During our one-hour research time, we searched through images of keynote speakers at various cyber security/risk events but we were unable to find any that would meet the criteria outlined. The images we could find were of speakers with the main message/topic that they would be addressing at the events. For this reason, we have presented a Google document with screenshots of speakers at such events, infographics, and additional images that would collectively meet the criteria.
Additionally, we also looked through videos of keynote speakers in case we could get a screen shot of this information. Unfortunately, we were unable to identify an image that met the criteria described.
Only the project owner can select the next research path.