Corey White
Corey White is tasked with helping leaders look out into the future and anticipate how technology will impact their organizations and themselves. He is focused in the areas of machine intelligence, cybersecurity, and data privacy. Corey offers insights into how complex innovation is dramatically altering the world we live in ways that can be both positive and negative. He speaks in front of audiences on a range of topics including algorithmic bias, online extremism, data privacy, cybersecurity awareness, and parenting in the digital age.
TOPICS
When an Algorithm is Biased: How Artificial Intelligence can Amplify Inequities>>
The Evolving State of Data Privacy Regulations>>
Battling Online Extremism at the Source>>
Disinformation and the Future of Digital Security in a Hyper-Connected World >>
AV Requirements
A/V & Room Spec Request Sheet
The following is a list of room & A/V preferences. Please know these are flexible if there are extenuating circumstances.
Staging
Corey will use his laptop from the stage, so a podium or table is needed, along with a stable internet connection.
Microphone
Wireless lavaliere microphone is preferred.
Screen & Computer Projection System
Corey will use his own laptop because he often has music and video files that would not be easy to move to another computer. He uses a MacBook Pro. An LCD projector system compatible with a Mac computer is required, as well. He typically brings his own cables to accommodate basic setups, however any cables or accessories you provide, so long as they are “mac-friendly” can be used to project.
Media/PowerPoint/Materials
Corey uses “Keynote” to create media presentations and often works on it up until the last minute, because of the way he often customizes for each audience. For these reasons, he does not typically submit slides in advance. Please let us know if you have any deadlines for materials, so we can do our best to meet them.
Recording
We encourage video recording for archival purposes, but a separate agreement is required and a licensing fee may apply, depending on how you plan to use the recording after the event. If you plan to record any portion of Corey’s presentation, please call our office to request a Recording Agreement. It is not uncommon for our speakers to bring a video professional to film for our own archives. If this will occur we will discuss before the event to insure that any filming we conduct would not be disruptive to the event.
Corey's Bio & Topics
Corey is tasked with helping leaders look out into the future and anticipate how technology will impact their organizations. He is focused in the areas of machine intelligence, cybersecurity, and data privacy. Corey began his career as a journalist before joining Future Point of View. As a journalist, he developed investigative skills as well as a desire to understand complicated topics and to explain those topics in a way that everyone can understand. He often brings these skills to the speaking stage where he offers insights into how complex innovation is dramatically altering the world we live in ways that can be both positive and negative.
Speaking Topics
When an Algorithm is Biased: How Technology Can Amplify Inequities
Machine intelligence is playing an increasing role in every aspect of our lives. Machine learning algorithms are helping to decide the colleges we are accepted into, the job interviews we receive, the homes we can purchase, even the people we date. What happens when those algorithms are biased? In this presentation, Corey will describe how technology is helping to magnify harmful bias and stereotypes. He will explain how historic prejudices and inequalities are being injected into the algorithms that fuel machine intelligence. These tools are then being used to make important determinations with profound impacts. He will ultimately show attendees how they can work to change this dangerous reality.
Learning Objectives
- Understanding how algorithms work and how they are playing an increasing role in decisions that are shaping important areas of our lives
- Examples of different types of bias in algorithms and how they manifest into real world consequences
- How attendees can spot bias in algorithms, work to ensure that algorithms are fair, and ultimately how technology is being used to solve this critical issue
The Evolving State of Data Privacy Regulations
Since 2013, billions of records have been lost or stolen. Mega breaches and leaks happen at a breathtaking frequency, and this reality has no signs of dissipating. Data breaches suffered by organizations like OPM, Equifax, and countless others have left millions of people’s personal and financial information vulnerable to theft. Because of this, there is mounting personal data privacy by consumers and tightening regulation by governments on businesses. In this presentation, Corey will take a look at the current state of data privacy legislation including GDPR, the California Consumer Privacy Act, and other important data privacy regulations that will impact organizations and enterprises in America and throughout the world. Corey will review these regulations and offer practical steps that organizations can make to get compliant with constricting data privacy restrictions and improve the way they handle consumer data.
Learning Objectives
- An up to the minute look at the latest regulations organizations should be aware of in American and around the world
- The ways organizations must adhere to increasingly complex regulations
- The practical steps organizations should take to ensure they understand the data they possess, the value of this data, who has access to it, and how it is protected
Battling Online Extremism at the Source
According to the ADL, white supremacist propaganda efforts have increased by nearly 200%. Technology has allowed hate groups to magnify their ideologies and expand their recruitment efforts. From the fringe corners of the internet, extremist groups have been able to bleed into mainstream social networking websites where their views have then been amplified. This has led to real world violence like that seen in Christchurch, El Paso and many other places. In this presentation, Corey White, an intelligence analyst who helps monitor mainstream and fringe online platforms for extremist content, will show the audience how and why people are radicalized online and the pathway a person can walk from simple curiosity to violent terrorism. He will help the audience understand why these groups are so successful in spreading their extremist ideology online, how the messages are spread, and the digital platforms where these extremist groups are congregating and recruiting. The audience will leave being able to recognize some of the warning signs of those susceptible to radicalization and what we all can do to help ensure young people do not get ensnared into extremism.
Learning Objectives
- An examination of the tools and methods extremists use to spread their message using digital tools and platforms
- The steps that lead a vulnerable young person up the staircase of terrorism
- The challenges faced and accomplishments gained using technology and machine intelligence to curb extremist content
Disinformation and the Future of Digital Security in a Hyper-Connected World
This absorbing presentation dives into the future of security in an increasingly digital and hyperconnected world, a world where information moves at lightning speeds and innovation has the impressive power to alter the world in a healthy way or in a deeply dangerous way. The presentation will dive into a number of topics including: The future of disinformation and an examination of deep-fakes including a step-by-step tutorial on making a deep-fake and the reasons why they are concerning for businesses, governments, and individuals.
Learning Objectives
- How our increasing connectedness has offered profound positives and notable negatives within both organizations and individuals
- Understand how tools such as deepfake videos and audio will evolve into a new, and potentially enormous, social engineering threat
- Learn why technology and machine intelligence will be critical in helping to neutralize disinformation and the weaponization of fabricated content
Corey's Speaking Videos
When an Algorithm is Biased: How Artificial Intelligence Can Amplify Inequities
Machine intelligence is playing an increasing role in every aspect of our lives. Machine learning algorithms are helping to decide the colleges we are accepted into, the job interviews we receive, the homes we can purchase, even the people we date. What happens when those algorithms are biased? In this presentation, Corey will describe how technology is helping to magnify harmful bias and stereotypes. He will explain how historic prejudices and inequalities are being injected into the algorithms that fuel machine intelligence. These tools are then being used to make important determinations with profound impacts. He will ultimately show attendees how they can work to change this dangerous reality.
Learning Objectives
- Understanding how algorithms work and how they are playing an increasing role in decisions that are shaping important areas of our lives
- Examples of different types of bias in algorithms and how they manifest into real world consequences
- How attendees can spot bias in algorithms, work to ensure that algorithms are fair, and ultimately how technology is being used to solve this critical issue
The Evolving State of Data Privacy Regulations
Since 2013, billions of records have been lost or stolen. Mega breaches and leaks happen at a breathtaking frequency, and this reality has no signs of dissipating. Data breaches suffered by organizations like OPM, Equifax, and countless others have left millions of people’s personal and financial information vulnerable to theft. Because of this, there is mounting personal data privacy by consumers and tightening regulation by governments on businesses. In this presentation, Corey will take a look at the current state of data privacy legislation including GDPR, the California Consumer Privacy Act, and other important data privacy regulations that will impact organizations and enterprises in America and throughout the world. Corey will review these regulations and offer practical steps that organizations can make to get compliant with constricting data privacy restrictions and improve the way they handle consumer data.
Learning Objectives
- An up to the minute look at the latest regulations organizations should be aware of in American and around the world
- The ways organizations must adhere to increasingly complex regulations
- The practical steps organizations should take to ensure they understand the data they possess, the value of this data, who has access to it, and how it is protected
Battling Online Extremism at the Source
According to the ADL, white supremacist propaganda efforts have increased by nearly 200%. Technology has allowed hate groups to magnify their ideologies and expand their recruitment efforts. From the fringe corners of the internet, extremist groups have been able to bleed into mainstream social networking websites where their views have then been amplified. This has led to real world violence like that seen in Christchurch, El Paso and many other places. In this presentation, Corey White, an intelligence analyst who helps monitor mainstream and fringe online platforms for extremist content, will show the audience how and why people are radicalized online and the pathway a person can walk from simple curiosity to violent terrorism. He will help the audience understand why these groups are so successful in spreading their extremist ideology online, how the messages are spread, and the digital platforms where these extremist groups are congregating and recruiting. The audience will leave being able to recognize some of the warning signs of those susceptible to radicalization and what we all can do to help ensure young people do not get ensnared into extremism.
Learning Objectives
- An examination of the tools and methods extremists use to spread their message using digital tools and platforms
- The steps that lead a vulnerable young person up the staircase of terrorism
- The challenges faced and accomplishments gained using technology and machine intelligence to curb extremist content
Disinformation and the Future of Digital Security in a Hyper-Connected World
This absorbing presentation dives into the future of security in an increasingly digital and hyperconnected world, a world where information moves at lightning speeds and innovation has the impressive power to alter the world in a healthy way or in a deeply dangerous way. The presentation will dive into a number of topics including: The future of disinformation and an examination of deep-fakes including a step-by-step tutorial on making a deep-fake and the reasons why they are concerning for businesses, governments, and individuals.
Learning Objectives
- How our increasing connectedness has offered profound positives and notable negatives within both organizations and individuals
- Understand how tools such as deepfake videos and audio will evolve into a new, and potentially enormous, social engineering threat
- Learn why technology and machine intelligence will be critical in helping to neutralize disinformation and the weaponization of fabricated content