Famed ethical hacker Kevin Mitnick to give live hacking demo at HIMSS18

Presentations at VMware booth will give attendees an up-close look at how criminals infiltrate systems. 

The world’s “most famous hacker” will be showing some of the tools of the trade at the VMware booth on Tuesday and Wednesday. Kevin Mitnick, who gained notoriety in 1995 when he was arrested for well-publicized computer break-ins, has more recently developed a reputation as an ethical hacker, who can provide insight into the nature of cyberthreats that IT professionals need to defend against.

VMware will be hosting the demonstrations as part of its HIMSS18 exhibit featuring a Digital Clinical Workspace that is designed to provide the best patient care at any location, transform security to protect patient information, and modernize cloud infrastructure to introduce and scale services quickly.

Read more at the source.

Source: Healthcare IT News

Topics: Speaking Engagements, cyber criminals, ethical hacker, patient information protection, Phoenix Children's Hospital, Sands Expo, IT professionals, Mercy, system infiltration, VMware, cloud infrastructure, cyberthreats, Digital Clinical Workspace, most famous hacker, Kevin Mitnick, Nebraska Medicin

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›

What You Get When You Invest in Social Engineering Testing with Mitnick Security

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Mitnick Security: Ransomware Awareness Training

Ransomware is a type of malware that prevents accessibility to either a single computer or an entire network until a ransom is paid. This can result i..

Read more ›
tech-texture-bg