Time
1 hour 31 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
The second option is to send out a profiling survey to participants before the event. I love utilizing this particular strategy. You have the same pros with this environment here, the 1st 1 being it allows you to profile the volunteer to ensure success. It also will enable you to create an offline presentation.
00:19
And again the volunteer can vet the presentation improve What information is being shown publicly
00:26
again, Audience members may realize that it is a staged presentation. However, you can still make it look like a live presentation
00:35
by sending out a profiling survey. You're asking people within the organization or within the audience toe. Answer some very, very basic questions about themselves. Think of it this way.
00:46
How many times have you answered questions on a survey? We do it all the time, and we don't realize what level of information or how sensitive that information is that we're providing, too sometimes a complete stranger that we do not know about.
01:03
So what I use is a falling the server.
01:06
So the profiling survey looks like this. You start up with some very basic questions to get the survey recipients just thinking about it themselves, so The first question is, have you or a friend being a victim of identity theft or fraud?
01:21
The second question is what social media accounts to you regularly post two, and this gives him the ability to take the answers. They're So we've got Facebook, instagram, Twitter, Snapchat, Lincoln, Google. Plus the more that they tick,
01:38
the more likely it is that you can start to pick up information about them
01:42
that could be used for your presentation.
01:45
The next question is, what would you like to learn in the presentation?
01:49
The next question is what other I T topics will be of interest to you
01:53
next. We're going to make we contact you for further information, and this is where the gotcha is.
02:00
And it is amazing if you send out this survey to 100 people.
02:05
Statistically you'll get half a dozen to a dozen people filling out their name, their address, the email address, their phone number and their date of birth. These are the three key pieces of information that you need to be able to get to be able to do your identity theft presentation,
02:24
and it is amazing how many people fall for this not only in a survey like this, but on online surveys as well.
02:34
The third option is when you can't go through. The other two options is to ask for volunteer during the presentation.
02:42
Now the Big Pro about this is, is that the audience sees it's alive identity theft presentation. But it is extremely risky. Some of the cons include nobody actually volunteers. They're all scared, too,
02:54
and this can delay the presentation. It can also create a fair amount of awkward silence, which you don't really want in a presentation. The next thing is, is that you may get a non social person volunteering. What I mean by that is that somebody that doesn't really utilize social networks and post on them on a regular basis.
03:14
You also have very limited control over what content is being shown
03:19
to the audience.
03:20
So you may fall into that trap, where you accidentally present an embarrassing photo that has been published publicly. That volunteer didn't want

Up Next

How to Do a Live Identity Hack

This course has been specifically designed to successfully deliver a live identity hack presentation to an Australian, American or British audience.

Instructed By

Instructor Profile Image
Tom Mason
Senior Partner Development Manager at AWS
Instructor