Book Cybersecurity Speaker Lora Vaughn for Your Next Conference or Event
Featured In
Quick Facts for Event Planners
Speaking Fees
Keynotes: $3,500 - $8,000
Workshops: $5,000 - $10,000
Varies by format, travel, and scope
Lead Time
Preferred: 4+ weeks
Rush bookings: Considered
Earlier booking = more customization
Response Time
Inquiries: 24-48 hours
Fast turnaround on proposals
Travel
In-person: US nationwide
Virtual: Available globally
Based in Birmingham, AL
Materials Provided
Typical response within 24-48 hours
Jump to:
Lora Vaughn, CISSP
Fractional CISO | Cybersecurity Speaker | LinkedIn Learning Instructor
Two-time CISO (MoneyGram serving 150M+ customers, Simmons Bank during growth from $10B to $20B+), Senior Director at Fastly (10% of global internet traffic), and former NSA analyst. 20+ years securing digital payments, banking platforms, and financial products at scale.
Featured speaker at ISC2 Security Congress, WiCyS, and the Southeast Cybersecurity Summit. LinkedIn Learning courses viewed by thousands of cybersecurity professionals. CISOs Connect A100 honoree (2024, 2025).
Speaker Bios
Download Full Speaker Kit →Lora Vaughn, CISSP, is a cybersecurity leader, keynote speaker, and LinkedIn Learning instructor who has spent 20+ years protecting organizations from nation-state adversaries, digital payment fraud, and their own bad security habits. She's allergic to security theater and corporate buzzwords. Audiences get real talk and actionable insights, not compliance checkbox theater.
Lora began her career hunting sophisticated threats as a Global Network Exploitation & Vulnerability Analyst at the National Security Agency. She brought that expertise to the private sector as CISO at MoneyGram International, where she secured digital payments for 150 million+ customers across 200+ global markets, and as CISO at Simmons Bank during its growth from $10B to $20B+ in assets. At Fastly, she led security for edge cloud infrastructure handling 10% of global internet traffic (because apparently she likes pressure).
Today, Lora is a LinkedIn Learning instructor with courses on vulnerability management viewed by thousands of cybersecurity professionals. She is a two-time CISOs Connect A100 honoree (2024, 2025) and founder of Vaughn Cyber Group, providing fractional CISO services nationwide.
Known for making security concepts accessible without dumbing them down, Lora speaks at major conferences including ISC2 Security Congress (4.7/5.0 rating), WiCyS, and the Southeast Cybersecurity Summit. Whether addressing a room of CISOs or helping small businesses stay secure without going broke, she brings the same energy: honest, practical, and occasionally funny.
Quick Reference
Full Name: Lora Vaughn
Credentials: CISSP
Title: Fractional CISO & Cybersecurity Speaker
Company: Vaughn Cyber Group
Location: Birmingham, Alabama
Travel: US nationwide, virtual global
Headshot: Download (400px)
Website: loravaughn.com
Signature Sessions
High-impact keynotes designed to transform how your audience thinks about cybersecurity.
Plan for Chaos: Why Most Incident Response Plans Fail Big
A high-impact talk derived from ISC2 Security Congress that helps leaders move beyond check-box compliance to true resilience. Drawing from real-world incident response failures and successes across Fortune 500 banks and global payment systems, this session reveals the critical gaps that cause most IR plans to crumble under pressure.
Key Takeaways: Why tabletop exercises fail • Building muscle memory for crisis • The communication gaps that sink response efforts • Moving from compliance theater to operational readiness
The Spy in Your Pocket: Mobile Security for Everyone
Your smartphone knows more about you than your closest friends—where you go, who you talk to, what you buy, and even what you're thinking about buying. This engaging, accessible talk reveals the hidden ways your mobile device can betray your privacy and provides practical, no-jargon steps anyone can take to protect themselves.
Key Takeaways: What your phone tracks without you knowing • Simple settings changes that make a big difference • Spotting scams and phishing on mobile • Protecting your family's digital privacy
What Attendees Say
ISC2 Security Congress 2025
4.70/5.0 Rating"Plan for Chaos: Why Most Incident Response Plans Fail Big"
"Best presenter all day"
"Amazing speaker along with wonderful and actionable content"
"She is GOOOOD... will be referencing her slides for sure"
ISC2 Security Congress 2024
4.74/5.0 Rating"Measuring Cybersecurity Success: Crafting Metrics with NIST CSF and Beyond"
"In terms of clarity and content value, the best talk so far."
"Fantastic. This will be one session I will watch again."
"Great presentation from someone who has clearly spent time honing her craft."
Cybersecurity Speaking Topics
For Technical Audiences
- Vulnerability Management Strategy: From chaos to prioritized action
- Incident Response Planning: Why most IR plans fail and how to fix them
- Security Metrics & Measurement: Using NIST CSF to demonstrate program value
- Career Development in Cybersecurity: Breaking into the field and advancing your career
- Security Leadership: Building security programs that scale with business growth
For Business Leaders
- Cybersecurity for Small Business: Essential protections every SMB needs
- Startup Security: Getting it right from day one without breaking the bank
- Nonprofit Cybersecurity on a Budget: Protecting your mission and your donors
- Practical Risk Management for SMBs: Security strategies that fit your reality
For General Audiences
- The 5 Things That Actually Get You Hacked: What really puts you at risk (hint: it's not what you think)
- The Spy in Your Pocket: Mobile device security for everyday users
- Staying Safe Online: Practical cybersecurity tips for everyone
- Protecting Your Digital Legacy: Safeguarding what matters most
- Cybersecurity Awareness: Understanding digital risks without the jargon
Typical response within 24-48 hours
Featured Speaking Engagements
- ISC2 Security Congress 2025 - "Plan for Chaos: Why most incident response plans fail big"
- ISC2 Security Congress 2024 - "Measuring Cybersecurity Success: Crafting metrics with NIST CSF and Beyond"
- Southeast Cybersecurity Summit 2024 - "Making metrics from Frameworks"
- WiCyS (Women in Cybersecurity) - Multiple presentations on security leadership and career development
- Southeast Cybersecurity Summit 2022 - "A Bug (Bounty) Story: Building effective bug bounty programs"
LinkedIn Learning Cybersecurity Instructor
Published courses on vulnerability management viewed by thousands of cybersecurity professionals worldwide:
Speaking Engagement Details
Presentation Formats
- Keynote presentations (30-60 minutes)
- Workshops & training sessions (2-4 hours)
- Panel discussions & fireside chats
- Virtual presentations (remote)
Audience Size
Experienced presenting to audiences from 25 to 2,500+ attendees
Travel & Availability
Based in the US. Available for speaking engagements nationwide. Virtual presentations available globally.
Materials Provided
- Custom slide decks
- Attendee handouts
- Recording permission (when requested)
- Pre-event promotion on social media
Ideal For
- Industry conferences & summits
- Corporate training programs
- Small business & startup events
- Nonprofit organizations
- Professional associations
- University programs
- Executive briefings
Book Lora to Speak at Your Next Event
Looking for a cybersecurity keynote speaker who delivers practical, actionable insights without corporate buzzwords? Let's talk about your event.
Typical response within 24-48 hours
Include in your inquiry: event date, audience size, topic preference, and format (keynote, workshop, panel, virtual).
Frequently Asked Questions About Booking Lora
What cybersecurity topics does Lora speak about?
Lora tailors presentations for diverse audiences—from students exploring cybersecurity careers to C-suite executives making security investment decisions, SMBs protecting their businesses, and community groups learning online safety. For technical professionals: vulnerability management, incident response, and security metrics. For business leaders: startup security, SMB cybersecurity, and nonprofit security on a budget. For general audiences: mobile security, online safety, and protecting your digital legacy. All topics can be customized to match your audience's technical background.
How do I book Lora for a conference or corporate event?
Contact Lora directly through the "Request Speaking Info" button on this page, or connect via LinkedIn. Please include your event date, expected audience size, topic preference, and whether the engagement is in-person or virtual.
What is Lora's speaking fee?
Speaking fees vary based on presentation format, travel requirements, and event scope. Contact Lora directly for pricing information.
Does Lora travel for speaking engagements?
Yes. Lora is based in Birmingham, Alabama and is available for speaking engagements nationwide. Virtual presentations are also available for remote audiences.
What makes Lora qualified to speak on cybersecurity topics?
Lora has 20+ years of cybersecurity experience including roles as CISO at MoneyGram (150M+ customers) and Simmons Bank ($20B+ assets), Senior Director at Fastly (10% of global internet traffic), and former Global Network Exploitation & Vulnerability Analyst at the National Security Agency. She's a published LinkedIn Learning instructor, CISOs Connect A100 honoree (2024, 2025), and has spoken at major conferences including ISC2 Security Congress and WiCyS.
Conference Presentation Archive
Video Interviews & Courses
Watch Lora in action across media appearances and professional training.
Vulnerability Management: Assessing the Risks with CVSS, CISA KEV, EPSS, and SSVC
LinkedIn Learning. Vulnerability management is a critical part of an effective information security program, but determining which vulnerabilities to address first is a daunting challenge. In this course, learn how to differentiate between vulnerability severity and vulnerability risk. Discover what elements can be combined to determine vulnerability severity, techniques you can use to determine the risk a vulnerability poses to your specific environment, and things to consider when building a vulnerability management program.
LinkedIn Learning: Vulnerability Management in Cybersecurity: The Basics
LinkedIn Learning. This course provides those without prior experience in the area an overview of why vulnerabilities exist, as well as an explanation of the process of managing them from start to finish. Instructor Lora Vaughn McIntosh covers the three key components of vulnerability management and the tools needed to establish a program of your own. Get an introduction to vulnerability scanning and reporting, learn how to identify which vulnerabilities to address first, discover how to vet false positives, and more.
Measuring Cybersecurity Success: Crafting metrics with NIST CSF and Beyond
4.74/5.0 rating. ISC2 Security Congress 2024: Most cybersecurity leaders have a good understanding of the things that need to be done to improve a security program, but how do you show senior leaders and board members those needs and progress as improvements are made? This talk shows an approach that uses the NIST Cyber Security Framework (CSF) to conduct a maturity assessment and create meaningful metrics that demonstrate program value and progress to leadership.
A Guide to Cybersecurity Careers
Transitioning from a cybersecurity student to a cybersecurity professional sounds daunting, but it doesn't have to be.
Simmons Bank talks about the best security practices to keep your information safe
KATV Little Rock, Lora Vaughn discusses cybersecurity best practices.
Keepin' It Real: Idenftifying 'Real Risk' and Building a Threat-Centric Vulnerability Management Program
Rapid7 UNITED2017 presentation