Winning Over Difficult People
Learn to win over anyone. Master communication techniques specifically designed to accommodate individual traits you encounter. This program will teach you to 1) Analyze personality traits, vulnerabilities, and needs through effective perception, 2) Recognize patterns in behavior that reveal underlying agendas, fears, and concerns, 3) Adopt communication styles geared toward developing rapport and establishing common ground with challenging people, to facilitate bonding and build trust.
Spotting a Sexual Harasser in the Making
Sexual harassers are not created overnight. They evolve. This program will describe and discuss warning signs and precursor predatory behaviors that indicate that a harasser-in-the-making is testing the boundaries, and what to do about it.
Remote Controlled: How Modern Domestic Abusers Exploit Technology
In an age of technology, domestic abusers have a variety of tools at their disposal. From clandestine home surveillance, to smart phone and computer programs, to GPS devices, domestic abusers are able to remotely control their victims. Tech savvy perpetrators use their electronic proficiency to threaten, stalk, dominate, and intimidate victims.
This program will cover modern methods of remote control within abusive relationships, and red flags that characterize such relationships. It will develop awareness among law enforcement, investigators, and service providers about how technology is misused by abusers to harass and terrorize survivors, and how to work with victims struggling within a relationship of coercive control.
Workplace Violence: Think Different. Hope for the Best, Prepare for the Worst
The safest mindset in the modern workplace is not paranoia, but preparedness. When the new normal requires us to live offensively and defensively, employers must focus on both prediction and prevention. This timely program will present red flags signaling potentially dangerous employees, workplace vulnerability, and how planning promotes prevention.
Don’t Believe Everything You See: Reading People and Judging Credibility
Whether you are sizing up a new love interest or conducting a threat assessment analysis, credibility is key. Yet both personally and professionally, judging credibility is a multifaceted analysis. This seminar will present a unique method of judging credibility, including a fascinating overview of the psychology and empirical research behind reading people skills, presented in an entertaining and interactive format. Learn what to look for, where to look, and how to interpret what you see.
Your Body, Your Brain, or the Ballgame? Reading Red Flags on a First Date
Wouldn´t it be nice to separate the disinterested from the desirable on the first date? This seminar will teach you how to spot the keepers during your first meeting—when you are most objective. Learn to recognize verbal and visual signals indicating desire, disinterest, and danger, how choice of attire and date location reveal both attention and intention, and more.
Five Red Flags Your Relationship is Over . . . and How to Reverse Course
When your partner transitions from talk to text, and from lighting up your inbox to “going dark,” the bloom may be off the rose. Yet before you write your relational obituary, consider several methods of resurrecting romance, and reigniting passion.
Networking as High-Speed Connection: How to Spark Chemistry with Anyone
From the boardroom to the bedroom, creating our future means cultivating connections. Research shows that we size up new people within the first few seconds—often based on one factor—selective attention. Professionally and personally, people who seem to “only have eyes” for us are uniquely attractive. Modern day networking is most successful through talking not texting.
Cybersleuthing, Predatory Friending, and the new “Face” of Cyber Security – Navigating Legal and Ethical Virtual Minefields
In an age of electronic communication and social networking, security experts, investigators, and private citizens must be aware of their ethical and professional responsibilities and how they apply within the increasingly public realm of modern electronic communication. This program will discuss best practices in using popular social networking sites such as Facebook, Twitter, and LinkedIn, and how the use of such services both professionally and personally can raise ethical issues relating to disclosure of private information, invasion of privacy, defamation, and more.
From Hailed to Hunted: When Fans Become Fanatical, How to Spot Cyber Stalkers
Offline celebrity chasing is like hailing a taxi in the rain—you can never catch their attention. Yet online, star gazers are not relegated to admiration from afar, social media facilitates direct contact. And you do not have to be famous to attract Twitter trolls and Facebook stalkers; you just need to have a digital footprint. This seminar will discuss how to recognize online red flags signaling that a cyber stalker is seeking to infiltrate your virtual boundaries of privacy. It will present tips for safe cyber security on social media and company websites, and threat assessment strategies to determine when an online fan has become fanatical.
Cyber Optics: Perceiving Personality, Credibility, and Danger
Accurately perceiving personality and judging credibility is a multifaceted analysis, which is particularly challenging in cyberspace. This program will present cutting edge psychological research revealing how to read people through online profiles, and how personality traits expressed in cyberspace are often a more accurate assessment of character than in person assessment. It will also reveal the qualities that have been proven to be most important when judging temperament and credibility, and how to best perceive them online.
Reading Red Flags: Protect and Serve the Community, as Well as Yourself
Fighting crime is a dangerous business, and in some circumstances, can be deadly. Law enforcement and security professionals must remain vigilant regarding red flags that may reveal dangerous proclivities in persons of interest and associates. Providing a unique and complementary perspective to programming on safety and awareness, Reading Red Flags will discuss the art of reverse-criminal profiling: detecting the signs and symptoms of potential danger before a crime is committed. Integrating cutting edge research in psychology, sociology, and criminology, this program will enhance awareness regarding what to look for when dealing with potentially dangerous individuals, where to look, and how to interpret what you see.
When Red Flags Look Red Hot: Separating the Dangerous from the Desirable
Dr. Patrick´s latest book, Red Flags: How to Spot Frenemies, Underminers, and Ruthless People will revolutionize your approach to reading people. Incorporating over 20 years of experience as a prosecutor working with victims, corroborated by abundant psychological research, Dr. Patrick will explain how we fall for charming manipulators, and how to make better decisions about whom we invite into our lives. Building upon the advice in her last book, the revised version of the New York Times bestseller Reading People, which focused on observable characteristics, Red Flags delves deeper, providing an easy-to-remember formula: FLAG (Focus, Lifestyle, Associations, Goals) to detect the person behind the persona, in order to separate the dangerous from the desirable.
Leveling the Playing Field: Elimination of Bias in the Workplace
This program will cover laws regarding bias and discrimination and how they apply specifically within the workplace. You will learn how to recognize bias, how to identify signs of both overt and subtle bias, and how to prevent bias and discrimination from the boardroom to the break room, and when dealing with clients.
High Noon in the Workplace: Regulating Marijuana Use in States Gone Green
Even in states which have rolled out the green carpet for legal marijuana use, employers can still implement standards designed to maintain a safe, productive workplace. This program will discuss how employers balance employee rights to indulge with company safety standards. It will also cover how to detect and deal with compromised clarity and productivity.
Lessons from the Dark Side: Sexual Predators and Cyberstalkers - Red Flags and Reasonable Precautions
Lessons from the Dark Side teaches the public how to recognize sexual predators by exposing the psychological strategies and techniques that predators use consistently and effectively to seduce their prey, and how to recognize predator grooming behavior before it is too late. Drawing from a broad spectrum of empirical research and experience with the accounts of sexual predators as well as their victims, this seminar is designed to educate the community about the effective strategies of seduction predators use to lure their often well-educated victims, and how to recognize them before another victim is claimed.
Sexual Predators: The Science Behind the Seduction
The statistics are devastating. Sexual predators are able to amass literally hundreds of victims because they are masters of relationship building and impression management. Using real case studies as examples, this program will expose the powerful strategies of seduction used by sexual predators, demonstrate their astonishing ability to beguile often intelligent victims and their families, and explain the well-documented psychology behind the success of their techniques. Attendees will be both shocked and captivated by the extraordinary accounts told by sexual predators themselves as well as their victims that are used to illustrate the science behind the seduction.
Advantage Speaker® Media Coaching President Dr. Wendy Patrick offers interactive media coaching and public speaking preparation sessions for individuals, business executives, political candidates, corporations, and organizations of every kind. Her programs incorporate cutting-edge research on image management, interpersonal dynamics, and viewer receptivity.
Please contact Dr. Patrick directly for rates at email@example.com