Kevin Mitnick

  • Renowned Cybersecurity Speaker
  • Chief “White-Hat” Hacker, Global Ghost Team™—The World’s Top Security Penetration Testing Team
  • CEO, Mitnick Security


Kevin Mitnick is the world's most famous hacker, a New York Times bestselling author, and the top cybersecurity keynote speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

As a one-of-a-kind, public speaker, Kevin's presentations are akin to "technology magic shows," which include live demonstrations of the latest hacking techniques that educate while keeping people on the edge of their seats to help raise "security awareness" of individuals and organizations worldwide.

 

 

Add to my speaker list
Kevin  Mitnick headshot
Kevin  Mitnick photo 3
Kevin  Mitnick photo 2
Rave Reviews About Kevin Mitnick
Funny and definitely in the zone.

A Sample of the Groups That Have Hosted Kevin Mitnick
  • News.com
  • CNN
  • Core BTS
  • USN
  • World Game Protection
  • Dell
  • Microsoft
Kevin Mitnick - The Word Document Exploit - Get Sharable Link
Explore Kevin Mitnick's Talks
Expand all >

The Art of Invisibility: Defending Your Privacy Against Hackers, Spies and Big Brother

Learn the shocking truth about privacy. Like it or not, your every move is being watched and analyzed. Every step you take is tracked and stored. Once considered conspiracy theories and paranoia, the age of organized cyber criminals, big data, and Big Brother has arrived. You’ll gain incredibl ...

Learn the shocking truth about privacy. Like it or not, your every move is being watched and analyzed. Every step you take is tracked and stored. Once considered conspiracy theories and paranoia, the age of organized cyber criminals, big data, and Big Brother has arrived. You’ll gain incredible insight into your own personal exposure, and the steps you can take to protect yourself, from a man whose real-world insight about being a "ghost" is unparalleled.

Kevin Mitnick rose to worldwide fame after a much-publicized chase by the FBI as the World’s Most Wanted Hacker. Kevin never stole for profit or damaged systems, though he did become the most elusive computer break-in artist in history, as he hacked into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, using technology not only to evade but also to spy on and track his pursuers. Today, Kevin uses his unique talents to help people and organizations everywhere test and improve their cybersecurity and privacy.

You’ll be shown how to defend your privacy using easy cloaking and counter-measures by the world’s cybersecurity authority. Are you ready for the power of invisibility?

The Art of Deception: How Hackers and Con Artists Manipulate You and What You Can Do About It

People are the weakest security link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven&rs ...

People are the weakest security link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. Kevin Mitnick will entertain and educate you by performing his "live technology magic show" of the latest hacking techniques. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."

Social engineering is a technique used by hackers and con artists that leverages your tendency to trust. Trust is a truly noble human characteristic; however, in terms of personal and organizational security, it’s also a significant weakness because trust can be exploited. Kevin is the worldwide authority on social engineering and constantly improves and updates this highly acclaimed "security awareness" presentation with the latest threats and risks most people don’t even know exist.

You’ll learn how to detect manipulation and take steps to protect yourself and your organization. Gain the power to think defensively.

The Art of Intrusion: How Hackers Attack and How to Fight Back

Breaking into your technology and security is easy. To learn why, first you must think like a hacker. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates to you how a hacker’s thought process works and how they ply their tradecraft. You’ll start to see you and y ...

Breaking into your technology and security is easy. To learn why, first you must think like a hacker. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates to you how a hacker’s thought process works and how they ply their tradecraft. You’ll start to see you and your organization as a target through the hacker’s eyes and gain new insights into "security awareness." Kevin then enables you to strengthen your defenses through concrete and actionable guidance.

Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure. Kevin is now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team.

You’ll gain current and valuable insight into the hacker mindset by examining real-life computer break-ins. You’ll see how the perpetrators hacked in and how they successfully covered their tracks. More importantly, Kevin will share how you can prevent these same horror stories from being repeated in your organization in a cost-effective manner that offers maximum protection.

The Ghost in the Wires: The Story the Government Doesn't Want You to Know

Treat yourself to an unforgettable experience. Come on the run and escape with Kevin as he takes you on this hilarious and mind-boggling adventure based upon his New York Times bestselling autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. Kevin is a master storytell ...

Treat yourself to an unforgettable experience. Come on the run and escape with Kevin as he takes you on this hilarious and mind-boggling adventure based upon his New York Times bestselling autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker.

Kevin is a master storyteller who puts you right in the action of this sophisticated cat-and-mouse game that led authorities through false identities, jumping from city to city, plenty of close shaves, and ultimately, a bizarre showdown with the feds. He was the most elusive computer break-in artist in history. Although he never stole for financial gain or damaged systems, he did hack into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, and no matter how fast the authorities were, Kevin was faster, using technology not only to evade but also to spy on and track his pursuers. His story--packed with hysterical pranks and fear-driven hysteria--actually started a movement and changed how companies secure their information". Would you like to see a real ghost?

Custom Q&A: Reinforce Your Event's Messaging with Live Hacking

Would you like to grab and hold people’s attention on the matter of their security or privacy? Do you want to inform your audience about unknown threats or raise their security awareness? Are you tasked with informing people about a need for your security product or service? Don’t just ...

Would you like to grab and hold people’s attention on the matter of their security or privacy? Do you want to inform your audience about unknown threats or raise their "security awareness"? Are you tasked with informing people about a need for your security product or service?

Don’t just tell them…show them! Kevin stands alone in the world of professional speakers. He uniquely provides hosts and sponsors with the advanced ability of making their talking points come alive on stage. In this very popular Q&A format, you’ll coordinate pre-arranged questions with Kevin so that he’ll have amazing hacking demonstrations to illustrate the key answers and event messaging. Your audience will be more attentive as they are engrossed within a unique experience akin to a "technology magic show".

Your audience will easily grasp your concepts as Kevin showcases current hacks both he and his team use during penetration testing to evaluate his clients’ networks, systems, and devices for security vulnerabilities. He’ll also stand side-by-side with you to help raise affinity for you and your team and help imbue and raise legitimacy for your messaging because of his own positioning as a world authority on cybersecurity. Create an unforgettable message from an unforgettable event experience.

Hacked – A Keynote with Kevin Mitnick: The #1 Cybersecurity Presentatio

In this 60-minute keynote, delivered virtually or in-person, audience members will follow along as Kevin hacks multiple systems in real time and exposes just how vulnerable individuals - and enterprises - really are. This presentation will: ●        Keep audience members engaged and entertained as t ...

In this 60-minute keynote, delivered virtually or in-person, audience members will follow along as Kevin hacks multiple systems in real time and exposes just how vulnerable individuals - and enterprises - really are.

This presentation will:

●        Keep audience members engaged and entertained as they see real hacks in action

●        Reinforce organizational messaging around raising security awareness

●        Highlight the most current cyber threats and exploits

●        Educate audiences about their own susceptibility to social engineering

In Hacked, Kevin creates a custom hacking experience for your organization or attendees, showcasing not just the power of social engineering in the hands of a competent hacker, but also the latest threats that you may be exposed to today.

Throughout the presentation, Kevin will share stories, experiences, and history of his most thrilling exploits and successful infiltrations.

This customizable presentation is ideal for:

●        Enterprise organizations looking to reinforce security awareness education

●        Cybersecurity conferences that need to wow audiences at all levels of experience and security expertise

Hook, Line, and Sinker: How Phishers Bait Remote Workers with Social Engineering

When it comes to fishing, you can reel in a big catch with the right bait. Cyber “phishing” is no different; all a hacker needs is a clever backstory and a little deceit to turn your employees into suckerfish. Now more than ever, remote employees are being caught in malicious social engineering nets ...

When it comes to fishing, you can reel in a big catch with the right bait. Cyber “phishing” is no different; all a hacker needs is a clever backstory and a little deceit to turn your employees into suckerfish.

Now more than ever, remote employees are being caught in malicious social engineering nets. Knowing all-too-well that many companies aren’t taking proper security measures and that employees are distracted while working from home, bad actors posing as trusted sources are tricking your staff into clicking infected links and sharing private information to hack their way into your servers.

How do you prevent users from falling hook, line, and sinker? Better protection starts with proper awareness and education.

Kevin Mitnick, the world’s most famous hacker, will use live demonstrations to illustrate how cyber criminals take advantage of your employee’s trust through the art of social engineering.

This acclaimed presentation will entertain your employees while educating them about the latest cyber threats— risks many don't even know exist! This eye-opening exposé demonstrates just how easily anyone can be tricked into handing over the keys to the kingdom. Not only will listeners hear real-life accounts of Kevin’s pentesting exploits and see live hacks right before their eyes, but “Hook, Line, and Sinker” will also explore the psychology of deception— from the neuroscience behind why we take the bait to cognitive defenses anyone can use to swim smoothly through an ocean of digital threats.

Formerly one of the FBI’s “Most Wanted” targets for his elite hacking, there’s no one more qualified than Kevin to talk about the art of cyber deception. Your audience will watch in pure astonishment as the most elusive digital trickster in history shares a live look inside the mind of a hacker.

This presentation:

●        Is ideal for remote and newly-remote teams

●        Includes customizable, real hacking demonstrations from Kevin Mitnick

●        Includes a live Q&A

●        Will help users - and organizations - improve their security posture, at home and in the office

Drawing the Curtain: “Houdini of Hackers” Reveals the Latest Social Engineering Tricks

When it comes to hacking, the average person has no idea how it actually works. And while— just like magic— cyber breaches often seem to appear out of nowhere, hacking is often not always as mysterious as you may think. As the “Houdini of Hackers” Kevin Mitnick is known for his spellbinding live dem ...

When it comes to hacking, the average person has no idea how it actually works. And while— just like magic— cyber breaches often seem to appear out of nowhere, hacking is often not always as mysterious as you may think.

As the “Houdini of Hackers” Kevin Mitnick is known for his spellbinding live demonstrations, where he lifts the veil to show, step-by-step, what real hackers are hiding up their sleeves.

Bad actors use information about your company and  your employees against you, posing as trusted sources to gain access into your networks. These “social engineers” use human psychology to deceive you and your workforce; and in this talk, we’re drawing back the curtains to reveal their biggest tricks.

There’s no one more qualified than Kevin to talk about the art of cyber deception: his real-life exploits once put him on the FBI’s “Most Wanted” list. Today, audiences watch in pure amazement, and being astonished by the most elusive digital trickster in history shares a live look inside the mind of a hacker.

In this presentation, Kevin:

●        Shares his story, beginning with how he’d hack for fun and out of curiosity, to his life on the run, to becoming the cyber security consultant to the world’s top organizations

●        Demonstrations live, the very latest threats and social engineering tactics used by bad actors

●        Answers your audience’s top questions about hacking, staying safe, and avoiding malicious magic tricks.

 

Under the Magician’s Hat: Hackings Biggest Secrets Revealed with Kevin Mitnick

Just like you never know what a magician might pull out of his hat, it’s hard to guess what tricks a hacker might have stuffed up his sleeve. Both have a whole bag of tricks at their disposal to fool you. In today’s digital-forward landscape, bad actors are more motivated than ever to gain illicit a ...

Just like you never know what a magician might pull out of his hat, it’s hard to guess what tricks a hacker might have stuffed up his sleeve. Both have a whole bag of tricks at their disposal to fool you.

In today’s digital-forward landscape, bad actors are more motivated than ever to gain illicit access to your organization’s systems— conjuring up clever ruses to gain entry. These “social engineers” masquerade as trusted sources, hoodwinking your staff into sharing any information they can get their hands on to skirt past your best defenses.

Just as a magician is best positioned to recognize a magician’s tricks, who better than a former hacker to showcase the tricks and tactics behind today’s most mysterious cyberthreats. While your users are undoubtedly the weakest link in your network security, better protection simply starts with proper awareness and education.

Coined the “Houdini of Hackers” for his spellbinding live demonstrations, the world’s most famous hacker— Kevin Mitnick— takes the stage to reveal, step-by-step, the tricks that real hackers are hiding up their sleeves.

As a previous FBI’s “Most Wanted” target for his elite hacking, there’s no one more qualified than Kevin to talk about the art of cyber deception. Watch in pure amazement as the most elusive digital trickster in history shares a live look inside the mind of a hacker.

In this presentation, Kevin:

● Reveals the secrets he learned while becoming the world’s most wanted hacker and passes those secrets on to your audience

●  Provides live demonstrations of the very threats and social engineering tactics used by bad actors targeting your organization

● Answers your audience’s top questions about hacking, staying safe, and avoiding malicious attacks

Sleight of Hand, Sleight of Keystroke: The Hacker’s Playbook Revealed

Hackers are a lot like stage magicians. Both capitalize on the art of deception to fool you into seeing what they want you to believe. Whereas magicians use cunning sleight-of-hand tricks to distract from what’s really happening, social engineers hack from behind the digital curtain, gaining stealth ...

Hackers are a lot like stage magicians. Both capitalize on the art of deception to fool you into seeing what they want you to believe. Whereas magicians use cunning sleight-of-hand tricks to distract from what’s really happening, social engineers hack from behind the digital curtain, gaining stealthy access into your systems.

It only takes one employee to click a malicious link, or one stranger to plug a malware-injected drive into your computer, and it’s showtime for a bad actor. Elite hacks can happen in seconds, and be timed to activate after idle periods on your device. With today’s incredible technology, it’s a case of “Now You See It, Now You Don’t” cyber magic— leaving users none-the-wiser that they were breached.

Who better to demystify this magic than the “Houdini of Hackers,” Kevin Mitnick? Once one of the FBI’s “Most Wanted” due to his elite hacking, today, Kevin is one of the good guys, helping organizations across the globe improve their security posture and awareness. Over 1 million people take part in Kevin Mitnick Security Awareness Training every year.

In this technological magic show, your audience will be spellbound as the most elusive digital trickster in history shares a live look inside the mind of a hacker.

Learn more about Kevin Mitnick
Follow   Facebook  LinkedIn  Twitter 
Featured News
(-)
Books by Kevin Mitnick
(+)
Tweets by Kevin Mitnick
(+)
Articles
(+)
Biography

There is no one like Kevin.

Once one of the FBI's Most Wanted because he went on an ‘electronic joyride’ during which he hacked into more than 40 major corporations just for the challenge and not for monetary gain, Kevin Mitnick was once the most elusive computer break-in artist in history.

Today, he is a trusted, highly sought-after security consultant to Fortune 500 and governments worldwide. Kevin Mitnick is the world's authority on hacking, social engineering, and security awareness training. In fact, the world’s most used computer-based end-user security awareness training suite bears his name.

Kevin’s keynote presentations are one part magic show, one part education, and all parts entertaining. Whether delivered virtually or live, Kevin will entertain and educate your audience with real demonstrations of the latest hacking techniques to help raise the security awareness of individuals and organizations worldwide while keeping attendees on the edge of their seats.

Kevin is a global bestselling author and his books are available in over 50 countries and 20 languages. He is the world authority on social engineering and security awareness training.  Well over 1 million professionals watch Kevin Mitnick’s Security Awareness Training program every year. His written works are mandatory readings for security professionals. They include:

●        The Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers

●        The Art of Deception: Controlling the Human Element of Security

●        Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (NY Times Bestseller)

●        The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

He has been a commentator, security analyst, or interview subject for almost every major news outlet around the globe. Kevin has also been the subject of movies, books and countless articles.