Cyber Security Articles & News

SEE LIVE: HostingCon Global 2017 Keynote: Kevin Mitnick

HostingCon is excited to announce Kevin Mitnick will deliver the keynote address at HostingCon Global 2017. Kevin is the world's most famous hacker, bestselling author, and the top cyber security speaker.

Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering.

No longer involved in "black hat" activities, Kevin now mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers — from students to retirees — learn how to protect their information and themselves from harm.

Kevin has been a featured on CNN, CNBC, Al Jazeera, FOX News, CBC, BBC, Radio Moscow, Tech TV, National Public Radio, Playboy, Good Morning America, and 60 Minutes — to name just a few. He has also testified before Congress (both the House and the Senate) on security matters affecting the United States.

"My presentation will clearly illustrate why people are the weakest link in the security chain." said Mitnick "Attendees will see real demonstrations of some of the most current combinations of hacking, social engineering and cutting-edge technical exploits my team and I actually use to penetrate client systems, with a 100% success rate. They will also gain strategies to protect their organizations, and themselves, from harm and to help mitigate the risks they face."

Kevin is a global bestselling author with titles including The Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers and The Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography is Ghost in the Wires: My Adventures as the World's Most Wanted Hacker is a New York Times bestseller and his latest work released in 2017 is The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, a ground-breaking book on privacy.

"I'm honored to be addressing the combined HostingCon and Data Center World audiences at their co-located event in Los Angeles," said Mitnick. "With security concerns in the data center and cloud community at an all-time high, it's more important than ever for service providers to be aware of the methods criminals, disgruntled staff and malicious governments use to breach their infrastructure and systems."

Register here.

Source: HostingCon Global

Topics: Social Engineering, The Art of Deception, The Art of Invisibility, top cyber security speaker, The Art of Intrusion, hacking, keynote speaker, information protection, Los Angeles, security weakest link, Data Center World, Big Brother, Big Data, Ghost in the Wires, HostingCon Global 2017, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Entering the Metaverse for Your Virtual Cyber Security Events

Virtual events can utilize virtual reality (VR) and the Metaverse so you can host a memorable event that also trains your attendees in all things cybe..

Read more ›

Does Kevin Mitnick Still Hack?

Kevin Mitnick is best known for some of his earlier hacks on Motorola and other enterprise companies that earned him a spot on the FBI’s most wanted l..

Read more ›

The Most Common Social Engineering Techniques We’re Seeing This Year

With today’s available technology, threat actors have become masterminds at exploiting vulnerabilities to steal private data, and sometimes, even gain..

Read more ›
tech-texture-bg