Kevin Mitnick Speaking Engagement Marketing Materials

For Your Website, E-mail and Print Needs
All material is "Bureau Friendly" with no direct branding!

Biography

Please note the italicized terms and trademarked items. You may wish to embed his cover for his autobiographical work: Ghost in the Wires: My Adventures as the World's Most Wanted Hacker.

Short Biography (search results summary)

Kevin Mitnick is the world's most famous hacker, a New York Times bestselling author, and the top cybersecurity keynote speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

As a one-of-a-kind, public speaker, Kevin's presentations are akin to "technology magic shows," which include live demonstrations of the latest hacking techniques that educate while keeping people on the edge of their seats to help raise "security awareness" of individuals and organizations worldwide.

Full Biography

There is no one like Kevin.

Once one of the FBI's Most Wanted because he went on an ‘electronic joyride’ during which he hacked into more than 40 major corporations just for the challenge and not for monetary gain, Kevin Mitnick was once the most elusive computer break-in artist in history. 

Today, he is a trusted, highly sought-after security consultant to Fortune 500 and governments worldwide. Kevin Mitnick is the world's authority on hacking, social engineering, and security awareness training. In fact, the world’s most used computer-based end-user security awareness training suite bears his name.

Kevin’s keynote presentations are one part magic show, one part education, and all parts entertaining. Whether delivered virtually or live, Kevin will entertain and educate your audience with real demonstrations of the latest hacking techniques to help raise the security awareness of individuals and organizations worldwide while keeping attendees on the edge of their seats.

Kevin is a global bestselling author and his books are available in over 50 countries and 20 languages. He is the world authority on social engineering and security awareness training.  Well over 1 million professionals watch Kevin Mitnick’s Security Awareness Training program every year. His written works are mandatory readings for security professionals. They include:

  • The Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers 
  • The Art of Deception: Controlling the Human Element of Security 
  • Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (NY Times Bestseller) 
  • The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data 

He has been a commentator, security analyst, or interview subject for almost every major news outlet around the globe. Kevin has also been the subject of movies, books, and countless articles.

What People are Saying: 

  • "The World's Greatest Hacker" Fox News
  • "The World's Most Famous Hacker" CNN
  • "In our world, Kevin Mitnick is our David Beckham or Lebron James." KPMG
  • "If hackers were rock stars, Kevin Mitnick would be Mick Jagger" News.com

As the CEO of Mitnick Security Consulting, Kevin, along with his The Global Ghost Team™ maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. Also, in his role of Chief Hacking Officer of KnowBe4 he helps produce the world's most popular security awareness training programs to counteract social engineering and to improve security effectiveness.

Presentation Topics: 

  • Digital security & cyber security
  • Social engineering
  • Hacking and hackers
  • Remote workforce safety
  • Enterprise hacking
  • Digital privacy 
  • Custom hacking experiences and demonstrations for your own unique event

 

Titles & Taglines

Titles

Kevin Mitnick is the Chief Executive Officer (CEO) of Mitnick Security Consulting

Kevin is also the Chief Hacking Officer (CHO) of KnowBe4

Taglines

(Normally used instead of above. Please let us know if you need proofs):

  • The World's Most Famous Hacker
  • Formerly the World's Most Wanted Hacker
  • Leader of the World's Top Security Penetration Team
  • The World's Top Cybersecurity Keynote Speaker
  • The World's Top Cyber Security Keynote Speaker

Please note Cybersecurity is also spelled Cyber Security. Both are acceptable and we recommending using both in any listing related to Kevin so you don't miss out on searches and SEO.

Keynote Selections

hire-kevin-mitnick-to-speak

Kevin's presentations include live demonstrations the latest hacks and cyber threats.

His keynotes are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases "security awareness."

hire-kevin-mitnick-to-speak

Hacked – A Keynote with Kevin Mitnick 

The #1 Cybersecurity Awareness Presentation. 

In this 60-minute keynote, delivered virtually or in-person, audience members will follow along as Kevin hacks multiple systems in real time and exposes just how vulnerable individuals - and enterprises - really are. 

This presentation will: 

  • Keep audience members engaged and entertained as they see real hacks in action 
  • Reinforce organizational messaging around raising security awareness
  • Highlight the most current cyber threats and exploits 
  • Educate audiences about their own susceptibility to social engineering

In Hacked, Kevin creates a custom hacking experience for your organization or attendees, showcasing not just the power of social engineering in the hands of a competent hacker, but also the latest threats that you may be exposed to today. 

Throughout the presentation, Kevin will share stories, experiences, and history of his most thrilling exploits and successful infiltrations. 

This customizable presentation is ideal for: 

  • Enterprise organizations looking to reinforce security awareness education
  • Cybersecurity conferences that need to wow audiences at all levels of experience and security expertise

 

Hook, Line, and Sinker: How Phishers Bait Remote Workers with Social Engineering 

When it comes to fishing, you can reel in a big catch with the right bait. Cyber “phishing” is no different; all a hacker needs is a clever backstory and a little deceit to turn your employees into suckerfish. 

Now more than ever, remote employees are being caught in malicious social engineering nets. Knowing all-too-well that many companies aren’t taking proper security measures and that employees are distracted while working from home, bad actors posing as trusted sources are tricking your staff into clicking infected links and sharing private information to hack their way into your servers.

How do you prevent users from falling hook, line, and sinker? Better protection starts with proper awareness and education. 

Kevin Mitnick, the world’s most famous hacker, will use live demonstrations to illustrate how cyber criminals take advantage of your employee’s trust through the art of social engineering. 

This acclaimed presentation will entertain your employees while educating them about the latest cyber threats— risks many don't even know exist! This eye-opening exposé demonstrates just how easily anyone can be tricked into handing over the keys to the kingdom. Not only will listeners hear real-life accounts of Kevin’s pentesting exploits and see live hacks right before their eyes, but “Hook, Line, and Sinker” will also explore the psychology of deception— from the neuroscience behind why we take the bait to cognitive defenses anyone can use to swim smoothly through an ocean of digital threats. 

Formerly one of the FBI’s “Most Wanted” targets for his elite hacking, there’s no one more qualified than Kevin to talk about the art of cyber deception. Your audience will watch in pure astonishment as the most elusive digital trickster in history shares a live look inside the mind of a hacker.

This presentation: 

  • Is ideal for remote and newly-remote teams 
  • Includes customizable, real hacking demonstrations from Kevin Mitnick
  • Includes a live Q&A
  • Will help users - and organizations - improve their security posture, at home and in the office

“Mitnick was exciting and provided real-world information that not only informed but entertained the audience.” - United States Naval Academy

Drawing the Curtain: “Houdini of Hackers” Reveals the Latest Social Engineering Tricks

When it comes to hacking, the average person has no idea how it actually works. And while— just like magic— cyber breaches often seem to appear out of nowhere, hacking is often not always as mysterious as you may think. 

As the “Houdini of Hackers” Kevin Mitnick is known for his spellbinding live demonstrations, where he lifts the veil to show, step-by-step, what real hackers are hiding up their sleeves. 

Bad actors use information about your company and your employees against you, posing as trusted sources to gain access into your networks. These “social engineers” use human psychology to deceive you and your workforce; and in this talk, we’re drawing back the curtains to reveal their biggest tricks.

There’s no one more qualified than Kevin to talk about the art of cyber deception: his real-life exploits once put him on the FBI’s “Most Wanted” list. Today, audiences watch in pure amazement, and being astonished by the most elusive digital trickster in history shares a live look inside the mind of a hacker.

In this presentation, Kevin: 

  • Shares his story, beginning with how he’d hack for fun and out of curiosity, to his life on the run, to becoming the cyber security consultant to the world’s top organizations
  • Demonstrations live, the very latest threats and social engineering tactics used by bad actors 
  • Answers your audience’s top questions about hacking, staying safe, and avoiding malicious magic tricks.


“Die-hard techies will enjoy ‘geeking out’ with Kevin, and everyone else will still be fascinated and perhaps a little frightened by what they learn. Our attendees could not have been more pleased.” - Dell

Under the Magician’s Hat: Hackings Biggest Secrets Revealed with Kevin Mitnick

Just like you never know what a magician might pull out of his hat, it’s hard to guess what tricks a hacker might have stuffed up his sleeve. Both have a whole bag of tricks at their disposal to fool you. 

In today’s digital-forward landscape, bad actors are more motivated than ever to gain illicit access to your organization’s systems— conjuring up clever ruses to gain entry. These “social engineers” masquerade as trusted sources, hoodwinking your staff into sharing any information they can get their hands on to skirt past your best defenses. 

Just as a magician is best positioned to recognize a magician’s tricks, who better than a former hacker to showcase the tricks and tactics behind today’s most mysterious cyberthreats. While your users are undoubtedly the weakest link in your network security, better protection simply starts with proper awareness and education. 

Coined the “Houdini of Hackers” for his spellbinding live demonstrations, the world’s most famous hacker— Kevin Mitnick— takes the stage to reveal, step-by-step, the tricks that real hackers are hiding up their sleeves. 

As a previous FBI’s “Most Wanted” target for his elite hacking, there’s no one more qualified than Kevin to talk about the art of cyber deception. Watch in pure amazement as the most elusive digital trickster in history shares a live look inside the mind of a hacker.

In this presentation, Kevin: 

  • Reveals the secrets he learned while becoming the world’s most wanted hacker and passes those secrets on to your audience
  • Provides live demonstrations of the very threats and social engineering tactics used by bad actors targeting your organization
  • Answers your audience’s top questions about hacking, staying safe, and avoiding malicious attacks

“We have received lots of positive feedback about the event. Kevin is a great speaker with tons of wit and flair.” - Calgary Board of Education

Sleight of Hand, Sleight of Keystroke: The Hacker’s Playbook Revealed 

Hackers are a lot like stage magicians. Both capitalize on the art of deception to fool you into seeing what they want you to believe. Whereas magicians use cunning sleight-of-hand tricks to distract from what’s really happening, social engineers hack from behind the digital curtain, gaining stealthy access into your systems.

It only takes one employee to click a malicious link, or one stranger to plug a malware-injected drive into your computer, and it’s showtime for a bad actor. Elite hacks can happen in seconds, and be timed to activate after idle periods on your device. With today’s incredible technology, it’s a case of “Now You See It, Now You Don’t” cyber magic— leaving users none-the-wiser that they were breached. 

Who better to demystify this magic than the “Houdini of Hackers,” Kevin Mitnick? Once one of the FBI’s “Most Wanted” due to his elite hacking, today, Kevin is one of the good guys, helping organizations across the globe improve their security posture and awareness. Over 1 million people take part in Kevin Mitnick Security Awareness Training every year. 

In this technological magic show, your audience will be spellbound as the most elusive digital trickster in history shares a live look inside the mind of a hacker.

"I've never had such great feedback for a keynote speaker!" - Internetwork Engineering

It Takes One to Know One: Live Hacking Demonstrations with the World’s Once “Most Wanted” Hacker

The iconic saying goes, “it takes one to know one”— and in many cases, it’s true. That’s why when it comes to hacking, you can’t trust the theory of cybersecurity alone. You also need to understand its application.

On the playing field of cybersecurity keynotes, others just talk about the game, while Kevin Mitnick actually plays. And, boy... does he play hard. In fact, Kevin was once on the FBI’s “Most Wanted” list for hacking into 40 major corporations just for the fun of it.. There’s no one more qualified than Kevin to talk about the art of cyber deception. Through live demonstrations, Kevin illustrates exactly how cyber criminals take advantage of your employee’s trust through the art of social engineering. 

Today, Kevin ethically hacks –  for a living – as the CEO for the globally-renowned cybersecurity corporation: Mitnick Security. Kevin also serves as the Chief Hacking Officer at KnowBe4, and his Kevin’s Security Awareness Training (KMSAT) program is virtually attended by over 1 million people every year.

This acclaimed presentation demystifies today’s latest cyber threats. These are the risks that many don't even know exist!  Are you ready to open your audiences’ eyes to just how easily anyone can be tricked into handing over the keys to the kingdom? 

Watch in pure amazement as the most elusive digital trickster in history shares a live look inside the mind of a hacker.

Digital Deception: Inside the Mind of a Hacker

People think that hackers are just skilled with computers. They understand logic and can program— and that’s it. But hackers are masterminds at deception; and it’s their extraordinary understanding of the psychology of trust that gets them past your defenses. 

The best malware is nothing without the cunning force behind the script. These “social engineers” do the hard work: researching your company, acquiring bread crumbs of information, and investing the time to build a relationship with your staff before deploying their attack. They’re patient and precise, posing as authority figures or trusted vendors to slip in unnoticed. Whether it’s clicking a malicious link or holding the door open for the friendly Fire Inspector, hackers disguise their intentions through extraordinary feats of deception.

But what if you could get inside the mind of a hacker? If you could spot their tricks in action, you’d be much less likely to be fooled. The good news is, with the right help, you can see past the ruse. 

Say hello to Kevin Mitnick.

Kevin was once on the FBI’s “Most Wanted” list for hacking into 40 major corporations just for the fun of it. Today, Kevin ethically hacks for a living, as the CEO for the globally-renowned cybersecurity corporation: Mitnick Security. As the Chief Hacking Officer at KnowBe4, Kevin’s Security Awareness Training program is virtually attended by over one million people every year. Professionally speaking, there’s no one more qualified than Kevin to explain the art of cyber deception. 

Through live demonstrations, Kevin will illustrate exactly how cyber criminals take advantage of your employee’s trust through a practice called social engineering. In each live hack, he’ll open your eyes to the psychology behind the attack, and arm every listener with the awareness and tactics they need to spot bad actors before they compromise your systems. A must-watch talk to unravel the mysterious yet fascinating art of digital deception, this will be a presentation your audience remembers for years to come. 

Custom Virtual Presentations

Work with Kevin to craft the perfect web-based, virtual presentation that engages audiences and keeps them on the edge of their seats, even in front of their computer screens

  • One on One with Kevin Mitnick: A Fireside Chat with the World’s Most Famous Hacker
  • Panel Discussions
  • Q&As 
  • Web Interviews & Thought Leadership Videos

Web Commercials & Promotional Marketing Videos

Example Hosts & Great Quotes

Example Hosts from the Past 17 Years of Speaking

A10 Networks, Accenture, AIM Institute, Altiris, American Financial Services Association (AFSA), American Financial Systems Association, Arco, Asgent, Association for Communications Technology Professionals in Higher Education (ACUTA), AT&T, ATI, Banamex (National Bank of Mexico), BBVA Compass, Blue Cross Blue Shield, Carnegie Mellon, CBS, CeBIT, Citrix, Cloudmark, Cmark, College of Healthcare Information Management Executives (CHIME), ConnectWise, CyberSource, Cyber Innovation Center, Cyber Protection Resources, D Software, Dasher Technologies, Dell, Dell Security Group, Dell Software, Deutsche Messe AG, Diebold, Discover Card, DST Systems, Dubai World Trade Center, e.Republic, Energy Insurance Mutual, EuroFinance, Federal Aviation Administration (FAA), FedEx, Federal Bureau of Investigation (FBI), Fidelity, First Financial Bank, First National Bank, FireMon, FIS Global, Fiserv, Fishnet, Food Industry Services, Freescale, Futura Networks, Future Com, General Dynamics, General Satellite, Globb TV, Google, Guard ID, Harvard, Hannover Fairs, Health Information System Society, Hewlett-Packard (HP), Hewlett Packard Enterprise (HPE), Humana, IBM, IDC, InfoBlox, Information Systems Security Association (ISSA), Information Today, InfoSec, Infragard, Investment Company Institute (ICI), Investment Management Consultants Association (IMCA), ITT Market, IT Web, JP Morgan Chase, Juniper Networks, KnowBe4, KPMG, Liberty Stage, Lifelock, Lockheed Martin, Mailchimp, Management Circle, MasterCard, Menlo Ventures, Merchant Risk Council, MetLife, Microsoft, MIS Training, MOBI Wireless, Moneris, NASA, National Association of Convenience Stores (NASC), National Geographic, Nationwide, Neustar, NETpeas, Nordic eCommerce Knowledge, OneBeacon, Ontario Systems, OpenText, Oracle, Palo Alto Networks, Palsit, Phion, Pereira & O’Dell, Principa College, Public World, Relay Ventures, RedHat, Rhino, RiskMathics, Rose State College, Qualys, Quest Media, Sabre, Sailpoint Technologies, Security Network of America,Skyrr, Shift4, Social Security Administration, Splunk, SupportSoft, Symantec, Systems Management Planning, Tata Consulting Services, Technology Nexus, Techweb, Telefonica, Teleperformance, Tomascon, Toshiba, Toyota, Travelocity, UAE PMO, UBM, ULM, United Business Media, US Congress, US Pretrial Services, US Senate, Unatek, Vækstfonden, Vantagem, Verafin, Visa, VIA Technology, VMware, VMware User Group (VMUG), Vocent, Voxeo, Watchcom, Websense, Wells Fargo, World Game Protection, World Government Summit, Worldnet, Young Presidents' Organization (YPO), Zenlok, Ziff Davis, Zilog, Zimperium, Zix Corporation

Quotes:

In General:

  • "In our world, Kevin Mitnick is our David Beckham or Lebron James." KPMG
  • "If hackers were rock stars, Kevin Mitnick would be Mick Jagger" News.com
  • "The World's Most Famous Hacker" CNN
  • "The World's Greatest Hacker" Fox News

Host Reviews:
Elipses and Short forms

  • “. . . funny and definitely in the zone . . .” Microsoft
  • “. . . unique ability to connect with both technical and nontechnical groups . . .” Dell
  • “. . . You opened their eyes, and that's what I wanted.” World Game Protection
  • “. . . He showed how readily information can be gathered by hackers . . .” USN
  • “. . . sitting on the edge of their seats . . .” Core BTS
  • "I've never had such great feedback for a keynote speaker!" Internetwork Engineering

Long Form:

“Delegates at the event gave Kevin a rating of 98% for content and 98% for delivery. I’m sure you will agree with me the scores were sensational.” Joyce Ong, Marketing and Communications, Accenture

"We would need to give out FREE PUPPIES this year to match the record crowds and excitement that Kevin Mitnick generated at our tradeshow booth last year, so, we just booked him again!" VMware

"Kevin Mitnick, world-renowned hacker and security expert, entranced an audience of over 1500, including 1000 US Naval Academy Midshipmen, at the United States Naval Institute’s Conference on cyber security. His presentation explained the dangers of social engineering and how individuals can reduce the risks having their personal information and online accounts stolen. During his demonstration, he showed how readily information can be gathered by hackers using perfectly legal means from any organization’s forward facing servers. He additionally showed a Midshipman how easily he could, through readily accessible and legal means, obtain personal information stored on the Internet.

"Mitnick was exciting and provided real-world information that not only informed but entertained the audience. He left the Academy a buzz as word of his presentation spread and had the Midshipmen asking for additional sessions with him!" CAPT Steven “Doc” Simon, USN Director, Cyber Security Center United States Naval Academy

Search Keywords & Database Topics

Used for positioning Kevin on your website

Keywords:

Anonymous, Big Data, Blockchain, Business, Celebrity, Computer, Computer Security, Computer Crime, Computer Forensics, Computer Hacking, Consumer Products, Consumer Protection, Crime, Cryptocurrency, Cybercrime, Cyberthreats, Cyber Security, Cybersecurity, E-Commerce, Edward Snowden, Futurist, Government Security, Hacker, Hacking, Healthcare, Internet, Internet of Things (IoT), Information Security, Information Technology, Law, NSA, Mobile, Mobile Devices, National Security, Networks, Pop Culture, Privacy, Security, Security Awareness, Telecommunications

Topics:

Business, Business Leaders, Celebrity, Computers, Crime, Current News, Cyber Security, Cybersecurity, Financial, Futurist, Government, Healthcare, Inspirational, International Affairs, Law, Military, Motivational, Safety, Science, Security, Technology

Best Selling Books & Cover Images

Kevin is a global bestselling author.

The Art of Invisibility

buy-invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data.


Kevin Mitnick with Robert Vamosi. February 2017

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

 

Read More

  

 

Ghost In The Wires

buy-ghost

My Adventures as the World's Most Wanted Hacker

Kevin Mitnick with William L. Simon. Forward by Steve Wozniak. August 2011

A New York Times Bestseller

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

 

Read More

 

The Art of Intrusion

buy-intrusion

The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Kevin Mitnick with William L. Simon. March 2005

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. 

Read More

  

 

The Art of Deception

buy-deception

Controlling the Human Element of Security

Kevin Mitnick with William L. Simon. Forward by Steve Wozniak. October 2002

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security.

Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."

Read More

 See Kevin Hack Live

 

Security Awareness Thinking - Security Awareness Decisions - Questions and Answers (18 minutes)