Kevin Mitnick

Kevin Mitnick

The World's Most Famous Hacker Turned Cybersecurity Expert

Speaker Categories: Cybersecurity and Big Data | Information Technology | Internet/E-Commerce | Authors | Information Technology

Travels From: NV, United States.

Speaker Fee Range: $20,001 to $40,000*

Check Availability Print Bio
Kevin Mitnick Bio
Speaker Topics
Books
Videos

The World's Most Famous Hacker
Turned Cybersecurity Expert

Kevin is the world's most famous hacker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.

Hacker

Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. As CEO and chief "white hat" hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees— learn how to protect their information and themselves from harm, using understandable terms and a friendly approach.

Cybersecurity Speaker

Kevin's insights on current events are highly sought, leading to hundreds of media appearances. He is the world's top cybersecurity speaker, and has been a commentator, security analyst, or interview subject on CNN, CNBC, Al Jazeera, FOX News, CBC, BBC, Radio Moscow, Tech TV, National Public Radio, Playboy, Good Morning America, and 60 Minutes—to name just a few. He has been called before Congress (both the House and the Senate) to testify on security matters affecting the United States. Kevin also works in partnership with KnowBe4 to produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness.

Books

Kevin's books include Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers and Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, a New York Times best seller, is now available in fifteen languages.

THE ART OF INVISIBILITY: Defending Your Privacy against Hackers, Spies, and Big Brother

Learn the shocking truth about privacy. Like it or not, your every move is being watched and analyzed. Every step you take is tracked and stored. Once considered conspiracy theories and paranoia, the age of organized cyber criminals, big data, and Big Brother has arrived. You’ll gain incredible insight into your own personal exposure, and the steps you can take to protect yourself, from a man whose real-world insight about being a "ghost" is unparalleled. Kevin Mitnick rose to worldwide fame after a much-publicized chase by the FBI as the World’s Most Wanted Hacker. Kevin never stole for profit or damaged systems, though he did become the most elusive computer break-in artist in history, as he hacked into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, using technology not only to evade but also to spy on and track his pursuers. Today, Kevin uses his unique talents to help people and organizations everywhere test and improve their cybersecurity and privacy. You’ll be shown how to defend your privacy using easy cloaking and counter-measures by the world’s cybersecurity authority. Are you ready for the power of invisibility?

THE ART OF DECEPTION: How Hackers and Con Artists Manipulate You and What You Can Do About It

People are the weakest security link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. Kevin Mitnick will entertain and educate you by performing his "live technology magic show" of the latest hacking techniques. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering." Social engineering is a technique used by hackers and con artists that leverages your tendency to trust. Trust is a truly noble human characteristic; however, in terms of personal and organizational security, it’s also a significant weakness because trust can be exploited. Kevin is the worldwide authority on social engineering and constantly improves and updates this highly acclaimed "security awareness" presentation with the latest threats and risks most people don’t even know exist. You’ll learn how to detect manipulation and take steps to protect yourself and your organization. Gain the power to think defensively.

THE ART OF INTRUSION: How Hackers Attack and How to Fight Back

Breaking into your technology and security is easy. To learn why, first you must think like a hacker. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates to you how a hacker’s thought process works and how they ply their tradecraft. You’ll start to see you and your organization as a target through the hacker’s eyes and gain new insights into "security awareness." Kevin then enables you to strengthen your defenses through concrete and actionable guidance. Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure. Kevin is now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team. You’ll gain current and valuable insight into the hacker mindset by examining real-life computer break-ins. You’ll see how the perpetrators hacked in and how they successfully covered their tracks. More importantly, Kevin will share how you can prevent these same horror stories from being repeated in your organization in a cost-effective manner that offers maximum protection.

GHOST IN THE WIRES: The Story the Government Doesn’t Want You to Know

Treat yourself to an unforgettable experience. Come on the run and escape with Kevin as he takes you on this hilarious and mind-boggling adventure based upon his New York Times bestselling autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. Kevin is a master storyteller who puts you right in the action of this sophisticated cat-and-mouse game that led authorities through false identities, jumping from city to city, plenty of close shaves, and ultimately, a bizarre showdown with the feds. He was the most elusive computer break-in artist in history. Although he never stole for financial gain or damaged systems, he did hack into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, and no matter how fast the authorities were, Kevin was faster, using technology not only to evade but also to spy on and track his pursuers. His story--packed with hysterical pranks and fear-driven hysteria--actually started a movement and changed how companies secure their information". Would you like to see a real ghost?

CUSTOM Q&A: Reinforce Your Event’s Messaging with Live Hacking

Would you like to grab and hold people’s attention on the matter of their security or privacy? Do you want to inform your audience about unknown threats or raise their "security awareness"? Are you tasked with informing people about a need for your security product or service? Don’t just tell them…show them! Kevin stands alone in the world of professional speakers. He uniquely provides hosts and sponsors with the advanced ability of making their talking points come alive on stage. In this very popular Q&A format, you’ll coordinate pre-arranged questions with Kevin so that he’ll have amazing hacking demonstrations to illustrate the key answers and event messaging. Your audience will be more attentive as they are engrossed within a unique experience akin to a "technology magic show". Your audience will easily grasp your concepts as Kevin showcases current hacks both he and his team use during penetration testing to evaluate his clients’ networks, systems, and devices for security vulnerabilities. He’ll also stand side-by-side with you to help raise affinity for you and your team and help imbue and raise legitimacy for your messaging because of his own positioning as a world authority on cybersecurity. Create an unforgettable message from an unforgettable event experience.

  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
    The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data Purchase Book
  • Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
    Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Purchase Book
  • The Art of Deception: Controlling the Human Element of Security
    The Art of Deception: Controlling the Human Element of Security Purchase Book
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
    The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Purchase Book

Similar Speakers

  • James Canton
  • Ian Morrison
  • Michael Fertik
  • Ben Hammersley
  • Gerd Leonhard
  •  

Check Availability

Submit

Search Speakers

Recent Books

  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
    The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data Purchase Book
  • Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
    Ghost in the Wires: My Adventures as the World's Most Wanted Hacker Purchase Book

Testimonials

  • funny and definitely in the zone


    Amy Draves, Microsoft
  • unique ability to connect with both technical and nontechnical groups


    John Dietrich, Dell
  • You opened their eyes, and that's what I wanted.


    Willy Allison, World Game Protection
  • He showed how readily information can be gathered by hackers


    Capt. Steven “Doc” Simon, USN
Our valued clients include:
IBM Chick fil PFIZER payless AT&T Xerox17 virgin atlantic hp american red BBC merrill tata LATAM Ouro Novabase empresas rrstar Verizon nationwide axa siemens BOYS AND GIRLS CLUB bcbs Morgan Stanley Intel Johns Hopkins Tecnologico De Monterrey nvs pbc pharma CRA Hong Kong Trade itkib