Ghost in the Wires
- Kevin Mitnick is the Chief Executive Officer (CEO) of Mitnick Security Consulting
- Kevin is also the Chief Hacking Officer (CHO) of KnowBe4
- Formerly the World’s Most Wanted Hacker
- The World’s Top Cybersecurity Speaker
There is no one like Kevin.
Kevin Mitnick is the world’s most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.
Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees— learn how to protect their information and themselves from harm.
As the CEO of Mitnick Security Consulting, Kevin, and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. Also in his role of Chief Hacking Officer of KnowBe4 he helps produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness.
Kevin is a global bestselling author and his books are availability in over 50 countries and 20 languages. His works include The Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers and The Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker is a New York Times bestseller and his latest work released in 2017 is The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, a ground-breaking book on privacy.
As a one-of-a-kind public speaker, Kevin’s presentations are akin to technology magic shows which include the latest hacking techniques that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness”. Kevin has been a commentator, security analyst, or interview subject for almost every major news outlet around the globe.
About Kevin's Presentations
Kevin’s presentations include live demonstrations the latest hacks and cyber threats. His keynotes are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”
H OW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization
Why Chose This Presentation:
- Kevin’s most popular speech for all audiences
- If you don’t want to be “owned” this is a must see
- The #1 recommended presentation to raise “security awareness”
Presentation Length: Choose from either a set 75-minute or a shortened 60-minute keynote followed by 15 minutes of Q&A
Full Keynote Description:
It takes one to know one.
People are the weakest link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates how a hacker’s thought process works and how they ply their tradecraft. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called “social engineering.”
Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure. Kevin is `now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team and they maintains a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.
Kevin is the worldwide authority on social engineering and constantly improves and updates this highly effective and acclaimed “security awareness” presentation that illustrates the latest threats and risks most people don’t even know exist.
You’ll learn how to detect manipulation and take steps to protect yourself and your organization. Gain the power to think defensively.
GHOST IN THE WIRES: Go on the Run with the Most Wanted Hacker in the World
Why Choose This Presentation:
- When your audience needs an escape
- The “Catch Me if You Can” thrill ride of the digital age
- The story the government doesn’t want you to know
Presentation Length: This is a set 75-minute keynote plus 15 minutes of Q&A
Full Keynote Description:
Treat yourself to an unforgettable experience. Come on the run and escape with Kevin as he takes you on this hilarious and mind-boggling adventure based upon his New York Times bestselling autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker.
Kevin is a master storyteller who puts you right in the action of this sophisticated cat-and-mouse game that led authorities through false identities, jumping from city to city, plenty of close shaves, and ultimately, a bizarre showdown with the feds. He was the most elusive computer break-in artist in history. Although he never stole for financial gain or damaged systems, he did hack into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, and no matter how fast the authorities were, Kevin was faster, using technology not only to evade but also to spy on and track his pursuers. His story–packed with hysterical pranks and fear-driven hysteria–actually started a movement and changed how companies secure their information”. Would you like to see a real ghost?
CUSTOM KEYNOTE CREATED FOR YOU: A Scripted Conversation with Live Hacking
Why Choose This Presentation:
- Uniquely leverage Kevin for your specific needs
- Reinforce the messaging of your product, services, topic, and event
- Create affinity with the top knowledge expert
- After Kevin reveals the threats, your team shows the solutions
Presentation Length: This presentation can be designed for any length up to 90 minutes including Kevin’s Q&A with the audience
Full Keynote Description:
With your team Kevin will create a custom experience with real live hacking that will inform, entertain and educate your attendees.
Don’t just tell them… show them!
Kevin stands alone in the world of cyber security speakers. This presentation will provide you the advanced ability of making your talking points come alive on stage. In this very popular scripted Q&A format you’ll coordinate pre-arranged questions with Kevin so that he’ll have amazing hacking demonstrations to illustrate the key answers and event messaging. Your audience will be more attentive as they are engrossed within a unique experience akin to a “technology magic show”.
You will provide a moderator, who, we suggest, should be part of your closing team for enterprise clients after the event, to be on stage with Kevin. This will help to create affinity for your team and recognition of the individual.
Your audience will easily grasp your concepts as Kevin showcases current hacks both he and his team use during penetration testing to evaluate his clients’ networks, systems and devices for security vulnerabilities. He’ll also stand side-by-side with you to help elevate the services, competency and message of you and your team because of his own first class reputation as a world authority on cybersecurity.
Create an unforgettable message from an unforgettable event experience.