The world’s most famous (former) hacker.
His hobby as an adolescent consisted of studying methods, tactics, and strategies used to circumvent computer security, and to learn more about how computer systems and telecommunication systems work.
Feedback on a speech in May 2011 for a confidential company
“I think I speak for everyone when I say that Kevin delivered 100% today…. He was engaging, entertaining, informative, and the response has been very good top to bottom. Beyond the presentation, he went above and beyond given the obstacles that were thrown at him by the venue ……. He deserves much credit for being flexible, open, and able to adapt, to what I am sure he will tell you, might be his most challenging presentation [situation] ever. [Our] Senior Leadership Team (President included) enjoyed the presentation and lunch where he was certainly the star. We hope that you can pass on our sincere thanks for a job well done.”
Feedback on a speech on February 6th, 2009 for Dell, Inc.“Kevin has a unique ability to connect with both technical and non-technical groups, which makes him a perfect fit for almost any event, especially those audiences that run the full gamut of technical ability. Die-hard techies will enjoy “geeking out” with Kevin, and everyone else will still be fascinated and perhaps a little frightened by what they learn. Our attendees could not have been more pleased with Kevin and his “Art of Deception” keynote.” – John Dietrich, Marketing Director, Dell, Inc. Feedback on a speech on September 16th, 2010 for a confidential government agency “I wanted to take a moment to express my deepest gratitude all of your hard work. I have worked for this company for 15 years. In that time, I have seen lectures given by vice presidents, heads of state, senators, legendary theoretical physicists and even financial gurus; however, your presentation was the first time I have seen our employees rush the stage to meet the speaker. In the last three days, I have received many requests from our employees asking if they can view the presentation again…….. I have received nothing but accolades on your presentation. You truly captured our audience and made IT Security awareness interesting and entertaining.”
With more than twenty-five years of experience in exploring computer security, Kevin Mitnick is a largely self-taught expert in exposing the vulnerabilities of complex operating systems and telecommunications devices. His hobby as an adolescent consisted of studying methods, tactics, and strategies used to circumvent computer security, and to learn more about how computer systems and telecommunication systems work.
In building this body of knowledge, Kevin gained unauthorized access to computer systems at some of the largest corporations on the planet and penetrated some of the most resilient computer systems ever developed. He has used both technical and non-technical means to obtain the source code to various operating systems and telecommunications devices to study their vulnerabilities and their inner workings.
As the world’s most famous (former) hacker, Kevin has been the subject of countless news and magazine articles published throughout the world. He has made guest appearances on numerous television and radio programs, offering expert commentary on issues related to information security. In addition to appearing on local network news programs, he has made appearances on 60 Minutes, The Learning Channel, Tech TV’s Screen Savers, Court TV, Good Morning America, CNN’s Burden of Proof, Street Sweep, and Talkback Live, National Public Radio, and as a guest star on ABC’s spy drama “Alias”. Mitnick has served as a keynote speaker at numerous industry events, hosted a weekly talk radio show on KFI AM 640 in Los Angeles, testified before the United States Senate, written for Harvard Business Review and spoken for Harvard Law School. His first best-selling book, The Art of Deception, was published in October 2002 by Wiley and Sons Publishers. His second title, The Art of Intrusion, was released in February 2005. Mr. Mitnick’s autobiography is due for release in late summer 2011.
Please inquire for full details on fees and payment terms.
Due to an extreme phobia of flying, Mr. Mitnick has very strict requirements for his air travel. As such, Kevin researches his own itinerary and must travel on the safest airline that flies to the point of the speaking engagement. In addition, he must take the most direct route practical, with non-stop service, if available, within the continental United States, or with the lowest number of stops available, if the appearance is outside the continental United States. Lastly, Kevin will only fly into airports with paved runways and will only fly on jets of 737 size or larger, no flights on propeller planes or single engine jets. Further information is available upon request. Thank you very much, in advance, for your understanding of this unique situation.
THE ART OF DECEPTION: ARE YOU IN DANGER OF BEING ‘CONNED’?Join us to hear the world’s most famous former hacker share his perspective on the threat of “social engineering”-a highly effective type of attack that exploits the human element of corporate security.
While relatively unknown to the general public, the term “social engineering” is widely used within the computer security community to describe the techniques hackers use to deceive a trusted computer user within a company into revealing sensitive information, or trick an unsuspecting mark into performing actions that create a security hole.
Mitnick illustrates why a misplaced reliance on security technologies alone, such as firewalls, authentication devices, encryption, and intrusion detection systems are virtually ineffective against a motivated attacker using these techniques.
Although there are no reported statistics on the number of successful social engineering attacks, these ages-old techniques have been and continue to be extremely effective against unsuspecting targets, and pose the least risk and cost to your adversary.
In the corporate environment, a large number of unsuspecting victims never realize they have been manipulated. Will your employees be the next? Through concrete examples, Mitnick shares what your business can do to develop a creative and engaging security program that heightens awareness, motivates employees to change their attitudes, influences them to think defensively, and encourages the adoption of good security habits.
THE ART OF INTRUSION:
HOW HACKERS COMPROMISE YOUR SECURITY AND WHAT YOU CAN DO ABOUT IT
To truly protect your organization’s valuable information, you must move beyond knowledge of the dangers and learn from real, “you are there” case studies shared by Mr. Mitnick himself. Kevin Mitnick, the world’s most famous (former) hacker, spent several years gleaning insights from the hacker community and gathering critical lessons-learned.
In this dynamic and riveting presentation, Mr. Mitnick shares how hackers ply their trade and offers concrete and actionable guidance to help you strengthen your defenses.
He’ll reveal the hair-raising details of real-life computer break-ins, how the perpetrators hacked in and how they successfully covered their tracks. More importantly, Mr. Mitnick will share how you can prevent these same horror stories from being repeated in your organization. In addition, you will learn cost-effective counter measures and indispensable tips for bringing everyone in your organization on-board to offer maximum protection.
WIRELESS INSECURITY: IS YOUR NETWORK VULNERABLE?
This presentation is currently undergoing an update, to ensure it remains compelling, current and up-to-date. If you are interested in hosting Mr. Mitnick to speak about this topic, please let us know. Thank you!
GHOST IN THE WIRES: THE UNBELIEVABLE TRUE STORY OF KEVIN MITNICK'S LIFE AS THE WORLD'S MOST WANTED COMPUTER HACKER
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn’t just about technological feats—it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.
Driven by a powerful urge to accomplish the impossible, Mitnick blazed through computer systems and networks at several globally known corporations. But as the FBI’s net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat-and-mouse game that led authorities through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.
Kevin will discuss his adventures as the World’s Most Wanted Computer Hacker and demo some of the tricks that hackers use today to break into computer systems and networks.
(Presentation based on the upcoming book, Ghost in the Wires, being released in late 2011)