
Dawn McCarty
Do you want your audience to learn how to be safer online, but wonder how? I created a program that helps them learn more about cyber safety. With my help, we can make the internet a safer place.
Steve Jobs, Bill Gates, and Dawn McCarty all have something in common:
Steve Jobs wanted to put 1000 songs in your pocket.
Bill Gates wanted to put a computer on every desk and in every home.
Dawn McCarty wants to show you how to protect all the products that the two pioneers above created.
Dawn McCarty is an award-winning Cyber-Security Woman of the Year in 2021 for excellence in the work she has done in the industry with over two decades of experience with IT and Cyber Security on a Corporate Level.
Dawn has earned four degrees: 1) BS in Computer Science & Information Systems (2009); 2) BS in Criminal Justice - Psychology / Victimology (2009); 3) Masters in Criminal Justice Management (2010); and MBA (2020).
Dawn is an International Speaker and Author. She is master in using stories to effortlessly tell her audiences what they need to do and how they need to do it. She is altruistic and passionate about showing others how to secure everything to create a safer online world for our families and businesses.
Dawn is in demand with her training, consulting, and speaking for over 20 years and has worked with thousands of businesses and individuals globally. She’s reached over 37 countries and works with a wide range of international organizations to deliver a competitive advantage based on her unique insight into the importance of security.
Dawn’s goal is focused, not only in the business world, but in securing children and families from hidden online dangers.
Her strategic and successful intervention style is centered on her belief that behaviors are a result, not an informed response. She realizes that to influence individuals to act, she needs to change their belief system, which requires a very unique approach.
Dawn’s strategic methodology can quickly ignite the needed reset of the mindset, to purge old habits and allow space for new behaviors that will benefit her clients and audiences to
Secure their Everything.
Steve Jobs, Bill Gates, and Dawn McCarty all have something in common:
Steve Jobs wanted to put 1000 songs in your pocket.
Bill Gates wanted to put a computer on every desk and in every home.
Dawn McCarty wants to show you how to protect all the products that the two pioneers above created.
Dawn McCarty is an award-winning Cyber-Security Woman of the Year in 2021 for excellence in the work she has done in the industry with over two decades of experience with IT and Cyber Security on a Corporate Level.
Dawn has earned four degrees: 1) BS in Computer Science & Information Systems (2009); 2) BS in Criminal Justice - Psychology / Victimology (2009); 3) Masters in Criminal Justice Management (2010); and MBA (2020).
Dawn is an International Speaker and Author. She is master in using stories to effortlessly tell her audiences what they need to do and how they need to do it. She is altruistic and passionate about showing others how to secure everything to create a safer online world for our families and businesses.
Dawn is in demand with her training, consulting, and speaking for over 20 years and has worked with thousands of businesses and individuals globally. She’s reached over 37 countries and works with a wide range of international organizations to deliver a competitive advantage based on her unique insight into the importance of security.
Dawn’s goal is focused, not only in the business world, but in securing children and families from hidden online dangers.
Her strategic and successful intervention style is centered on her belief that behaviors are a result, not an informed response. She realizes that to influence individuals to act, she needs to change their belief system, which requires a very unique approach.
Dawn’s strategic methodology can quickly ignite the needed reset of the mindset, to purge old habits and allow space for new behaviors that will benefit her clients and audiences to
Secure their Everything.
Predator Prevention: How to Spot a Predator
Format: _ 40 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Predator Prevention: Child Safety (Information Kits)
Format: _30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
SEMPI Social Communication Model & Safe Family Communication Model
Format: _ 30-60-90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Identity Theft Prevention
Format: _ 30-60-90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Securing Your Home (Devices, Network, and Wi-Fi)
Format: _ 30-60-90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Mistakes You Might Be Making When Choosing a Password
Format: _ 30-60-90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Why Applying Two Factor Authentication is Better than Passwords
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Fishing Phishing - When You’re the Bait!
Format: _30-60-90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Catfishing, Smishing, Vishing, Good Grief!
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - What Is Online Grooming
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - My Top 5 Concerns of Invisible Online Dangers
Format: _ minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Cyber, Workplace, or Schoolground Bullying
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Protecting Data While Working/Schooling Remotely
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Social Engineering & Hacker Behaviors
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Social Media Security and Reputation Management
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Social Media Security and Reputation Management
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
Cyber Security Awareness - Forge Proof Your Signature
Format: _ 30 - 60 - 90 minute [keynote, workshop, breakout, etc..]
This program is perfect for:
- [type of employee or situation]
 - [type of employee or situation]
 
The audience will leave with:
- [takeaway 1]
 - [takeaway 2]
 
[1-2 paragraphs here with more description]
