. For example, some would attempt to use said skills while at dinner, lounge, and so forth. However, it can be reduced to one or two “mock-type scenarios.”

    This segment is vital because it proves sound regarding the utilization of one’s everyday skills to psychologically profile.

    I have used this method in the past regarding COLD HOMICIDE CASES, PREPARATIONS before INTERVIEWING SUSPECTS and PROFILING current cases.

    This lecture/presentation will conform to discussions regarding cyber-attacks/incidents and will entail the psychological unmasking of individuals behind the attacks.

    For example; a car thief would look at the vulnerability of the anti-theft system protecting a vehicle. However, how does that thief know what weaknesses to look for, the same goes for

    The necessity for societal psychosomatic tactics is also suggested by the fact that significant cybersecurity episodes from motivations as wide-ranging as monetary profit and radical/philosophical dissent. These are frequently initiated by cliques, as opposed to a single person acting by him/herself.

    My goal is to offer attendees additional preventive measures by exposing abilities they have within, the purpose of this segment is to make individuals aware of influences that they have, using one’s observational skills to detect the behavior of potential attackers.

    Key takeaways from the:

    Performing assessments on a psychological and cybersecurity platform

    Enhanced abilities to evaluate security efficiency within his/her organizational structure

    Authentic mock scenarios regarding attack vectors and how to respond or set up a novel response system in response to same (this method is formatted to my active shooter drill, it pertains to the aftermath and the preparation to make a quick recovery and training for the aftershock).

    Request This Free Speech
  • Bullying: When the Victim Becomes the Aggressor

    Stacey Jenkins, M. Psych, Founder, Adjunct Professor, Crux Conception

    There have been several lectures and presentations delivered to parents, educators, and students regarding Bullying and its outcome. However, we seldom hear about what turns the Victim into becoming the aggressor and potentially causing mass acts of violence. Stacey’s Anti-Bullying method is an approach that was carefully selected and proven academically sound. Appropriated from the Scared-Straight scheme (minus the cursing and yelling). Stacey’s delivery will outline the emotional, vicious and retaliatory facets of BULLYING (from a VICTIM’S perspective). MORE >

    Further, this lecture through audience participation via; ROLE PLAY scenarios, students, with proper preparation, can adapt and gain both compassion and understanding to the psychological harms, which could dictate an act that could potentially involve violence resulting in mass casualties.

    Using Criminal Profiling Techniques, Stacey will Profile Social media accounts (not associated to any audience member) of individuals who are “BEEFING” or “HARASSING,” to display insecurities surrounding bullying including the emotional and dangerous scares it launches.

    Social media is the custom for our children, they use their cellular phones, computers, and added means to interconnect every day. Frequently, these devices are exploited as harmful techniques to bully other children, sexting, and additional acts, which can advance to violence.

    Participation is KEY, therefore, expect Stacey to move around the lecture area to get students involved. To do that, Stacey lightens the mood and shares with the audience a personal story to allow them to see that “we are all human,” and that we all have issues in our lives, which people can and will use against us to HARM, BULLY, or HUMILIATE.

    By using Stacey’s method of HUMOR and Affection titled the “DR. DRE METHOD.”

    Attendees will learn to:
    D. DISCOVER the cause of their Stress (Bullying)
    R. RECOGNIZE that the Stress is affecting their lives
    D. DODGE future Stress elements
    R. REGAIN self-esteem
    E. EQUALIZE the threat of Stress reappearance (by talking to someone and never keep it in)

    As a former SCHOOL RESOURCES OFFICERS, now Homicide Detective and Scholar, Stacey is confident that his lecture will benefit not only the Students but School Administrators as well.

    That said if you ask any educator what’s the most severe threat facing our educational system: he or she will most likely say, that it is the threat of an active shooter.

    The lecture will assist WITH DEVELOPING an added perception about PERSONALITIES, RUMORS OF BULLYING, HOW TO REACT TO THREATS MADE BOTH IN SCHOOL OR ON SOCIAL MEDIA and the ability to evaluate them and incorporating them into an informative narrative, which will benefit school superiors/administrators alike.

    Dear event organizer,

    You are probably saying to yourself that this seems lengthy? The length of my presentation is two hours, but it can be condensed and has been condensed in the past; to 90 minutes with advanced notice.

    Key takeaways from the lecture:

    * Emphases on all aspects of Bullying and Victimization
    * Stresses on protecting the Victim and best-advanced programs/methods
    * Your Students will get the maximum quality professional training imaginable
    * Emphases on safe/courteous social networking and anti-cyberbullying
    * Coping Methods to overcome obstacles regarding peer-pressure and “Fitting-In.”
    * Motivate individuals to participate in the ANTI-BULLYING movement with enthusiasm
    * The student body will lean to produce a safe educational atmosphere for all their classmates
    * Awareness of disability-targeted bullying & harassment and in schools

    Request This Free Speech
  • Get a Great Date – Do You Know What Holds You Back?

    Molly Hillig Rodriguez, Molly Hillig, RN, MPH, Relationship Expert, Molly Hillig Rodriguez - Empower Yourself Coaching

    The truth is there are no tricks, no gimmicks, just steps to evolve yourself into a stellar dater and find great love. Each human desires to have a great dating career and find love. Learn to do it! This interactive workshop will change the way you look at dating. Too many people today look at dating all wrong and are left feeling overwhelmed. They do not have the right dating tools. MORE >

    What you will learn:
    How to date with meaning and success this year
    Why people ghost, bail or turn out to be not what you hoped?
    How to see results with your time and money
    How to be more attractive

    You will learn great dating skills, the best and successful daters in the world know them.

    Request This Free Speech
  • Take the Mystery Out of Selling Your Home

    Dale Tippett, Managing Broker, DALE D. TIPPETT, Licensed Real Estate Managing Broker

    Especially if you haven't moved for a long time or feel overwhelmed with change, you will learn how to deal with the challenges home owners face when they are hesitant to sell their homes, even though they know that they should. Join the discussion on what to do and how to do it to make your next move less stressful. MORE >

    We'll talk about the process of selling your home, getting help with your stuff, the professionals involved and more... A must for adult children and Baby Boomers.
    Request This Free Speech
  • Domestic Violence: Treating the Abuser

    Rob Johnson, LCPC, Crossroads Counseling of Chicago

    It is not widely recognized that the perpetrators of domestic violence need help. In Partner Abuse Intervention, participants learn skills for handling conflict. Rob will discuss the background, curriculum and outcome of this intervention.

    Request This Free Speech
  • Why Some Divorce Lawyers Hate Me

    Melanie Griffis Jones, MA, LPC, ACCTH, TraceSuccessful and Griffis/Jones & Associates

    I am a certified mental health professional professionally trained as a Divorce Mediator. Using my services rather than two attorneys can cut the cost of getting a divorce dramatically. That is why some divorce attorneys don't like people to know about me or my peers. MORE >

    Since over 50% of all marriages end in divorce (and the rate is even higher for 2nd or 3rd marriages) I want to share information about how couples can secure a divorce without spending thousands of dollars on attorney fees and can avoid much of the anger and bitterness that too often results from the disagreements they have.

    It is only in the past few years mental health professionals, rather than lawyers, have been trained in all facets of divorce mediation. I can explain why therapists make better mediators than attorneys. Our listening skills, calm behavior, non-judgmental attitude all are better suited to deal with sensitive issues. Compassion and empathy usually aren't adjectives used to describe lawyers yet they are necessary traits for a therapist.

    Key words like "Free and Equitable" make each divorce different in the eyes of the court. I know the "How and Why" 100% of all issues need to be resolved before filing divorce documents and when it is possible to use one attorney for a nominal fee rather than two - spending far too much of either parties earnings.

    Trained as both a divorce mediator and a mental health professional, I serve as a non-biased, neutral facilitator eager to help resolve areas of disagreement and prepare the Memorandum of Understanding needed to expedite a simple divorce document and secure an Uncontested Divorce. We all have first or second hand knowledge of bitter and expensive divorces. Letting the world know there is a better option is my motivation to speak to your group.

    Request This Free Speech
  • Personal Safety and Self Defense

    Joe Rosner, Self-Defense Teacher, Best Defense of Illinois

    Joe will tell how to recognize and avoid dangerous situations and how to react to them if necessary. Programs are available for realtors, healthcare professionals as well as the general audience.

    Request This Free Speech
  • Beer Tasting as a Path to Self-Awareness

    Randy Mosher, Principal, Randy Mosher Design

    As absurd as it sounds, learning to taste beer—or anything—brings us into contact with our hidden minds and makes us more aware of our total self. Through a tour of the art of tasting, Mosher illuminates some of the strange ways we interact with the world, many of which are unconscious and often quite surprising. And it's all supported by rapid advances in sensory science, making the case that paying attention to what we're doing as tasters can lead to a better understanding of who we are as people and a more meaningful appreciation of the world around us. MORE >

    Note: This lecture can be done with or without beer, although of course it is a lot more fun with a half a dozen beer samples to run through. Time needed: approximately 45–60 minutes (perhaps a little more with beer)
    Request This Free Speech
  • Transgender Identity and A Third Gender of the Future

    Melanie Griffis Jones, MA, LPC, ACCTH, TraceSuccessful and Griffis/Jones & Associates

    I have been working as a therapist with individuals with Gender Identity issues for close to 15 years. When I started most of my clients were mature adults who suffered from fear, shame and guilt. They kept this part of their lives as a deep secret, sometimes not even telling those closest to them about their gender issue. Today, with celebrities going public with their gender changes and TV shows and movies featuring trans individuals, I am seeing more and more teenagers "coming out" as transgender. It is almost becoming "in" to be trans among younger people. MORE >

    Years ago when I first started talking to groups about gender identity, there would be uncomfortable murmurs in the audience. Then I stated that everyone in the room knew someone one was transgender but just didn't know that about them. Today, almost everyone does personally knows someone who identifies as trans; either in their own family, at work, or via a friend talking about someone else in their life.

    While I am thankful having a gender identity issue isn't the terrible secret or shame it was 15 years ago, a new concern has surfaced. Having doubts or confusion about gender identity doesn't always mean a person should change from male to female or female to male. Rushing into hormones and surgeries without due process is now causing as many suicides as did identifying as trans 10 years ago. Truly getting to know oneself and how to identify as male, female, non or bi, gender fluid or whatever the newest key word is for those who see themselves as neither male or female, regardless of genital organs.

    My other concern is with those who want to change immediately and unethical doctors willing to go along with that. There are guidelines to follow, there is extensive counseling to work through, and resolving other issues first all need to be part of the process of coming to a healthy place with one's gender, one's body and one's mind. I welcome helping individuals work through all of this and the general population to better understand all the components of gender identity.

    Request This Free Speech