Cyber Security Articles & News

Famous Hacker Kevin Mitnick Headlines Regent University Cybersecurity Summit

Cyber threats are very real, and to address this issue that can affect people in all walks of life, Regent University held a cybersecurity summit this week.

Hundreds gathered to learn how to protect themselves and their businesses from hackers.

They listened to speakers from Google, Hewlett Packard, the FBI, GE Healthcare and other organizations. 

"Even though it's such an overwhelming domain - cybersecurity - that there are experts, that there's information available," Regent University's Dr. Gerson Moreno-Raino told CBN News. 

"There are smart ways to think about cybersecurity and cyber technologies and then smart ways to act on those technologies in how we use them, how we prepare ourselves to educate the next generation," he said. "I think another key part is educating the workforce."

Regent University has an Institute for Cybersecurity, offering associate's, bachelor's or master's degree programs.

Thursday's summit also included Regent's executive leadership series luncheon, featuring world-famous hacker Kevin Mitnick.

Mitnick used to be one of the FBI's most wanted. Today, he is a leading security consultant.    

Source: CBN News

Topics: Google, cybersecurity summit, cybersecurity, FBI, GE Healthcare, Hacker, Hewlett Packard, keynote speaker, security consultant, IT, Regent University, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›

What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their li..

Read more ›

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: ..

Read more ›