Here is a great opportunity to get schooled in cybersecurity from the World’s Most Famous Hacker, Kevin Mitnick

Envision Consulting, a Washington DC-based provider of IT services and support to financial advisory businesses, has hired me to be the master of ceremonies for a unique event to be held Wednesday October 19 in Tysons Corner, VA from 11am to 2pm.

The World’s Most Famous Hacker

Envision Consulting is brining Mitnick in to demonstrate his skills in front of our live audience and reveal just how vulnerable many of us are to sophisticated (and sometimes shockingly basic) phishing, spoofing, and social engineering attacks.

For more about Mitnick’s story and how he became known as The World’s Most Famous Hacker, watch the interview segment below with Stephen Colbert on the Cobert Report

See Kevin Mitnick for Free

So let’s get to the good stuff. You can enter to win a free ticket to this event, a $184.99 value, now through September 22nd.

Simply visit https://envisionconsulting.leadpages.co/fppad-cybersafe/ and use the Tweet button to post your entry via Twitter, or (since I’m all about efficiency) use the same Tweet button embedded below. All the rules for the contest, including notification information for the winner, are on the contest landing page, so be sure to review them to determine your eligibility.

Good luck, and I hope to see you in Washington DC on the 19th of October!

Source: FP Pad

Topics: Social Engineering, Speaking Engagements, Stephen, Tysons Corner, financial advisory businesses, penetration testing, spoofing, Cobert Report, cyber security, Envision Consulting, IT services, phishing demonstrations, security consultant, malware, Spam, Virginia, cybercrime, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg