Cyber Security Articles & News

WATCH: Kevin Mitnick Interviewed at 2017 Cyber Investing Summit

Video: Kevin Mitnick at the New York Stock Exchange

Kevin Mitnick is interviewed at the 2017 Cyber Investing Summit by Cybersecurity Expert Scott Schober for Cybersecurity Ventures. Scott interviews other important innovators in cybersecurity and sums up the entire event for investors.

The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products and services over the next five years from 2017 to 2021, according to Cybersecurity Ventures’s quarterly Cybersecurity Market Report.

This video features interviews with Kevin Mitnick CEOs and event coordinators surrounded by investment professionals, asset managers, industry experts, financial analysts, media and more. A cocktail reception was held on the floor of the iconic New York Stock Exchange.

 

 

Source: Cyber Investing Summit

Topics: Social Engineering, SE, simulated phishing attack, spear phishing, Stu Sjouwerman, hacker tricks, cyber Investing Summit, keynote speaker, New York Stock Exchange, investing, KnowBe4, Yahoo attack, webbase training, cyber security sector, baseline test, Kevin Mitnick, Lindsey Lachman

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Entering the Metaverse for Your Virtual Cyber Security Events

Virtual events can utilize virtual reality (VR) and the Metaverse so you can host a memorable event that also trains your attendees in all things cybe..

Read more ›

Does Kevin Mitnick Still Hack?

Kevin Mitnick is best known for some of his earlier hacks on Motorola and other enterprise companies that earned him a spot on the FBI’s most wanted l..

Read more ›

The Most Common Social Engineering Techniques We’re Seeing This Year

With today’s available technology, threat actors have become masterminds at exploiting vulnerabilities to steal private data, and sometimes, even gain..

Read more ›
tech-texture-bg