WATCH: How to Be Safe in the Age of Big Brother and Big Data | Kevin Mitnick

Qualys Presentation at RSA Conference 2017

Kevin Mitnick, the world's most famous hacker, has been the subject of countless profiles published and aired throughout the world. His leading penetration-testing team is highly respected and sought-after for its security services by the world's top corporations and governments. The company he founded, Mitnick Security Consulting LLC, has clients that include dozens of Fortune 500 companies and many world governments. Mitnick is the bestselling author of Ghost in the Wires, The Art of Intrusion, and The Art of Deception. He lives in Las Vegas.

The Art of Invisibility is a very timely title, especially given the many recent news items featuring Big Brother, Big Data, and hacking groups like WikiLeaks. This unique book explains not only just how vulnerable your information is online but how that same information can be used against you in unexpected ways—and, even more important, how you can protect yourself and your family. Despite what we’d all like to believe, your password really can be cracked, your data really will be sold, and someone really could be reading your email.

Source: YouTube

Topics: Social Engineering, The Art of Invisibility, eavesdropping device, Edward Snowden, government surveillance, identity theft, penetration testing, RSA Conference, Two-Factor Authentication, encryption, data privacy, keynote speaker, McDonald's speaker hack, privacy breach, PSTN, information brokers, right to privacy, Signal, WiFi, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Redefining Your Enterprise’s Cyber Security Posture During Mergers & Acquisitions

With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise’s cybersecurity posture is more important than ever.

Read more ›

Choosing a Penetration Testing Company for Mac-based Environments

Powering your business with Apple devices because of their reputable security and privacy features? You may be surprised to learn that while Apple dev..

Read more ›

AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of

Artificial intelligence in cybersecurity has been a hot topic lately, especially with the rise of OpenAI’s ChatGPT. But does that mean it would make a..

Read more ›
tech-texture-bg