Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Welcome to Money Making Conversation Masterclass. This is your host,
Rashan McDonald, our host this weekly Money Making Conversation Masterclass show.
The interviews and information that this show provides are for everyone.
It's time to stop reading other people's success stories and
start living your own. If you want to be a
guest on my show, please visit our website, Moneymaking Conversations
(00:21):
dot com and click to be a guest button. Let's
get this show started with my guests. My guests founded
a company that helps churches and nonprofit organizations specifically to
understand technology and help them with artificial intelligence technology to
help them spread the gospel. Please welcome to Money Making
(00:41):
Conversation Masterclass. Gregory Richardson. How you're don Gregory?
Speaker 2 (00:45):
Fantastic, Rashaan, thank you for having me on your program.
Speaker 3 (00:48):
Can you hear me? Well?
Speaker 4 (00:49):
Pretty good?
Speaker 2 (00:50):
Can you?
Speaker 4 (00:50):
Where are you based at at? Gregory? Where you based?
Where are your best?
Speaker 3 (00:53):
I am?
Speaker 2 (00:54):
I live in Dallas, Texas and I am right now
in my office in Dallas, Texas. But I move around
a lot. So but right now you caught me at home.
Speaker 1 (01:02):
We're good, We're good. Well, I know I just mentioned that.
Let's get a little background on you. Is working in AI?
Speaker 3 (01:09):
Is that?
Speaker 4 (01:09):
Is that a full time role for you?
Speaker 1 (01:11):
Or you do other things? Because you seem like a
man who multitasks.
Speaker 2 (01:17):
Huh, you spit a mouthful at me there. Let me
let me start by start at the end and say,
I firmly disagree with the notion of multitasking in my
fairly limited experience. I'm only I'm only I'm approaching sixty
years old, so you know, I'm not a million years
(01:38):
old or anything like that. But in my experience, when
I try to multitask, or when employees of mine try
to multitask, what they end up doing is not doing
any of the tasks really well. Humans are fundamentally designed
to single purpose task. Obviously, you can chew and walk,
you know, chew gum and walk at the same time,
But I don't think your brain functions well doing.
Speaker 3 (02:01):
Two separate tasks.
Speaker 2 (02:03):
The context switching and other things that need to happen
when you're flipping and flopping between tasks end up making
you more inefficient, So that's one part of it.
Speaker 3 (02:11):
I just like to always I like that.
Speaker 1 (02:13):
I like that because I always I always proplay myself
as a multitasker.
Speaker 4 (02:17):
I really do.
Speaker 1 (02:17):
That means I'm doing a lot of things, not saying
I'm doing them simultaneously. That means that I got a
couple of things happening. I got a couple of gigs,
I got a couple of deals. I got a couple
of things that my fire's burning. They don't mean on fire.
At the same time. That means I got a motivated
to get these actions done. I will tell you this, Gregory,
I hear what you're saying. If you're trying to do
(02:39):
something anybody, if a computer is trying to calculate something simultaneously,
or you're trying to load something on Wi Fi simultaneously,
it's gonna drag. So you absolutely correct when you're trying
to multitask simultaneously, it will not be effective.
Speaker 3 (02:58):
In facts.
Speaker 2 (02:59):
Now, to get to the core of what you I
believe you're asking. I'm confident you're asking.
Speaker 3 (03:04):
You were spot on.
Speaker 2 (03:05):
You detect that I am a multi entrepreneur, a serial entrepreneur.
Speaker 3 (03:09):
Over my life, I've I've ran, owned.
Speaker 2 (03:12):
Operated started multiple companies from car rentals to restaurants to
you name it, to consulting companies, software companies, real estate company.
Like my wife and I we we do entrepreneurship really well.
In addition to that, I one hundred percent do have
(03:32):
a full time job also, So I am what you
call an ethical hacker, and for maybe the last forty
years or so, my career has been cybersecurity. How do
I help large typically large organizations, the world's biggest banks, governments, companies, GM, FOD,
(03:53):
you name it, Nissan that was recently in Tokyo with
Nissan helping them solve some of their side security problems.
That's my day job. Now how that connects to AI?
Speaker 1 (04:06):
Okay, before we go there, let's go back. Let's go
back to this cybersecurity, because that's huge. You know, we
have people doing cyber ransom. You know, you have a bank's, hospitals, governments,
so being held hostage by people. Talk to us through
that whole process. When you're talking about cybersecurity and we're
talking about people who still use one, two, three, four
as they password.
Speaker 2 (04:28):
Oh yeah, that's there's so much there. One of the
things I like to kind of like flow the conversation
with is cybersecurity because of the volume, the share magnitude
of the number of threats that we've been seeing and
it's been growing like crazy.
Speaker 3 (04:47):
It's literally billions of.
Speaker 2 (04:49):
Threats per hour, so it's you know it, it's more
than huge.
Speaker 3 (04:56):
Maybe for the last.
Speaker 2 (04:57):
Fifteen twenty thirty years, it's been more than you could
hire humans to fix, right, So that's why we started
leveraging AI to help us do things like prediction and
classification and quickly looking at a million files.
Speaker 3 (05:11):
And saying which of these are.
Speaker 2 (05:12):
Bad files, which of them look like files that were
by files yesterday that were viruses or malware or ransomware,
et cetera, et cetera.
Speaker 3 (05:19):
So that's a big part of it.
Speaker 2 (05:21):
The other part of what we do in cybersecurity is
called security operations. That's where you're engaging with the users
and working against things like you just mentioned, Hey, you
can't set your password to one, two, three, four, even bigger.
Most people get that by now even bigger. You don't
want to reuse the same password on your Gmail, on
your Facebook, on your Instagram, on your this, on your that,
(05:43):
on your banking you you really ideally should have separate
passwords for every single public facing service that you connect to.
And in my from my perspective, what I recommend customers
and employees and whoever else I don't even use passwords anymore.
I'm either doing biometrics, finger I hand facial recognition, or
(06:05):
if I do have to type something in, I'm using
what we call a passphrase. So I'll give you a
real world example of that. Look, when computers started, you know,
or the internet connectivity started, a password could be eight
to ten characters long.
Speaker 3 (06:19):
There ain't a system.
Speaker 2 (06:19):
In the world, a reasonably modern system, where you have
that constraint.
Speaker 3 (06:23):
So therefore, why are we trying.
Speaker 2 (06:25):
To squeeze a password into a couple of characters. I'll
give you a real world example. My password on one
of my social media's right now. Good luck trying to
hack it, though. Is Philippians space two colon three comma
consider others more important than yourselves.
Speaker 3 (06:45):
Period.
Speaker 2 (06:46):
That's literally a scripture quote with the comma, with the period,
with the spaces, with the capital letters.
Speaker 3 (06:51):
Philippians.
Speaker 4 (06:52):
Password number, your password.
Speaker 2 (06:56):
That's that's one of my probably five hundred passwords that
I have.
Speaker 3 (07:00):
That's why I said I'm not afraid to put it out.
Speaker 2 (07:03):
There because I also changed my passwords constantly.
Speaker 3 (07:06):
But yeah, let me ask you this.
Speaker 4 (07:07):
Let me ask you this.
Speaker 1 (07:07):
Great because I love talking to you, I love your energy,
because I've never talked to a guest like you that
had the knowledge. Because what we're talking about is, you know,
the simplicity and how people kind of really disrespect the
process and then when they get scammed, then they don't
know why. Now the two factor that's the big thing.
I use two factor a lot. What are your thoughts
(07:28):
on two factor because I do use passwords. I do
have a password vault. Because I do have a ton
of passwords, and I do change every password for every account.
The value of the password vault allows me to do that.
What do you say when people are these systems recommend
you use two factor, you know authorization.
Speaker 2 (07:48):
One hundred percent agree with that, and you're going, obviously,
we've we've just met Risson, but you're you're absolutely doing
the things you need to do a password vault, obviously
you want to make sure it's a password evolved from
a very reputable company. I personally use a Google password vault.
I also use Google authenticat or you could use a
Microsoft password vault. Maybe that's a little bit less secure,
(08:09):
but use a password vault from a very reputable company,
not some little mickey Mouse startup that if something goes wrong,
you could at least see them and get you know,
tens of thousands of dollars from them. That's step one,
and you're you're doing that. Step two you absolutely the
password vault allows you to use multiple passwords without having
to remember or write down on a piece of post
to know what the password is. So excellent. Step two
(08:32):
you unequivocally to want to use two factor authentication. Well,
two factor authentication is it's a second factor. So the
first factor could be your fingerprint or your password, or
your facial recognition or whatever. The second factor is it
sends something to something you have.
Speaker 3 (08:50):
So first factor.
Speaker 2 (08:51):
Is something you know or something you are, a fingerprint
or something you know a password. The second factor could
be something you have.
Speaker 3 (08:58):
Your cell phone.
Speaker 2 (08:59):
So it'll send a ten to your cell phone saying hey, yes, Greg,
if you're really Greg, you're not only supposed to know
the password, but you should have your cell phone with
you as well. I'm a pop a code up on
your cell phone, put that, enter that here, and then
I'll know that it's you. That's one example of a
two factor. Absolutely recommend that I get my Facebook, for example,
gets bombarded. I guess you were trying to log on
(09:22):
Greg or you know, it looks like you lost your password.
I don't even bother with them anymore because I know
I have two factor turned on. So even if someone
manages to somehow guess or finagle my password, two factors
is going to stop them from getting in.
Speaker 1 (09:36):
Greg, because you just hit home with these Bank of
America type emails or these Facebook emails or these American
that's what I get. They look like American Express, you
know exactly. You know, they look like a Bank of America.
They look like they look like the Facebook and the
matters talk about you violated a copyright if if you
(09:59):
don't click this link, we're going to take your site down.
How does one you know, don't become don't be mislaid
by this fear of clicking the wrong thing, because they
always said the elderly community community is victimized the most.
But talk to us about avoiding those type of scams.
Speaker 2 (10:23):
Avoiding them is practically impossible. And I'll actually take a
step back if I may. What has caused or what
is causing that drastic uptick that we've seen for the
last five, ten, fifteen years in those types of scams.
It is simple opportunism in around twenty twelve, the FBI
(10:44):
they released reports every year on the state of you know,
crime and that kind of stuff. Somewhere around twenty ten,
eleven to twelve, I don't remember exactly when, for the
first time the FBI released a report called the State
of Cyber Crime Security. It wasn't the first time they
released the report, but what about to say is the
first time they stated it. And in that report, somewhere
around twenty ten ish they stated for the first time
(11:07):
that revenue from criminal organizations that do ransomware and viruses
and spam and scams via the Internet surpassed for the
first time in history all revenue from all cocaine sales,
heroin sales, and marijuana sales globally. So when criminal organizations
(11:29):
start noticing, hey, I don't need to buy a submarine
and smuggle drugs and this and that and the other,
or I could keep doing that, but I can also
generate a lot of money over here by doing these
computer things. That is what triggers the attacks that we're
seeing now. Criminals are notoriously opportunistic, and you have to look.
Speaker 3 (11:49):
At every email you get.
Speaker 2 (11:50):
And this answers your question directly as is someone trying
to get something that's mine because money also want to
be cautious. Nowadays, the biggest target is PII. It's called
Personal identifiable information.
Speaker 3 (12:05):
That's the biggest target.
Speaker 2 (12:06):
Is someone trying to find out from me my first name,
last name, data, birth, first name, last name data, birth,
social security?
Speaker 3 (12:13):
Are there is that?
Speaker 2 (12:14):
And if someone is trying to get that or any
other and even just first name, last name, data birth,
like if they're not asking for social still be paranoid.
Is someone trying to get my username and my password?
Anytime you get emails requesting that type of information, you
need to pause, take a breath, and be very very
(12:34):
very very cautious. What's the source of the email? You
pick up the phone and call the Amazon or Facebook
or whoever and verify, Hey, did you send me this email?
Speaker 3 (12:45):
Like?
Speaker 2 (12:46):
Is my account at risk of being That's how you
have to handle that, because that's what those criminals are opportunistic.
It's like parking a bunch of cars on the street.
Happens in the neighborhoods all over the world, even fancy ones.
Speaker 3 (12:58):
Criminals will walk back asked.
Speaker 2 (13:00):
And just tried door handles, which car they're gonna rob first?
The one where the cars unlocked. They are opportunistic, so
the easiest target.
Speaker 3 (13:07):
Is the one that gets hit.
Speaker 4 (13:08):
Wow.
Speaker 2 (13:09):
And because of the volume of that, you know, it's
no longer you know Billy, Bob or or Nikky in
his grandmother's basement playing around on the internet doing some scams.
Speaker 3 (13:20):
That's not what it is anymore.
Speaker 2 (13:22):
It is fundamental, well funded and resourced criminal organizations that
literally have office buildings. They go to campuses to recruit
smart computer science kids to come into their criminal organization
and create ransomware, create viruses, and craft these sting operations,
(13:46):
et cetera. So that's what you're going against these people.
It's no longer you know Susie in the basement. It
is now an organization coming after you. So you gotta
bear back. And one of the known things with scams,
it's all they tried to impose a sense of urgency.
You got to do this right now, right anytime.
Speaker 3 (14:06):
You see that, feel that either that or they.
Speaker 1 (14:09):
Threaten you with an ultimate penalty if you don't respond.
You know, and I will tell you this. I'm talking
to gate Gregory Richardson, AI expert, cybersecurity expert, a man
who loves his job. I'm just telling you it's a
level of passion. How did you And we're going to
get into the AI in the next break, but how
did you know this was for you? Like, I have
(14:30):
a degree in mathematics. My minus associate is in sociology.
When I graduate from college, I started out in computers.
I love the logic. How did you know from a
state of passion that this is where you knew your
career and your life would be gregory.
Speaker 3 (14:50):
It's a very very interesting story. I am in college.
I left at a fairly young age.
Speaker 2 (14:56):
I was just just turning sixteen, late part of my
sixteen year old that phrase when I left the Caribbean
island that I grew up on and my parents and
all of my family are from, and we moved.
Speaker 3 (15:06):
Well, I was.
Speaker 2 (15:07):
Sent actually to the US, the middle of the US,
the Midwest, to college.
Speaker 3 (15:12):
Kind of stupid, you.
Speaker 2 (15:13):
Know kids are when they're stupid, think they know it all,
et cetera. But my major initially was civil engineering. People
told me a good job is you know, civil engineering,
you'll build roads and buildings for governments and just.
Speaker 3 (15:24):
Good job security.
Speaker 2 (15:26):
Now, while that's my major, I am in my dorm
room and this is the early eighties, right, So like
there is no Internet yet, there are no computer stores.
Yet I'm in my dorm room building computers from scratch
and selling them on campus to students, and I'm literally
(15:48):
investing all of my That was but the joy that
I had. I hated my classes. I hated every and
after about literally I switched my major from from civil
engineering to electrical engineering. Then I switched to the math,
then I switched it to bits.
Speaker 3 (16:01):
Like I was all over. I was stupid.
Speaker 1 (16:03):
I was dumb with no, no, no, no, you were me, Gregory.
I started out the civil engineering, then I went to accounting,
then I went to chemical engineering, and then I wind
up getting my degree in mathematics. But I hold that thought, Gregory,
you are fantastic. Please don't go anywhere. We're talking to
Gregory richardson cybersecurity expert AI AI genius something called me
(16:26):
a genius because he is on fire right now. And
if you want to hear more, especially how he's using
and teaching nonprofit organizations in churches how to use AI
to spread the gospel, don't go nowhere. You listen to
Money Making Conversation master Class and I'm your host with
Sean McDonald.
Speaker 5 (16:44):
Please don't go anywhere. We'll be right back with more
money Making Conversations Masterclass. Welcome back to the Money Making
Conversations Masterclass, hosted by Rashaan McDonald. Money Making Conversations Masterclass
continues online at Moneymakingconversations dot com and follow money Making
(17:09):
Conversations Masterclass on Facebook, Twitter, and Instagram.
Speaker 1 (17:14):
Gregory, the word passion is an understatement when I hear
you talk about cybersecurity. And I say that because I'm
gonna tell you something. When I log on my computer,
when I click emails, I'm nervous and I'm not very comfortable.
And that's the world we live in. It's a world
of fast moving activity. But are you uncomfortable as I
(17:37):
am as we navigate through this new world of technology
that's being put forth out there that we have to
use in order to participate.
Speaker 2 (17:48):
Great, great, great, great question, and I'll answer it with
a little, a tiny bit of background.
Speaker 4 (17:53):
Okay.
Speaker 2 (17:53):
I am a staunch believer in the concept that we
find in the Bible in Jeremiah chapter one, somewhere around
verse four or so, and that's Jeremiah being spoken to
by God. Jeremiah's a prophet and God tells him, before
you were formed in your mother's womb, I intimately knew
(18:17):
what you were made for. I firmly believe in that.
That's why, jokingly, I was dumb as a bag of
bricks because.
Speaker 3 (18:26):
When I was twelve years old in.
Speaker 2 (18:29):
High school, a bunch of friends and I had a
little public access TV program where we taught adults how
to use computers. So it was very obvious to me
that my passion was technology from twelve years old, and
when I go to college, I'm doing everything but technology.
It took two and a half three years into college
for a friend happened to be a chaplain to walk
(18:50):
he was on my floor, to walk up to me
and say, dude, why are you not Why are you
not studying computers. I'm like, it's not an electrical engineering
or a business major. He said, dude, all you're doing
all day is sitting here behind this computer doing computer stuff.
Speaker 3 (19:03):
Is your passion.
Speaker 2 (19:05):
And that was kind of like an AHA moment for me,
and that is what fuels not only my success, but
my ability. And I say this to entrepreneurs, business people,
people you know early in career or late in career,
making changes if you can do what you're passionate about.
I'm not guarantee you and you're gonna make a million
(19:26):
dollars or whatever whatever. You might maybe not, but at
least you'll be able to function and be effective through
all adversities.
Speaker 3 (19:36):
There's been many rough periods in time.
Speaker 2 (19:39):
I remember twenty thirty years ago, cybersecurity was a terrible
industry to be in. No one wasn't hiring. I'd go
and visit banks and businesses, especially in the Caribbean, where
I was living at that time. Hey, do your cybersecurity. No,
we don't need no cybersecurity. My it guy handles that.
Speaker 3 (19:55):
It took Target getting.
Speaker 2 (19:57):
Hacked home depot right there in Atlanta getting hacked suddenly
the owners to be, oh my god, we need to
do something about cybersecurity, and then all of a sudden
it boomed. But prior to that, no one cared about cybersecurity.
What kept me passionate and invested in cybersecurity was the
fact that I was doing what I was in. I
believe genuinely cybersecurity and technology was stitched into my DNA
(20:23):
by the person created me. So I'm just doing what's natural,
and that's what you hear in my voice. That's what
you hear in the passion when I answer questions. You
can I tell my employees, coworkers, people that work for me, whatever,
all the time. You wake me up at three in
the morning, bro.
Speaker 3 (20:38):
I'll answer questions. Problem.
Speaker 4 (20:40):
I love it. I love it. I love it.
Speaker 1 (20:43):
Hey Gregory, No, let's transition to AI because I don't
want to say I'm going to talk about something and
we don't talk about it. I think they're to frustrate
our listeners or AI. What concerns you about AI when
it comes to securities and current concerns and privacy? Because
we just over your AI is being thrown into everybody's conversation.
(21:03):
Everybody knows the two letters AI artificial intelligence, but it
is security concerns, it is private concerns.
Speaker 4 (21:10):
What do you think.
Speaker 2 (21:13):
More there are definitely security and privacy. As a matter
of fact, Is it okay if I give your your
listeners a way for them to reach me.
Speaker 3 (21:20):
Can I just quickly plug a website?
Speaker 1 (21:21):
Absolutely do your thing, because I think that is important
that people know how to reach you exactly.
Speaker 2 (21:27):
Anyone that wants to reach me connect LinkedIn social media,
all of it, by my book, whatever, all of it,
every way to get in touch with me is at www.
My name Gregory G R E G O R Y
Richardson R I C H A D S O N
dot AI Gregory Richardson dot AI. You can get me there,
(21:48):
get everything there. I answer messages. So that's out of
the way. Let's continue. Are there security concerns with AI
one hundred percent? But it's more than that, And candidly,
I think the opportunity is bigger than the concerns in AI.
I often used the analog of the Gutenberg printing Press
(22:08):
fourteen hundred fifteen hundred. Somewhere around the fifteenth century, Gutenberg invented.
He was a jeweler, worked with gold stuff and working
with defined things in gold, he created this thing called
the printing press. And the first thing they started printing
was gossip rags and you know, like descriptions of let's
call them lurid tales, you know, so basically written out pornography.
(22:29):
That was the first things the press was used for.
Because even then they knew if I print something sallacious,
people are gonna gobble it up.
Speaker 3 (22:36):
If I say you.
Speaker 2 (22:36):
A woman found in bed with a cow, people they're
gonna buy that newspaper. So the church in particular was
very concerned, Oh my god, this thing is evil, and
lots of the industries were very this thing is not good,
like we shouldn't be doing this. Then suddenly, now keep
in mind, if you look at a historical timeline, Europe
and most of the world right now is smack dab
(22:58):
in the middle of the Dark Ages. Black plague is
killing millions of people across Europe. That's when this happened.
Fast forward Finally, some monk somewhere says, you know what
I thinking, I'm gonna use the printing press for these
Bible books that we've been writing out by hand. And
it takes us twenty years, We're going to print some
Fast forward fifty five, zero years later, the world has
(23:22):
been in the Dark Ages for more than a thousand years.
Speaker 3 (23:24):
Fast forward fifty years later.
Speaker 2 (23:26):
The printing press and the publication of Bibles, which to
this day is still the top selling book, single handedly
hold the entire globe out of the Dark Ages because
someone leaned into the new technology, the printing press, and
used it for something good. That's what AI is today. Yes,
(23:47):
can it do bad things? Hundred percent? Could it potentially,
you know, yes, all of the risks are true, but
I think the reward and the potential and the upside
is exponentially better. Especially I focus on nonprofits because of
my Christian worldview, but I also help. As I've said already,
(24:07):
large large, large businesses and organizations and businesses from small
to large right now are starting to leverage. And that's
what my book is about. The six technology levers. How
to find the million dollar problem in your business and
make a million dollar solution using AI. That's what it's about.
Businesses are leveraging AI today, and we are in what
(24:30):
I call the age of the ephemeral app. You're going
to be able to build an app now without one
hundred thousand dollars of investment. You're going to be able
to go to an AI and say, hey, I need
an app that helps my son. And I literally did
this with my daughter. That helps my daughter prepare for
this semester of advanced mathematics. She's sixteen years old. It generated,
(24:53):
I gave it all of the documents, the syllabus, the
course materials from her math class. It generated weekly QUI
for me in an app form that I can give
to my daughter or anyone else and say, hey, get
the crack in.
Speaker 3 (25:06):
This is how you're going to prepare. That's the age
we're in.
Speaker 2 (25:09):
So as a business person, when you start looking, or
as an entrepreneur, you got an idea of rummaging.
Speaker 3 (25:15):
Around in your head.
Speaker 2 (25:16):
You no longer need to go and find a coder.
You can simply jump on these AI tools. And that's
what my book walks you through and say, hey, this
is the idea I have. I've helped doctors, I've helped lawyers,
I've helped forests, I've helped accountants build custom apps in
days that have completely changed the landscape of their business.
(25:38):
Give you a if I may give you a simple,
simple example. A business had a car rental fleet of
cars forty cars deep, going great, but they started saying
this car rental thing might not be for me. I
looked at their business and said, you know what you're missing.
You're losing a lot of money on tolls and Texas.
Every time you touch the roads here, they're charging tolls.
(26:00):
If you have a car rental fleet, if you're not
tracking the tolls properly, you use it. I help them
build an app that tracks the tolls and then builds
the customer for it directly. They ended up taking that
app that they built for their car and they sold
it leased it twenty five thirty forty dollars a month
to every other car rental agency in the area. That
(26:22):
app ended up making them a bigger income stream than
the car rental agency itself. Wow, that's the age we're
in today. Your idea that's bubbling around in your head
might very well be a bigger income stream than the
thing that you're doing. You might be a baker, but
the idea you have for tracking recipes for all your
(26:42):
cookies and distributing someone might pay you fifteen twenty dollars
a month to access your database of recipes, but they
might not buy twenty dollars or cookies every month. That's
the age we are in today. So when I look
at it in that scope, AI is significantly a bigger
opportun tunity than it is a risk. Now, are there
(27:02):
risks cybersecurity risks, privacy risks, data leakage risks. Could China
be spying or anywhere else be spying on us and
trying to reap private information about us through AI? One
hundred percent sad part of that, though, is Facebook's.
Speaker 3 (27:17):
Doing it too. Google's doing it too. You kind of
can't avoid it.
Speaker 4 (27:22):
Right, I tell you what, Gregory very entertaining.
Speaker 1 (27:27):
I know that I want to get more into the AI,
especially in the nonprofit, especially in the church and spreading
the gospel conversation. Can I invite you back on the show?
Speaker 2 (27:38):
Of course you would be honored, honored. I'll add this
the reason I personally focus on churches because where churches
and nonprofits, they usually don't have the budgets of the
big banks and the businesses, so they need the efficiency
that AI can bring even more.
Speaker 1 (27:56):
So, give me a risksite, give me a website before
we go, give me a website because to reach out to.
Speaker 3 (28:00):
You, Www.
Speaker 2 (28:03):
Gregory Richardson dot AI. Gregory Richardson dot AI, really appreciate
this opportunity to be here and talk to your audience. Man,
this has been a ton of fun.
Speaker 1 (28:14):
You're awesome. You're awesome, and Gregor, we will talk soon.
I appreciate you, man. Thank you for filling out that
be a guest for him, because that's how he submitted
the information.
Speaker 4 (28:22):
I contacted him.
Speaker 1 (28:23):
He's on the show and guess what the information he's
provided on my show has been amazing. Thank you for
coming on Money Making Conversation Masterclass.
Speaker 3 (28:31):
Appreciate you, sir, have a great one.
Speaker 1 (28:33):
We talked soon. Don't go nowhere. We'll be back with
more money Making Conversation Masterclass. This is Rushan McDonald. I'm
your host.
Speaker 6 (28:41):
This has been another edition of Money Making Conversation Masterclass
hosted by me, Rashawn McDonald. Thank you to our guests
on the show today and thank you listening to audience now.
If you want to listen to any episode I want
to be a guest on the show. Visit Moneymakingconversations dot com.
Our social media handle is money Making Conversation. Join us
next week and remember to always leave with your gifts.
Speaker 4 (29:03):
Keep winning.
Speaker 3 (33:52):
Hi.
Speaker 7 (33:52):
I am Rashan McDonald, a host of weekly Money Making
Conversation Masterclass show. The interviews and information that this show
provides off for everyone. It's time to start reading other
people's success stories and start living your own. This week
I will interview Gregory Richardson, he uses artificial intelligence technology
to help spread the gospel. Then I'm talking to Heather Younger.
(34:14):
She will tell you how to navigate workplace fears, job security,
performance anxiety, and change. You could only hear these interviews
on the Money Making Conversation Masterclass show, Keep winning.
Speaker 6 (34:26):
There you go,