901-754-9404
My List0

We've now made it easier for you to research and save your favorite keynotes speakers. Click on the + sign to add a speaker to your Speaker List and email your favorites to colleagues and friends.

}
back to Speakers
Kevin Mitnick, Cyber Security Speaker

Kevin Mitnick

    • CEO, Team Leader, and Chief White Hat Hacker
Fee Range

$30,000 - $50,000

Travels From

Nevada

Meet Kevin Mitnick

Meet Kevin Mitnick

Kevin Mitnick is the world's most famous hacker, bestselling author, and the top cybersecurity speaker. Once one of the FBI's Most Wanted, because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.

Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees— learn how to protect their information and themselves from harm.

As the CEO of Mitnick Security Consulting, Kevin, and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. Also in his role of Chief Hacking Officer of KnowBe4, he helps produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness.

Kevin is a global bestselling author and his books are available in over 50 countries and 20 languages. His books include Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers and Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, a New York Times bestseller and his latest work released in 2017 is, a ground-breaking book on privacy.

As a one-of-a-kind, public speaker, Kevin's presentations are akin to technology magic shows which include the latest hacking techniques that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases "security awareness". Kevin has been a commentator, security analyst, or interview subject for almost every major news outlet around the globe.

HOW HACKERS ATTACK AND HOW TO FIGHT BACK:
With Live Hacking Demonstrations of the Current Threats to You and Your Organization

It takes one to know one

People are the weakest link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom if you haven’t done so already. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates how a hacker’s thought process works and how they ply their tradecraft. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."

Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure. Kevin is `now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team and they maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

Kevin is the worldwide authority on social engineering and constantly improves and updates this highly effective and acclaimed "security awareness" presentation that illustrates the latest threats and risks most people don’t even know exist.

You’ll learn how to detect manipulation and take steps to protect yourself and your organization. Gain the power to think defensively.

 

GHOST IN THE WIRES:
Go on the Run with the Most Wanted Hacker in the World

The Catch Me if You Can of the Modern Age

Treat yourself to an unforgettable experience. Come on the run and escape with Kevin as he takes you on this hilarious and mind-boggling adventure based upon his New York Times bestselling autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker.

This is the Story the Government Doesn’t Want You to Know.

Kevin is a master storyteller who puts you right in the action of this sophisticated cat-and-mouse game that led authorities through false identities, jumping from city to city, plenty of close shaves, and ultimately, a bizarre showdown with the feds. He was the most elusive computer break-in artist in history. Although he never stole for financial gain or damaged systems, he did hack into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, and no matter how fast the authorities were, Kevin was faster, using technology not only to evade but also to spy on and track his pursuers. His story--packed with hysterical pranks and fear-driven hysteria--actually started a movement and changed how companies secure their information. Would you like to see a real ghost?


CUSTOM KEYNOTE CREATED FOR YOU:
A Scripted Conversation with Live Hacking

With your team, Kevin will create a custom experience with real live hacking that will inform, entertain and educate your attendees.

Don’t just tell them… show them!

Kevin stands alone in the world of cybersecurity speakers. This presentation will provide you with the advanced ability to make your talking points come alive on stage. In this very popular scripted Q&A format, you’ll coordinate pre-arranged questions with Kevin so that he’ll have amazing hacking demonstrations to illustrate the key answers and event messaging. Your audience will be more attentive as they are engrossed within a unique experience akin to a “technology magic show”.

Create affinity with the top knowledge expert

You will provide a moderator, who, we suggest, should be part of your closing team for enterprise clients after the event, to be on stage with Kevin. This will help to create affinity for your team and recognition of the individual.

Your audience will easily grasp your concepts as Kevin showcases current hacks both he and his team use during penetration testing to evaluate his clients’ networks, systems, and devices for security vulnerabilities. He’ll also stand side-by-side with you to help elevate the services, competency, and message of you and your team because of his own first-class reputation as a world authority on cybersecurity.

Create an unforgettable message from an unforgettable event experience.

Speaking Topics:

Related Speakers

Corbin Ball, Speaker

Corbin Ball

Technology Consultant

Bob Prosen, Peak Performance Speaker

Bob Prosen

Business Expert for Business Leaders

Daniel Sieberg Speaker, Technology Speaker

Daniel Sieberg

CEO of iO & Principal iO Ventures

John Sitilides Speaker

John Sitilides

Government Relations

Dan Coughlin, Business Performance Speaker

Dan Coughlin

Executive Coach on Generating Sustainable

Bruce Weinstein, Speaker

Bruce Weinstein

The Ethics Guy®

Joel Manby

Joel Manby

Leadership Speaker; President and CEO of Herschend Family Entertainment; Author of Love Works

Alexandra Levit, Generation X Speaker

Alexandra Levit

Workplace and Gen Y Speaker

Scott Deming

Scott Deming

Customer Service Guru

Charlie Miller

Dr. Charlie Miller

"One of the most technically proficient hackers on Earth"- Foreign Policy

Rita Craig Speaker

Rita Craig

Inspiring business to break out and create tomorrow's opportunities...today!

Edgar Perez Speaker

Edgar Perez

Quantum Computing

Testimonials

"You all were awesome to work with and helped make my life easier when planning these events. Thanks so much!” 

 

Testimonial

"Thanks so much for working on this engagement with us. It’s been a very pleasant experience. We will definitely include ESB in our sea..

Testimonial

"They have booked me to speak at events for over a decade and their professional approach and client focus is unmatched in the industry. I am..

Garrison Wynn, Sales Speaker

"Thank you, both, for making last night possible! You have been such a Joy to work with and I appreciate everything you did for us! I can't s..

Salvation Army

Our bank has held an annual business and economic conference for the past 9 years.  We have worked with Executive Speakers every year an..

I’ve used the services of a number of speakers bureaus in the past. However, my current experience working with the Executive Speakers ..

I want to thank you for all of your assistance you and Jenny were wonderful. If it had not been for you sending me suggestions I would not ha..

Bridgeworks was awesome!!! Great feedback from all!! Thanks for all of your collaboration and positive we'll use you in the future.  

You ladies really are the BEST!  After this event I am going to be on the hunt for keynote speakers in May.  I really want to work ..

The Nebraska Hospital Association along with numerous other state hospital associations have enjoyed a long-standing relationship with Execut..

Need Suggestions? Have Questions?

Need Suggestions? Have Questions?

Call to discuss how we can you help find the right speaker(s) for your organization.

Get Ideas in 1 hour or less

Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.

Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.

Please fill in information below