Mitnick Security Consulting, LLC


"Security is not a product that can be purchased off the shelf, but consists of policies, people, processes, and technology."

Through his speaking, Kevin can help educate your organization. Through various session topics, you can learn how to control the risks of information theft.
Contact 121 Minds Company, Kevin's Speaking Agent, for more information and pricing

The Art of Deception: Are YOU In Danger Of Being 'Conned?'
Join us to hear the world's most famous former hacker share his perspective on the threat of "social engineering"-a highly effective type of attack that exploits the human element of corporate security.
While relatively unknown to the general public, the term "social engineering" is widely used within the computer security community to describe the techniques hackers use to deceive a trusted computer user within a company into revealing sensitive information, or trick an unsuspecting mark into performing actions that create a security hole.

Mitnick illustrates why a misplaced reliance on security technologies alone, such as firewalls, authentication devices, encryption, and intrusion detection systems are virtually ineffective against a motivated attacker using these techniques.

Although there are no reported statistics on the number of successful social engineering attacks, these ages-old techniques have been and continue to be extremely effective against unsuspecting targets, and pose the least risk and cost to your adversary.

In the corporate environment, a large number of unsuspecting victims never realize they have been manipulated. Will your employees be the next? Through concrete examples, Mitnick shares what your business can do to develop a creative and engaging security program that heightens awareness, motivates employees to change their attitudes, influences them to think defensively, and encourages the adoption of good security habits.

The Art of Intrusion: How Hackers Compromise Your Security and What You Can Do About It
To truly protect your organization’s valuable information, you must move beyond knowledge of the dangers and learn from real, “you are there” case studies shared by Mr. Mitnick himself. Kevin Mitnick, the world's most famous hacker, spent the past two years gleaning insights from the hacker community and gathering critical lessons-learned.

In this dynamic and riveting presentation, Mr. Mitnick shares how hackers ply their trade and offers concrete and actionable guidance to help you strengthen your defenses.

He’ll reveal the hair-raising details of real-life computer break-ins—how the perpetrators hacked in and how they successfully covered their tracks. More importantly, Mr. Mitnick will share how you can prevent these same horror stories from being repeated in your organization. In addition, you will learn cost-effective counter measures and indispensable tips for bringing everyone in your organization ‘on-board’ to offer maximum protection.

Wireless Insecurity: Is Your Network Vulnerable?
The use of wireless networking is becoming ubiquitous throughout the world. Countless businesses, government agencies, academic institutions, and teleworkers have deployed wireless networks in their computing environment. As a result, those organizations have opened up their networks to data thieves, vandals and hackers.

The real danger starts with the IT implementers who may not accurately assess the risks involved in the deployment of wireless technologies. Lulled into a false sense of security, many organizations believe the risks associated with their wireless connectivity is minimal based on the belief that these wireless signals only extend to the four walls of their organization or facility.

Join us to hear Kevin Mitnick discuss why this thinking is creating rampant insecurity in wireless networks, and learn just how easy it is for anyone with a computer and wireless card to breach these networks. During his presentation, Mr. Mitnick will demonstrate the tools and techniques that hackers are using everyday to compromise the security of numerous enterprises and consumers.

Mr. Mitnick will also share specific guidance you can immediately put to use to raise the bar of organizational awareness and mitigate the risk that your wireless network will be the next stepping stone into sensitive corporate data and computing resources.

The Truth Behind the Myth of Kevin Mitnick
Most people's conceptions of who the real Kevin Mitnick are derived from media-created myths. The media created this fantastic story and credited him with activities being carried out by other hackers, because if there was one villain, the story was much more interesting. The more interesting the story, the more newspapers and magazines it could sell.

Kevin Mitnick has been fascinated with technology since early childhood. His dabbling in electronics began with CB and ham radios. He eventually graduated to manipulating the phone system to play pranks on people, after the hobby of phone phreaking was introduced to him by some high school friends. Mitnick was intrigued by the phone systems, and had a desire to know everything about how they worked. When the phone systems converted over to computerized, switches, he graduated along with them, and approached computers with the same vigor with which he had mastered the phone system.

Kevin was never a malicious hacker and his hacking was never performed for personal gain or to cause damage to systems. His pursuit of hacking was purely to satisfy his intellectual curiosity, and, contrary to many inaccurate reports, he never destroyed data or profited from his exploits.

Unfortunately, the government could not understand a hacker who was motivated by a personal quest for knowledge and a good challenge. Since computer crime was a relatively new challenge for the government back in the mid-1990's, there were major efforts to obtain funding for these new crime-fighting programs. These programs couldn't get the funding without the public's support. This drive for funding, combined with the sensationalist media reports depicting Kevin as the Most Wanted Hacker in the World, was all the government needed to make Kevin Mitnick their prime target.
Kevin describes how he won the "scapegoat sweepstakes" based on the intense fear and propaganda generated by the American media and the U.S. government. You will hear first hand about what he did and why he did it, and his experiences at the hands of the United States criminal justice system.


Speaking Schedule
Kevin will be in the following cities and countries:
04/28-04/29 Madrid, Spain
05/20-05/21 Stockholm, Sweden
06/18-06/19 Amsterdam, Netherlands

Get Kevin's Business Card

Watch Barry pick a lock using Kevin's business card

Send your IP address and password (just kidding) to:
Mitnick Security Consulting, LLC
9484 S. Eastern Ave
Suite 100
Las Vegas, NV 89123

Please enclose $5 cash (no other form of payment is accepted) plus a self-addressed stamped envelope, otherwise you can attend one of my speaking engagements to obtain a free lock-pick business card.

Please note, if the correct payment and the SASE are not enclosed, we will cancel the order and absolutely nothing will be returned to you. Accordingly, please correctly order one or more of my business cards by properly following the above instructions.

If you are located outside the USA, please include a prepaid self-addressed envelope (you can use FedEx, DHL, or UPS) and enclose either 5 dollars, Euros, or GBP, cash only, for each card.

We don't accept any other currencies.

Radio & TV Appearances

Recent Press Coverage

No Technology Completely Secure
Mar 21, 2014 - Raconteur

World's greatest hacker calls security 'shameful'
Jan 16, 2014 - Fox News

Watch Kevin Mitnick Explaining How He Used to Troll the FBI
Nov 20, 2013 - Softpedia

Kevin Mitnick Q&A
Oct 22, 2013 - Reaktor Q&A

Kevin Mitnick: 'The only thing McAfee is good at is making videos'
Oct 16, 2013 - Computing

Kevin Mitnick opens IP EXPO 2013: "Anti-virus software isn't going to save you"
Oct 16, 2013 - ITProPortal

Hacker Kevin Mitnick Slams Anti-Virus at IT Expo
Oct 16, 2013 - CBR

Kevin Mitnick - The Word Document Exploit
Sep 24, 2013 Use VPN! Former 'Most Wanted Hacker' Mitnick talks Snowden, NSA, and privacy
Sep 12, 2013 -

Former hacker and renowned security expert Kevin Mitnick to open IP EXPO
Sept 11, 2013 - ITProPortal

Kevin Mitnick Details Modern IT Threats
Aug 29, 2013 - eWeek

A master hacker's take on hacktivism today
Aug 29, 2013 - Al Jazeera

Guests: Kevin Mitnick
July 25, 2013 - Coast to Coast

Renowned ex-hacker Kevin Mitnick and top experts highlight cyber threats and countermeasures at Gulf Information Security Expo and Conference
Jun 4, 2013 - Zawya

Kevin Mitnick
May 25, 2013 - Rose State College

Notorious hacker Kevin Mitnick now helping keep elections secure
Feb 17, 2013 - NDTV Gadgets

Meeting Kevin Mitnick Thanks to ISSA PR
Feb 4, 2013 - Raul Colon

Former Hacker Reveals How Business Owners Should Protect Their Web Sites
Sep 6, 2012 - Business Insider

nCircle Announces Kevin Mitnick as Featured Keynote Speaker at World Wide User Group
Sep 5, 2012 - Herald Online

How the pros thwart computer spies with James Bond tricks
Sep 4, 2012 - CNET

KnowBe4 and ITIC study: Security lacks for 'own devices'
Sep 4, 2012 - Tampa Bay Business Journal

KnowBe4 and ITIC Latest Study Reveal Companies Lack Security for "BYOD"
Sep 04, 2012 - PR Web

KnowBe4 Supports FBI Tips Against RNC Cybercrime
Aug 23 2012 - Melodika

Book review: Ghost in the Wires
Jan 1, 2012 - ZDNet UK

Security tips from a legendary hacker
Dec. 19, 2011 - CBS News

23 Questions with Kevin Mitnick
Dec. 13, 2011 - Hak5

CNET 100: The celebrity entourage: Kevin Mitnick
Dec. 12, 2011 -

John J Nazarian's Guest Tonight is Famed Computer Hacker Kevin Mitnick
Dec. 11, 2011 - Straight Talk with John J Nazarian

Kevin Mitnick talks social engineering and his new book
Dec. 8, 2011 - Tekzilla

Book Review: Ghost in the Wires
Dec. 7, 2011 - Hacked Existence

Book Review: Ghost in the Wires by Kevin Mitnick
Dec. 7, 2011 - The Crisan Chronicles

Tech Books of Note
Nov. 30, 2011 - Bloomberg

Kevin Mitnick Talks Celebrity Hacking, Common Mistakes, and Tips for the Average Joe
Nov. 26, 2011 - International Business Times

Book Review: Ghost In The Wires
Nov. 13, 2011 - SecurityTube

Kevin Mitnick spills the beans on his exploits
Sept. 7, 2011 - Willamette Live

Mitnick's Tale Sheds Light on Social Tactics
Sept. 6, 2011 - Dark Reading

Inside the world of computer hacking
August 31, 2011 - CNN

10 Questions for Kevin Mitnick
August 29, 2011 - Time Magazine

Triangulation Episode 21: Kevin Mitnick
August 24 2011 - TWiT

Reuters Shows How To Hack Phones 'Like A News Of The World Reporter'
August 29, 2011 - Huffington Post

How to hack like a News of the World reporter
August 29, 2011 - Reuters Video

Confessions of a hacker
August 22, 2011 - American Public Media

Hacker filled the tank with nerve, took FBI on wild ride
August 20, 2011 - Winnipeg Free Press

Kevin Mitnick loved the cyberspace break-in game
August 20, 2011 - Salon

Master Hacker Kevin Mitnick Shares His 'Addiction'
August 21, 2011 - NPR

TNW Sessions ft. Kevin Mitnick—The world's most wanted hacker
August 19, 2011 - TNW

The Godfather of Hacking
August 19, 2011 - The Daily Beast

Mitnick's "Ghost in the Wires" Will Hack Your Mind With Real Life Adventures in Hacking
August 16, 2011 - Stay N' Alive

Ghost in the Wires takes a fascinating look at the high-stakes art of computer hacking through the eyes of a man who perfected it.
August 15, 2011 - American Way Magazine

Kevin Mitnick with Stephen Colbert
August 18, 2011 - The Colbert Report

Kevin Mitnick, Former Fugitive Hacker, Laments How The Game Has Changed
August 16, 2011 - Huff Post Tech

Kevin Mitnick's book lands
August 15 2011 - LA Observed

A Hacker Tells All
August 12, 2011 - New York Times

Protecting Your Data From People Like Me
August 13, 2011 - Wall Street Journal

Book Excerpt: Ghost in the Wires — My Adventures as the World’s Most Wanted Hacker
August 16, 2011 - Wired's Threat Level

Hacking the system, because he could
August 16, 2011 - New Scientist's CultureLab

Review of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
July 20, 2011 - Technorati

Hackers often fool people, not technology, to get data
July 28, 2011 - Mercury News

Early Review of Ghost in the Wires
April 30, 2011 - TaoSecurity

THN Review : Ghost in the Wires - Kevin Mitnick
July 2011 - The Hacker News

GHOST IN THE WIRES: My Adventures as the World's most Wanted Hacker
July 1, 2011 - Kirkus Reviews

A review of Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick
July 23, 2011 - The Nerdy Teacher

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
July 20, 2011 - RSA Conference

The Client Reviews Ghost In The Wires
June 15, 2011 - Zqueakz

Hackers trick public over rapper Tupac Shakur's death
May 31, 2011 - BBC News

Ghost in the Wires
May 19, 2011 -

Anybody can be a hacker, for a price
January 26, 2011 - CNN Video

For Kevin Mitnick, staying legal is job No. 1
Aug 5, 2010 - CNET News

The people involved in sale of lost iPhone revealed
Apr 29, 2010 - CNET News

Mitigating the social engineering threat
Apr 21, 2010 - TechRepublic

Ataques más comunes en Internet
Mar 18, 2010 -

Kevin Mitnick to keynote World Game Protection Conference
Feb 16, 2010 -

Smoking the Competition: Creative business cards are the ones people remember
Feb 2010 - Entrepreneur Magazine

Hackers for Hire
Feb 2, 2010 - Fox News


Documents & Files