901-754-9404
My List0

We've now made it easier for you to research and save your favorite keynotes speakers. Click on the + sign to add a speaker to your Speaker List and email your favorites to colleagues and friends.

using System.Text.RegularExpressions;
Peter Warmka

Peter Warmka

    • Former CIA Spy
    • Professional Human Hacker
    • Social Engineer
Full Bio
In Person-Fee 🛈

$5,000 - $10,000

Virtual Fee:

$7,500 and Under

Travels From

Florida

How can we protect ourselves from "human hacking?" | Peter Warmka | TEDxGreensboro

How can we protect ourselves from "human hacking?" | Peter Warmka | TEDxGreensboro

Why Human Hackers Love Social Media | Peter Warmka | TEDxOronocoBayPark

Why Human Hackers Love Social Media | Peter Warmka | TEDxOronocoBayPark

Peter Warmka Speaker Biography


Peter Warmka is a former Senior Intelligence Officer with the CIA having over 20 years of experience in breaching the security of target organizations overseas in pursuit of foreign intelligence requirements. His area of expertise, known as human hacking or social engineering, focused on the identification, assessment, and manipulation of key insiders to facilitate the breach. Such targets included the inner circles of senior government leaders, research institutions, terrorist groups, organized criminal groups, and entities involved in proliferation. In addition to his own targeting initiatives, Peter served as a senior manager of complex operational platforms where he mentored junior intelligence officers on their operations.

Following his retirement from public service, Peter became obsessed with the growing incidents of data breaches and the fact that over 90 percent of them are initiated through some form of human hacking. Leveraging his area of expertise, he decided to get back into the fight by founding the Orlando-based firm Counterintelligence Institute. Today, his passion and mission are assisting city, state, and federal government entities, non-profits, academic institutions, private companies, and individuals in safeguarding their sensitive proprietary and personal data. At the core of Peter’s approach to cybersecurity risk management is focusing on how to prevent external threat actors from manipulating employees into becoming insider threats.

Peter’s security awareness training programs prioritize proactive measures that organizations can implement to avoid falling victim to data breaches. However, as a licensed investigator specializing in cybercrime, Peter also assists clients who have fallen victim to financial fraud and extorsion.

Peter is a frequent speaker having delivered keynote presentations to a variety of audiences as well as two TEDx talks. In addition to co-hosting The Security Guy and the CIA Spy, Peter has been a guest on numerous podcasts including RANE Insights, Cyberwire Human Hacking, Paul’s Security Weekly, Truth Lies and Coverups, and The Action Catalyst.

He has contributed to, and authored, numerous publications in English and Spanish on social engineering and the manipulation of insiders. His best-selling non-fiction book, Confessions of a CIA Spy – The Art of Human Hacking, was featured on Fox32. It is sought after by individuals, as well as by corporations providing it as a training resource for their personnel.

Peter previously served as an Adjunct Professor at Webster University’s Masters in Cybersecurity Program. He expanded the course curriculum to include the growing threat of human hacking and established a social engineering “capture the flag” practical exercise. He assigned each student a U.S. corporate entity as their target. The purpose of the exercise was to collect as many flags as possible and develop a proposal for breaching the target entity’s security. Students then provided a class briefing sharing their methodology, findings and lessons learned. Many students cited this course as among the best they have taken at the graduate level.

Peter also has over 10 years of experience as a curriculum designer and specialized tradecraft instructor for various special forces units of the Department of Defense. He finds mentoring those who risk their lives in service to their country as an honor and privilege.

Peter received a bachelor’s degree in Liberal Arts from the University of Wisconsin-Milwaukee and a master’s degree in International Business Management from Thunderbird School of Global Management. Mr. Warmka is a Certified Fraud Examiner (CFE), a Certified Protection Professional (CPP) and Certified Instructor at CIA University (CIAU).

He and his wife live in Orlando. They have three children and five grandchildren. Peter loves archeology, exploration, and adventure. He has traveled to over 56 countries and speaks four languages.

Social Engineering 

I take the audience through the stages of a social engineering attack starting with information collection on the organization as well as people who work there. I then demonstrate how this information is utilized across 4 different social engineering attack vectors to effectively manipulate targets thereby circumventing technological controls and leading to security breaches.

Confessions of a CIA Spy- The Art of Human Hacking 

Most successful data breaches are initiated by human hacking. Threat actors carefully select, assess, and manipulate key employees within a target organization who in turn become the “insider threat.” Advanced social engineering techniques are employed to effectively circumvent the policies, procedures and technological controls put in place to safeguard proprietary information, client data and sensitive personnel records.

For over 20 years of his career with the Central Intelligence Agency, Peter developed expertise in the identification, assessment, and manipulation of insiders to breach the security of target organizations in pursuit of high value foreign intelligence. He now shares his insight to help protect organizations and employees against external threats.

C-Suites: Insights into Cyber Security Rick Management

The prospect of their organization suffering a devastating data breach is becoming a growing concern among C-Suite executives worldwide. Such breaches are conducted by a variety of threat actors who design and execute increasingly more sophisticated attacks to steal information (proprietary, client data, customer records) or to conduct financial extorsion in the form of ransomware or business email compromise (BEC). Such attacks can lead to a significant loss in operations and even force the enterprise out of business. C-Suite executives can no longer view security, whether physical or cyber, as a cost accounting item, but rather, an investment in people, processes and technologies.

In this session, Peter will leverage his expertise as a former intelligence officer, to help attendees understand the mindset of threat actors and the methodologies they use to turn employees into insider threats. He will then provide tips on how the C-Suite can lead and foster a successful transition.

 

Related Speakers

Michael Nelson | Executive Speakers Bureau | IOT Speaker

Michael Nelson

Former IBM Director of Internet Technology and White House IT advisor

David Hickton, speaker

David Hickton

Former U.S. Attorney for Western Pennsylvania (2010-2016)

Morgan Wright, Cyber Security Speaker

Morgan Wright

On the Front Lines: Street Crime to Cybercrime

Ben Mezrich keynote speaker

Ben Mezrich

Bestselling Author of  Dumb Money

Danilo McGarry keynote speaker

Danilo McGarry

Top 20 most influential people in Ai

sberkowitz , Health & Wellness Speaker

Steve Berkowitz

Former Chief Physician Executive of three large system

Terry Jones

Terry Jones

Founder of Travelocity.com and founding Chairman of Kayak.com

Ian Bremmer, Speaker

Ian Bremmer

President

Michael Solomon Speaker

Michael R Solomon

Authority on Consumer Behavior and Lifestyle Marketing

Scott Augenbaum, Cyber Security Speaker

Scott Augenbaum

Retired FBI Agent with expertise in Cyber Crime Prevention

General Peter Pace, Technology Speaker

Peter Pace

Chairman

Chris Brogan

Chris Brogan

 Author of Nine New York Times Bestselling Books

Reviews

Testimonials

We work with a lot of speaking organizations... Let me tell you - ESB is the best! Matt Meyer is by far the best agent to work with!

Warrior Rising

Everyone on the ESB team (Matt, Sheryl, etc.) has been great to work with for our events. Looking forward to keep working with ESB!

Plexus Worldwide

We had a positive experience with ESB. Matt Meyer is a great communicator and easy to get a hold of. He helped us through the process to make..

BNSF

ESB was patient, thorough, and responsive during the planning process. Thank you for making this such a great experience for us!

ConnectWise

ESB supported our needs and the needs of our speaker throughout the entire process. I highly recommend working with ESB to find your next spe..

DogWatch

"It's always a pleasure to work with ESB. Very professional and personable staff. Thanks!"

Testimonial | Texas Society of Architects

"Excellent! Thank you for being a true partner to our organization and its development."

HCA Healthcare

"They are the only speakers bureau I will even consider using!"

Testimonial | Youth Villages

A wonderful bureau to work with! Big ups to everyone who helped make our event a success. Fingers crossed we get the chance to collaborate fo..

MDRT | Testimonial

"As always, you are the best most responsive speaker bureau I've ever worked with!"

Image Media
Need Suggestions? Have Questions?

Need Suggestions? Have Questions?

Call to discuss how we can you help find the right speaker(s) for your organization.

© 2024 Executive Speakers Bureau. All Rights Reserved.

Design and Developed by eBiz Solutions

Get Ideas in 1 hour or less

Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.

Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.