Skip to main content

Book Cybersecurity Speaker Lora Vaughn for Your Next Conference or Event

Featured In

LinkedIn Learning ISC2 Security Congress WiCyS Southeast Cybersecurity Summit Rapid7 UNITED

Quick Facts for Event Planners

Speaking Fees

Keynotes: $3,500 - $8,000

Workshops: $5,000 - $10,000

Varies by format, travel, and scope

Lead Time

Preferred: 4+ weeks

Rush bookings: Considered

Earlier booking = more customization

Response Time

Inquiries: 24-48 hours

Fast turnaround on proposals

Travel

In-person: US nationwide

Virtual: Available globally

Based in Birmingham, AL

Materials Provided

Custom slides Attendee handouts Recording permission Pre-event social promotion Speaker kit & bio
Book Lora for Your Event

Typical response within 24-48 hours

Download Speaker Kit
Lora Vaughn, cybersecurity keynote speaker and former CISO

Lora Vaughn, CISSP

Fractional CISO | Cybersecurity Speaker | LinkedIn Learning Instructor

Two-time CISO (MoneyGram serving 150M+ customers, Simmons Bank during growth from $10B to $20B+), Senior Director at Fastly (10% of global internet traffic), and former NSA analyst. 20+ years securing digital payments, banking platforms, and financial products at scale.

Featured speaker at ISC2 Security Congress, WiCyS, and the Southeast Cybersecurity Summit. LinkedIn Learning courses viewed by thousands of cybersecurity professionals. CISOs Connect A100 honoree (2024, 2025).

Lora Vaughn, CISSP, is a cybersecurity leader, keynote speaker, and LinkedIn Learning instructor who has spent 20+ years protecting organizations from nation-state adversaries, digital payment fraud, and their own bad security habits. She's allergic to security theater and corporate buzzwords. Audiences get real talk and actionable insights, not compliance checkbox theater.

Lora began her career hunting sophisticated threats as a Global Network Exploitation & Vulnerability Analyst at the National Security Agency. She brought that expertise to the private sector as CISO at MoneyGram International, where she secured digital payments for 150 million+ customers across 200+ global markets, and as CISO at Simmons Bank during its growth from $10B to $20B+ in assets. At Fastly, she led security for edge cloud infrastructure handling 10% of global internet traffic (because apparently she likes pressure).

Today, Lora is a LinkedIn Learning instructor with courses on vulnerability management viewed by thousands of cybersecurity professionals. She is a two-time CISOs Connect A100 honoree (2024, 2025) and founder of Vaughn Cyber Group, providing fractional CISO services nationwide.

Known for making security concepts accessible without dumbing them down, Lora speaks at major conferences including ISC2 Security Congress (4.7/5.0 rating), WiCyS, and the Southeast Cybersecurity Summit. Whether addressing a room of CISOs or helping small businesses stay secure without going broke, she brings the same energy: honest, practical, and occasionally funny.

Quick Reference

Full Name: Lora Vaughn

Credentials: CISSP

Title: Fractional CISO & Cybersecurity Speaker

Company: Vaughn Cyber Group

Location: Birmingham, Alabama

Travel: US nationwide, virtual global

Headshot: Download (400px)

Website: loravaughn.com

Download Speaker Kit

Signature Sessions

High-impact keynotes designed to transform how your audience thinks about cybersecurity.

For Security Professionals

Plan for Chaos: Why Most Incident Response Plans Fail Big

A high-impact talk derived from ISC2 Security Congress that helps leaders move beyond check-box compliance to true resilience. Drawing from real-world incident response failures and successes across Fortune 500 banks and global payment systems, this session reveals the critical gaps that cause most IR plans to crumble under pressure.

45-60 min keynote Executive audiences Security teams

Key Takeaways: Why tabletop exercises fail • Building muscle memory for crisis • The communication gaps that sink response efforts • Moving from compliance theater to operational readiness

For General Audiences

The Spy in Your Pocket: Mobile Security for Everyone

Your smartphone knows more about you than your closest friends—where you go, who you talk to, what you buy, and even what you're thinking about buying. This engaging, accessible talk reveals the hidden ways your mobile device can betray your privacy and provides practical, no-jargon steps anyone can take to protect themselves.

30-45 min presentation General audiences Community groups

Key Takeaways: What your phone tracks without you knowing • Simple settings changes that make a big difference • Spotting scams and phishing on mobile • Protecting your family's digital privacy

What Attendees Say

ISC2 Security Congress 2025

4.70/5.0 Rating

"Plan for Chaos: Why Most Incident Response Plans Fail Big"

"Best presenter all day"

"Amazing speaker along with wonderful and actionable content"

"She is GOOOOD... will be referencing her slides for sure"

ISC2 Security Congress 2024

4.74/5.0 Rating

"Measuring Cybersecurity Success: Crafting Metrics with NIST CSF and Beyond"

"In terms of clarity and content value, the best talk so far."

"Fantastic. This will be one session I will watch again."

"Great presentation from someone who has clearly spent time honing her craft."

Cybersecurity Speaking Topics

For Technical Audiences

  • Vulnerability Management Strategy: From chaos to prioritized action
  • Incident Response Planning: Why most IR plans fail and how to fix them
  • Security Metrics & Measurement: Using NIST CSF to demonstrate program value
  • Career Development in Cybersecurity: Breaking into the field and advancing your career
  • Security Leadership: Building security programs that scale with business growth

For Business Leaders

  • Cybersecurity for Small Business: Essential protections every SMB needs
  • Startup Security: Getting it right from day one without breaking the bank
  • Nonprofit Cybersecurity on a Budget: Protecting your mission and your donors
  • Practical Risk Management for SMBs: Security strategies that fit your reality

For General Audiences

  • The 5 Things That Actually Get You Hacked: What really puts you at risk (hint: it's not what you think)
  • The Spy in Your Pocket: Mobile device security for everyday users
  • Staying Safe Online: Practical cybersecurity tips for everyone
  • Protecting Your Digital Legacy: Safeguarding what matters most
  • Cybersecurity Awareness: Understanding digital risks without the jargon
Book Lora for Your Event

Typical response within 24-48 hours

Connect on LinkedIn

LinkedIn Learning Cybersecurity Instructor

Published courses on vulnerability management viewed by thousands of cybersecurity professionals worldwide:

Speaking Engagement Details

Presentation Formats

  • Keynote presentations (30-60 minutes)
  • Workshops & training sessions (2-4 hours)
  • Panel discussions & fireside chats
  • Virtual presentations (remote)

Audience Size

Experienced presenting to audiences from 25 to 2,500+ attendees

Travel & Availability

Based in the US. Available for speaking engagements nationwide. Virtual presentations available globally.

Materials Provided

  • Custom slide decks
  • Attendee handouts
  • Recording permission (when requested)
  • Pre-event promotion on social media

Ideal For

  • Industry conferences & summits
  • Corporate training programs
  • Small business & startup events
  • Nonprofit organizations
  • Professional associations
  • University programs
  • Executive briefings

Book Lora to Speak at Your Next Event

Looking for a cybersecurity keynote speaker who delivers practical, actionable insights without corporate buzzwords? Let's talk about your event.

Book Lora for Your Event

Typical response within 24-48 hours

Connect on LinkedIn

Include in your inquiry: event date, audience size, topic preference, and format (keynote, workshop, panel, virtual).

Frequently Asked Questions About Booking Lora

What cybersecurity topics does Lora speak about?

Lora tailors presentations for diverse audiences—from students exploring cybersecurity careers to C-suite executives making security investment decisions, SMBs protecting their businesses, and community groups learning online safety. For technical professionals: vulnerability management, incident response, and security metrics. For business leaders: startup security, SMB cybersecurity, and nonprofit security on a budget. For general audiences: mobile security, online safety, and protecting your digital legacy. All topics can be customized to match your audience's technical background.

How do I book Lora for a conference or corporate event?

Contact Lora directly through the "Request Speaking Info" button on this page, or connect via LinkedIn. Please include your event date, expected audience size, topic preference, and whether the engagement is in-person or virtual.

What is Lora's speaking fee?

Speaking fees vary based on presentation format, travel requirements, and event scope. Contact Lora directly for pricing information.

Does Lora travel for speaking engagements?

Yes. Lora is based in Birmingham, Alabama and is available for speaking engagements nationwide. Virtual presentations are also available for remote audiences.

What makes Lora qualified to speak on cybersecurity topics?

Lora has 20+ years of cybersecurity experience including roles as CISO at MoneyGram (150M+ customers) and Simmons Bank ($20B+ assets), Senior Director at Fastly (10% of global internet traffic), and former Global Network Exploitation & Vulnerability Analyst at the National Security Agency. She's a published LinkedIn Learning instructor, CISOs Connect A100 honoree (2024, 2025), and has spoken at major conferences including ISC2 Security Congress and WiCyS.

Conference Presentation Archive

Video Interviews & Courses

Watch Lora in action across media appearances and professional training.

Vulnerability Management: Assessing the Risks with CVSS, CISA KEV, EPSS, and SSVC
video

Vulnerability Management: Assessing the Risks with CVSS, CISA KEV, EPSS, and SSVC

LinkedIn Learning. Vulnerability management is a critical part of an effective information security program, but determining which vulnerabilities to address first is a daunting challenge. In this course, learn how to differentiate between vulnerability severity and vulnerability risk. Discover what elements can be combined to determine vulnerability severity, techniques you can use to determine the risk a vulnerability poses to your specific environment, and things to consider when building a vulnerability management program.

LinkedIn Learning: Vulnerability Management in Cybersecurity: The Basics
video

LinkedIn Learning: Vulnerability Management in Cybersecurity: The Basics

LinkedIn Learning. This course provides those without prior experience in the area an overview of why vulnerabilities exist, as well as an explanation of the process of managing them from start to finish. Instructor Lora Vaughn McIntosh covers the three key components of vulnerability management and the tools needed to establish a program of your own. Get an introduction to vulnerability scanning and reporting, learn how to identify which vulnerabilities to address first, discover how to vet false positives, and more.

Measuring Cybersecurity Success: Crafting metrics with NIST CSF and Beyond
video

Measuring Cybersecurity Success: Crafting metrics with NIST CSF and Beyond

4.74/5.0 rating. ISC2 Security Congress 2024: Most cybersecurity leaders have a good understanding of the things that need to be done to improve a security program, but how do you show senior leaders and board members those needs and progress as improvements are made? This talk shows an approach that uses the NIST Cyber Security Framework (CSF) to conduct a maturity assessment and create meaningful metrics that demonstrate program value and progress to leadership.

A Guide to Cybersecurity Careers
video

A Guide to Cybersecurity Careers

Transitioning from a cybersecurity student to a cybersecurity professional sounds daunting, but it doesn't have to be.

Simmons Bank talks about the best security practices to keep your information safe
video

Simmons Bank talks about the best security practices to keep your information safe

KATV Little Rock, Lora Vaughn discusses cybersecurity best practices.

Keepin' It Real: Idenftifying 'Real Risk' and Building a Threat-Centric Vulnerability Management Program
video

Keepin' It Real: Idenftifying 'Real Risk' and Building a Threat-Centric Vulnerability Management Program

Rapid7 UNITED2017 presentation