Your data, your reputation, your customers’ trust: it’s all on the line in the new age of AI and cybersecurity.

Cybersecurity Veteran | Chief Security Officer at TPO Group

Play VideoNow Playing

Why Artificial Intelligence Helps—and Hurts—Our Cybersecurity Efforts (2:51)

Play VideoNow Playing

Easy Cyber Security Steps for Everyone (1:47)

Play VideoNow Playing

How to Prevent Mass Information Warfare (1:46)

Play VideoNow Playing

Info Security for a Brave New World (15:30)

Cybersecurity attacks are doubling every year. Phishing scams are at an all-time high. These days, CEOs and business owners are the people who answer for security breaches—and those who aren’t prepared and up-to-date are jeopardizing everything. Enter Tarah Wheeler: one of America’s leading digital security veterans, a “white hat” hacker, Chief Security Officer at TPO Group, and the author of Women in Tech—Amazon’s #1 tech career guidebook. In an age where AI is changing the cybersecurity game, her grounded and actionable insights are crucial—she shows you how to protect yourself from AI-enabled attacks, and how to use AI to keep yourself and your data safe. Practical, hands-on, and brimming with her signature charismatic and humorous style, she offers beginners and professionals alike clear guidance on how to secure themselves and protect their customers’ data today.

Tarah Wheeler is an information security executive, AI researcher specializing in natural language processing, social data scientist in international conflict, author, and poker player. She is Chief Security Officer at TPO Group, a cybersecurity consulting firm focused on nation-state incident response, critical infrastructure, and cyber risk. She is a member of the Electronic Frontier Foundation’s Board of Directors, where she chairs the Audit Committee, serves on the Governance Committee, and founded the annual EFF DEF CON Poker Tournament. She serves on the Strategic Advisory Committee of the Common Good Cyber Fund.

She is a doctoral candidate at the University of Oxford‘s Oxford Internet Institute and Fulbright Visiting Scholar at the Centre for the Resolution of Intractable Conflict, affiliated with the Changing Character of War Centre at Oxford. She is an IANS Research faculty member and a Foreign Policy contributor on cyber warfare. She served as Senior Fellow for Global Cyber Policy at the Council on Foreign Relations (2022–2025), where she testified before the US Senate on the Cyber Safety Review Board; she was elected to Life Membership at CFR in 2023.

She has been a US/UK Fulbright Scholar in Cyber Security, a Cyber Project Fellow at Harvard’s Belfer Center, the Brookings Institution’s contributing cybersecurity editor, an inaugural contributing cybersecurity expert for the Washington Post, and an International Security Fellow at New America leading cybersecurity capacity building with the Hewlett Foundation’s Cyber Initiative. She is the founder of Red Queen Technologies, and is the author of the best-selling Women In Tech: Take Your Career to The Next Level With Practical Advice And Inspiring Stories.

She has spoken and testified on information security at the United States Senate, European Union, Malaysian Securities Commission, Los Alamos National Laboratory, the OECD, FTC, and at universities including Stanford, West Point, and Oxford. She has keynoted for NATO CyCon. She has been Head of Offensive Security & Technical Data Privacy at Splunk, Senior Director of Engineering and Principal Security Advocate at Symantec Website Security, and led projects at Microsoft Game Studios (Halo and Lips). She has multiple cashes in the World Series of Poker.

Testimonials

I don’t even know where to begin, except to say: Holy Hell, you launched BSidesChicago straight into orbit!!! In nine years of running this conference, I’ve only scheduled a keynote twice, and you just made me question why I ever hesitated. That was, hands down, the most powerful, unapologetic, truth-to-power opening I’ve ever seen. You took that stage and lit the fuse, which is what I had hoped for and the energy carried through everything that followed! And your topic - well, you had shared it before, but I did not know what to expect. You put into words what so many of us feel: that the real difference isn’t made by committees or agencies, but by people who care enough to do the work anyway. It was raw, honest, and exactly what our BSidesChicago community needed to hear. Every single person I talked to afterward said the same thing: “That keynote set the tone.” You were the rocket (ok, overused metaphor, but that's really how I feel) that kicked off my final BSidesChicago, and you gave it the energy and just set the tone for the entire day!! Thank you for your fire (well, the red hair, I mean!), your brilliance, and your willingness to stand up there and tell the truth with heart and humor.

BSidesChicago
Testimonials

What a hit! Tarah was a super warm, professional, and engaging speaker. She was so interesting and we loved that she split her hour into two segments: the first, a conversation with the audience, and the second a fireside-type chat for Q&A. She was a wonderful start to our event!

Municipal Information Systems Association
Testimonials

Tarah was an absolute hit! The audience loved her.

Verizon Media
Testimonials

We wanted to thank you once again for delivering what is being called the best PASS Summit keynote ever. The entire conference was buzzing with excitement and conversation following your presentation. It was beyond thought provoking!

Professional Association for SQL Server (PASS)
Testimonials

Tarah was absolutely terrific. The dimensions of her presentation were very well received: she touched on some leadership and management techniques in times of cyber volatility and it went over very well.

- Asis International

Speech Topics

Artificial Intelligence
AI and CybersecurityWhat's Coming and What to Do About It

Every organization is now an AI organization, whether it planned to be or not. That means every organization is also an AI security problem. On the offensive side, AI is making phishing attacks sharper, faster, and harder to detect. On the defensive side, it can reduce alert fatigue and give security teams fewer, better signals. The question isn’t whether AI changes your risk profile. It already has.

Tarah Wheeler is a cybersecurity CSO who runs nation-state incident response at TPO Group and an AI researcher at the University of Oxford. She isn’t speculating about what AI might do to cybersecurity. She is watching it happen in real time. In this talk, she explains the threats and the tools in plain language, with concrete steps your people can take today. Whether your audience is a room of engineers or a room of executives who have never thought about information security before, Tarah calibrates to their level with facts, clarity, and enough humor to make the serious material memorable.

Read more
Generative AI and ChatGPT
What AI Actually IsA Researcher's Guide for the Rest of Us

Most people explaining AI to general audiences have never built a model. Tarah Wheeler has. As a doctoral researcher at the University of Oxford, she builds and trains AI systems (natural language processing models, support vector machines, sequence alignment tools) to answer real research questions. That direct experience is what makes her explanations effective. She doesn’t use analogies because she lacks technical depth. She uses analogies because she has the technical depth and wants the audience to share it.

This talk removes the mystery from artificial intelligence. Using examples from her own Oxford research, Tarah walks audiences through what AI models actually do, how they learn, where they fail, and why that matters for every decision-maker in the room. No jargon, no hype, no doom. A precise look at how these systems work, from someone who builds them and who can explain in fifteen minutes what most whitepapers fail to convey in fifty pages.

Read more
Cybersecurity
This Is What Cyberwar Actually Looks Like

Cyberwar is not a movie plot. It is happening now, and most of it looks nothing like what people imagine. Nations are attacking each other’s infrastructure, stealing intellectual property at scale, and conducting influence operations that make the boundaries between espionage and combat difficult to identify. The laws of war were not written for this. The people making policy often don’t understand the technology, and the people building the technology often don’t understand the policy. Tarah Wheeler works in both domains.

Tarah has keynoted NATO CyCon, testified before the US Senate on the Cyber Safety Review Board, served as Senior Fellow for Global Cyber Policy at the Council on Foreign Relations, and conducted Fulbright research at Oxford’s Centre for the Resolution of Intractable Conflict. Her team at TPO Group handles nation-state incident response for critical infrastructure. In this talk, she explains what cyber conflict actually looks like between nations, what is at stake for ordinary people and businesses affected by it, and what we are getting wrong in our approach to defense.

Read more
Cybersecurity
Inside the Mind of a Hacker

You don’t have to be a hacker to think like one, but it helps to understand how they think if you want to stop them. Attackers don’t break into organizations through genius. They break in through the gap between what leadership thinks is secured and what actually is. They exploit human habits, overlooked configurations, and the universal corporate assumption that a breach will happen to someone else. The good news: understanding how attackers find and exploit vulnerabilities is the single best investment any organization can make in its own defense.

Tarah Wheeler is a white hat hacker, offensive security veteran, and the CSO of a firm that responds to nation-state attacks on critical infrastructure. She has been Head of Offensive Security at Splunk and a principal security advocate at Symantec. In this talk, she explains the attacker’s methodology: how they select targets, find weaknesses, and move through systems. Then she provides the practical, actionable steps to address those weaknesses. This is not a talk designed to frighten. It is a briefing that leaves every person in the room, from the state IT director to the newest employee, more capable of protecting their organization and themselves.

Read more
Cybersecurity
Learning from Cyber IncidentsWhy We Keep Making the Same Mistakes

When a plane crashes, an independent board investigates, publishes findings, and the entire aviation industry learns from it. When a major cyber incident happens, organizations hire lawyers, issue a press release, and everyone else quietly hopes it won’t happen to them. We have sixty years of proven methodology for learning from catastrophic failures, and we are barely using any of it in cybersecurity. That is a choice, and it is the wrong one.

Tarah Wheeler co-authored the foundational Belfer Center paper on adapting aviation safety models (the NTSB framework) to cybersecurity, working alongside leading researchers in the field. She brings a rare combination: the technical depth to understand what went wrong in a breach, the policy expertise to understand what systemic change requires, and the practical experience of leading incident response at TPO Group. This talk gives CISOs, board members, and technical leaders a framework for converting every incident into institutional knowledge instead of repeated failure. It is for organizations that are tired of reading about the same breaches year after year and want to build something better.

Read more
Politics & Society
Global Cyber PolicyWhat Nations Owe Each Other in the Digital Age

The internet doesn’t have borders, but the nations attacking each other through it certainly do. State-sponsored attacks, digital espionage, and the weaponization of technology against civilian infrastructure are accelerating faster than the international community’s ability to establish norms. The question of what nations owe each other in cyberspace, and what happens when they violate those obligations, is one of the defining policy challenges of our time.

Tarah Wheeler has shaped this conversation directly: as a Senior Fellow at the Council on Foreign Relations, in testimony before the US Senate and the European Union, at the OECD, and as a keynote speaker at NATO CyCon. Her Fulbright research at Oxford focused on defining cyberwar crimes and mitigating harm to civilians during nation-state cyber operations. In this talk, she explains what is working and what is failing in international cyber cooperation, and she describes what it will actually take to build a more secure and accountable digital order. This is the conversation for policy leaders, diplomats, and anyone who wants to understand how international cyber norms are being established and by whom.

Read more

Featured Books

Related Links & Articles

Interested? Read more news and articles about this fascinating keynote speaker

Other News