Facebook Twitter LinkedIn Login Contact Us
Our Team has a 100% Success Rate!
Our Team has a 100% Success Rate!

KEVIN MITNICK SPEAKING ENGAGEMENT MARKETING MATERIALS

For Your Website, E-mail and Print Needs

All material is "Bureau Friendly" with no direct branding!

Download - Cut - Paste - Link

Don't forget to ask us for a comprehensive brochure for your hosts: request now.

 

BIOGRAPHY

Please note the italicized terms and trademarked items. You may wish to embed his cover for his autobiographical work: Ghost in the Wires: My Adventures as the World's Most Wanted Hacker.

Short Biography (Designed specifically for your search results summary)

Kevin is the world's most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

Kevin's presentations are akin to "technology magic shows" and include live demonstrations of the latest hacks and cyber threats. 

Full Biography

There is no one like Kevin.

Kevin Mitnick is the world's most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. 

Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees— learn how to protect their information and themselves from harm.

As the CEO of Mitnick Security Consulting, Kevin, and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. Also in his role of Chief Hacking Officer of KnowBe4 he helps produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness. 

Kevin is a global bestselling author and his books are availability in over 50 countries and 20 languages. His works include The Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers and The Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker is a New York Times bestseller and his latest work released in 2017 is The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, a ground-breaking book on privacy.

As a one-of-a-kind public speaker, Kevin's presentations are akin to technology magic shows which include the latest hacking techniques that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases "security awareness". Kevin has been a commentator, security analyst, or interview subject for almost every major news outlet around the globe. 


TITLES & TAGLINES

Titles

  • Kevin Mitnick is the Chief Executive Officer (CEO) of Mitnick Security Consulting
  • Kevin is also the Chief Hacking Officer (CHO) of KnowBe4

Taglines (please let us know if you need proofs):

  • The World's Most Famous Hacker
  • Formerly the World's Most Wanted Hacker
  • Leader of the World's Top Security Penetration Team
  • The World's Top Cybersecurity Speaker
  • The World's Top Cyber Security Speaker

Please note Cybersecurity is also spelled Cyber Security. Both are acceptable and we recommending using both in any listing related to Kevin so you don't miss out on searches and SEO.


KEYNOTE SELECTIONS

Preamble

Kevin's presentations include live demonstrations the latest hacks and cyber threats. His keynotes are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases "security awareness."

1) HOW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization

Why Chose This Presentation:

  • Kevin’s most popular speech for all audiences
  • If you don’t want to be “owned” this is a must see
  • The #1 recommended presentation to raise "security awareness"

Presentation Length: Choose from either a set 75-minute or a shortened 60-minute keynote followed by 15 minutes of Q&A

Full Keynote Description:

It takes one to know one.

People are the weakest link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates how a hacker’s thought process works and how they ply their tradecraft. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."

Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure.  Kevin is `now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team and they maintains a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. 

Kevin is the worldwide authority on social engineering and constantly improves and updates this highly effective and acclaimed "security awareness" presentation that illustrates the latest threats and risks most people don’t even know exist.

You’ll learn how to detect manipulation and take steps to protect yourself and your organization. Gain the power to think defensively.

2) GHOST IN THE WIRES: Go on the Run with the Most Wanted Hacker in the World

Why Choose This Presentation:

  • When your audience needs an escape
  • The "Catch Me if You Can" thrill ride of the digital age
  • The story the government doesn't want you to know

Presentation Length: This is a set 75-minute keynote plus 15 minutes of Q&A

Full Keynote Description:

Treat yourself to an unforgettable experience. Come on the run and escape with Kevin as he takes you on this hilarious and mind-boggling adventure based upon his New York Times bestselling autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker.

Kevin is a master storyteller who puts you right in the action of this sophisticated cat-and-mouse game that led authorities through false identities, jumping from city to city, plenty of close shaves, and ultimately, a bizarre showdown with the feds. He was the most elusive computer break-in artist in history. Although he never stole for financial gain or damaged systems, he did hack into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, and no matter how fast the authorities were, Kevin was faster, using technology not only to evade but also to spy on and track his pursuers. His story--packed with hysterical pranks and fear-driven hysteria--actually started a movement and changed how companies secure their information". Would you like to see a real ghost?

3) CUSTOM KEYNOTE CREATED FOR YOU:  A Scripted Conversation with Live Hacking

Why Choose This Presentation:

  • Uniquely leverage Kevin for your specific needs
  • Reinforce the messaging of your product, services, topic, and event
  • Create affinity with the top knowledge expert
  • After Kevin reveals the threats, your team shows the solutions

Presentation Length: This presentation can be designed for any length up to 90 minutes including Kevin’s Q&A with the audience

Full Keynote Description:

With your team Kevin will create a custom experience with real live hacking that will inform, entertain and educate your attendees. 

Don’t just tell them… show them!

Kevin stands alone in the world of cyber security speakers. This presentation will provide you the advanced ability of making your talking points come alive on stage.  In this very popular scripted Q&A format you’ll coordinate pre-arranged questions with Kevin so that he’ll have amazing hacking demonstrations to illustrate the key answers and event messaging.  Your audience will be more attentive as they are engrossed within a unique experience akin to a “technology magic show”.

You will provide a moderator, who, we suggest, should be part of your closing team for enterprise clients after the event, to be on stage with Kevin. This will help to create affinity for your team and recognition of the individual.

Your audience will easily grasp your concepts as Kevin showcases current hacks both he and his team use during penetration testing to evaluate his clients’ networks, systems and devices for security vulnerabilities. He’ll also stand side-by-side with you to help elevate the services, competency and message of you and your team because of his own first class reputation as a world authority on cybersecurity.

Create an unforgettable message from an unforgettable event experience.


EXAMPLE HOSTS & GREAT QUOTES

Example Hosts from the Past 15 Years of Speaking:

A10 Networks, Accenture, AIM Institute, Altiris, American Financial Services Association (AFSA), American Financial Systems Association, Arco, Asgent, Association for Communications Technology Professionals in Higher Education (ACUTA), AT&T, ATI, Banamex (National Bank of Mexico), BBVA Compass, Carnegie Mellon, CBS, CeBIT, Citrix, Cloudmark, Cmark, College of Healthcare Information Management Executives (CHIME), ConnectWise, CyberSource, Cyber Innovation Center, Cyber Protection Resources, D Software, Dasher Technologies, Dell, Dell Security Group, Dell Software, Deutsche Messe AG, Diebold, Discover Card, DST Systems, Dubai World Trade Center, e.Republic,  Energy Insurance Mutual, EuroFinance, Federal Aviation Administration (FAA), FedEx, Federal Bureau  of Investigation (FBI), Fidelity, First Financial Bank, First National Bank, FireMon, FIS Global, Fiserv, Fishnet, Food Industry Services, Freescale, Futura Networks, Future Com, General Dynamics, General Satellite, Globb TV, Google, Guard ID, Harvard, Hannover Fairs, Health  Information  System  Society,  Hewlett-Packard (HP), Hewlett Packard Enterprise (HPE), Humana,  IBM,  IDC, InfoBlox, Information Systems Security Association (ISSA), Information Today, InfoSec, Infragard, Investment Company Institute (ICI), Investment Management Consultants Association (IMCA), ITT Market, IT Web, JP Morgan Chase, Juniper Networks, KnowBe4, KPMG, Liberty Stage, Lifelock, Lockheed Martin, Mailchimp, Management Circle, MasterCard, Menlo Ventures, Merchant Risk Council, MetLife,  Microsoft, MIS Training, MOBI Wireless, Moneris, NASA, National  Association  of  Convenience Stores (NASC), National Geographic, Nationwide, Neustar, NETpeas, Nordic eCommerce Knowledge, OneBeacon, Ontario Systems, OpenText, Oracle,  Panda,  Palo Alto Networks, Palsit, Phion, Pereira & O’Dell, Principa College, Public World, Relay Ventures, Rhino, RiskMathics,  Rose State College,  Qualys, Quest Media, Sabre, Sailpoint Technologies, Security Network of America,Skyrr, Shift4, Social Security Administration, SupportSoft, Symantec,  Systems  Management  Planning, Tata Consulting  Services, Technology Nexus, Techweb, Telefonica, Teleperformance, Tomascon, Toshiba, Toyota,  Travelocity, UAE PMO, UBM, ULM, United Business Media, US  Congress, US Pretrial Services, US Senate, Unatek, Vækstfonden, Vantagem, Verafin, Visa, VIA  Technology, VMware, VMware User Group (VMUG), Vocent, Voxeo, Watchcom, Websense, Wells Fargo, World Game Protection, World Government Summit, Worldnet, Young Presidents'  Organization (YPO), Zenlok, Ziff Davis, Zilog, Zimperium, Zix Corporation

Quotes:

In General:

  • "In our world, Kevin Mitnick is our David Beckham or Lebron James." Micho Schumann, Pricipal Advisory at KPMG 2016
  • "If hackers were rock stars, Kevin Mitnick would be Mick Jagger" Mathew Dunn, Technology Editor at News.com  2015
  • "The World's Most Famous Hacker" CNN
  • "The World's Greatest Hacker" Fox News

Host Reviews:

Elipses

  • “. . . funny and definitely in the zone . . .” Amy Draves, Microsoft
  • “. . . unique ability to connect with both technical and nontechnical groups . . .” John Dietrich, Dell
  • “. . . You opened their eyes, and that's what I wanted.” Willy Allison, World Game Protection
  • “. . . He showed how readily information can be gathered by hackers . . .” Capt. Steven “Doc” Simon, USN
  • “. . . sitting on the edge of their seats . . .” Robert Sensenig, Core BTS

Long Form:

“Delegates at the event gave Kevin a rating of 98% for content and 98% for delivery. I’m sure you will agree with me the scores were sensational.” Joyce Ong, Marketing and Communications, Accenture
 
"Kevin Mitnick, world-renowned hacker and security expert, entranced an audience of over 1500, including 1000 US Naval Academy Midshipmen, at the United States Naval Institute’s Conference on cyber security.  His presentation explained the dangers of social engineering and how individuals can reduce the risks having their personal information and online accounts stolen.  During his demonstration, he showed how readily information can be gathered by hackers using perfectly legal means from any organization’s forward facing servers.  He additionally showed a Midshipman how easily he could, through readily accessible and legal means, obtain personal information stored on the Internet.
Mitnick was exciting and provided real-world information that not only informed but entertained the audience.  He left the Academy a buzz as word of his presentation spread and had the Midshipmen asking for additional sessions with him!" CAPT Steven “Doc” Simon, USN Director, Cyber Security Center United States Naval Academy


SEARCH KEYWORDS & DATABASE TOPICS 

Used for positioning Kevin on your website

Keywords:

Anonymous, Big Data, Business, Celebrity, Computer, Computer Security, Computer Crime, Computer Forensics, Computer Hacking, Consumer Products, Consumer Protection, Crime, Cybercrime, Cyberthreats, Cyber Security, Cybersecurity, E-Commerce, Edward Snowden, Futurist, Government Security, Hacker, Hacking, Healthcare, Internet, Information Security, Information Technology, Law, NSA, Mobile, Mobile Devices, National Security, Networks, Pop Culture, Privacy, Security, Security Awareness, Telecommunications

Topics:

Business, Business Leaders, Celebrity, Computers, Crime, Current News, Cyber Security, Cybersecurity, Futurist, Government, Healthcare, Inspirational, International Affairs, Law, Military, Motivational, Science, Technology

 


BEST SELLING BOOKS & COVER IMAGES

Kevin is a global bestselling author.

THE ART OF INVISIBILITY: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin Mitnick with Robert Vamosi. February 2017

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. 

In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Cover Downloads (PC: right-click - Mac: command-click to download):

  • THE ART OF INVISIBILITY
  • THE ART OF INVISIBILITY
  • THE ART OF INVISIBILITY

GHOST IN THE WIRES: My Adventures as the World's Most Wanted Hacker
Kevin Mitnick with William L. Simon. Forward by Steve Wozniak. August 2011
A New York Times Bestseller

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

Cover Downloads (PC: right-click - Mac: command-click to download):

  • GHOST IN THE WIRES
  • GHOST IN THE WIRES
  • GHOST IN THE WIRES

THE ART OF INTRUSION: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin Mitnick with William L. Simon. March 2005

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:

  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison

A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Cover Downloads (PC: right-click - Mac: command-click to download):

  • THE ART OF INTRUSION
  • THE ART OF INTRUSION
  • THE ART OF INTRUSION

THE ART OF DECEPTION: Controlling the Human Element of Security
Kevin Mitnick with William L. Simon. Forward by Steve Wozniak. October 2002

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security.

Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."

Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.

Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Cover Downloads (PC: right-click - Mac: command-click to download):

  • THE ART OF DECEPTION
  • THE ART OF DECEPTION
  • THE ART OF DECEPTION

IMAGES

Click on an image to download it (PC: right-click - Mac: command-click to download):

THUMBNAILS - Perfect unique images designed specifically for your search results to make people click to learn more

  • photo
  • photo
  • photo
  • photo

HIGH RESOLUTION - Head shots and recent studio shots

  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo
  • photo

WEB RESOLUTION - Speaking related for your website listing of Kevin including his "Most Famous" Logo and more

  • photo
  • photo
  • photo
  • photo
  • photo

BEST SELLING BOOK COVERS

  • The Art of Invisibility
  • The Art of Invisibility
  • The Art of Invisibility
  • GHOST IN THE WIRES
  • GHOST IN THE WIRES
  • GHOST IN THE WIRES
  • THE ART OF INTRUSION
  • THE ART OF INTRUSION
  • THE ART OF INTRUSION
  • THE ART OF DECEPTION
  • THE ART OF DECEPTION
  • THE ART OF DECEPTION

 

LOGOS

  • logo
  • photo
  • logo
  • logo
  • photo

SPEAKING ENGAGEMENT VIDEOS - STREAMED HIGH DEFINITION OR DOWNLOAD

Instructions on how to Embed or Download for use on your website

1) Meet Kevin - The World's Most Famous Hacker

Late Night Fun with Stephen Colbert - His Best Selling Books - Security Commentator on CNN (7 minutes)

Vimeo HD - copy and paste the link below to embed in wordpress website,
or view video on Vimeo to retrieve embed code to use on any other website.
http://vimeo.com/100742573

YouTube - copy and paste the link below to embed in wordpress website,
or view video on YouTube to retrieve embed code to use on any other website.
http://youtu.be/BSfdefR8H3c

2) See Kevin Hack Live - Sample Keynote Clips

Security Awareness Thinking - Security Awareness Decisions - Questions and Answers (18 minutes)

Vimeo HD - copy and paste the link below to embed in wordpress website,
or view video on Vimeo to retrieve embed code to use on any other website.
http://vimeo.com/93413899

YouTube - copy and paste the link below to embed in wordpress website,
or view video on YouTube to retrieve embed code to use on any other website.
http://youtu.be/7KCMK-LY-WM

 

Thank you for your interest in marketing Kevin. Please let us know if there is anything else you need.

Mitnick Security Clients