Top Banner
Worldwide Speaking Engagements
24

Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

Aug 08, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

Worldwide Speaking Engagements

Page 2: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

1 of 24 Worldwide Speaking Engagements

CONTENTS

ABOUT KEVIN MITNICK __________________________________________________________ 3

There is no one like Kevin _______________________________________________________________ 3

KEVIN THEN: The Black Hat _____________________________________________________________ 4

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker __________________________________ 4 His New York Times Bestselling Autobiography Says It All ___________________________________________ 4

KEVIN NOW: A White Hat _______________________________________________________________ 5

Kevin is the Leader of the World's Top Security Penetration Testing Team ________________________________ 5 Examples of his Security Testing _______________________________________________________________ 5 Examples of the Results _____________________________________________________________________ 5 He finds the holes before the real bad guys do ____________________________________________________ 5

Kevin is the Worldwide Authority on Hacking and is a Media Commentator for Breaking News _________________ 6

MASS MEDIA: Recent Highlights _________________________________________________________ 7

TV Worldwide - National Geographic Channel ______________________________________________________ 7 Season Finale: I am Rebel ___________________________________________________________________ 7

Theatres Worldwide - Lo and Behold: Reveries of the Connected World __________________________________ 7 Directed by Cinematic Legend Werner Herzog ____________________________________________________ 7

SPEAKING ENGAGEMENTS ______________________________________________________ 8

Entertaining – Relevant – Informative _____________________________________________________________ 8

Kevin is the Top Cyber Security Speaker __________________________________________________ 8

Example Hosts of Kevin ________________________________________________________________ 9

Fifteen Years of Public Speaking Worldwide ________________________________________________________ 9 Kevin Creates a Powerful Draw and Delivers an Unforgettable Experience. ______________________________ 9

Why choose Kevin for your Event? ______________________________________________________ 10

If they don’t know Kevin, ask this simple question: __________________________________________________ 10 “Would you like to meet the world’s most famous hacker?” __________________________________________ 10

If they know Kevin, there is no question __________________________________________________________ 10 Kevin has millions of loyal fans including many within your target audience _____________________________ 10

KEYNOTE SELECTIONS _________________________________________________________ 11

Choose from Three Unique Presentation Experiences ______________________________________ 11

#1) HOW HACKERS ATTACK AND HOW TO FIGHT BACK: With Live Hacking Demonstrations of the Current Threats to You and Your Organization ___________________________________________________________ 11

It takes one to know one. ____________________________________________________________________ 11 The #1 recommended presentation to raise “security awareness” ____________________________________ 11

Page 3: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

2 of 24 Worldwide Speaking Engagements

#2) GHOST IN THE WIRES: Go on the Run with the Most Wanted Hacker in the World _____________________ 12 The “Catch Me if You Can” thrill ride of the digital age _____________________________________________ 12 The Story the Government Doesn’t Want You to Know _____________________________________________ 12

#3) CUSTOM KEYNOTE CREATED FOR YOU: A Scripted Conversation with Live Hacking _________________ 13 Reinforce the messaging of your product, services, topic and event ___________________________________ 13 Create Affinity with the Top Knowledge Expert ___________________________________________________ 13 After Kevin reveals the threats, your team shows the solutions. ______________________________________ 13

EVENT ADD-ONS ______________________________________________________________ 14

VIP Appearances and Book Signings ____________________________________________________ 14

More guests will come to your event and stay longer to meet the legend _______________________________ 14

Panels ______________________________________________________________________________ 15

The #1 Panelist to Illustrate Real Threats _________________________________________________________ 15 Kevin is the perfect counter-point who brings a one-of-a-kind perspective ______________________________ 15

Paid Promotional Interviews ____________________________________________________________ 16

EVENT GIVEAWAYS ____________________________________________________________ 17

Giveaway: Kevin’s Famous Lock Pick Cards ______________________________________________ 17

Combine the giveaway with Abooth appearance and create a show-stopping line-up! _______________________ 17 Your guests always carry a reminder of your event in their pocket ____________________________________ 17

Giveaway: His New York Times Bestselling Thrill Ride (Paperback) ___________________________ 18

Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker _______________________________ 18

Giveaway: His New Book for 2017 (Hardcover) ____________________________________________ 18

The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to be Safe in the Age of Big Brother and Big Data _____________________________________________________________________________ 18 Follow up with them later to see if they liked it ____________________________________________________ 18

SOCIAL MEDIA PROMOTION _____________________________________________________ 19

Tweet to one of the Top Cyber Security Social Media Channels: @kevinmitnick _________________ 19

Gain interest from attendees, non-attendees, sponsors, investors & news ______________________________ 19

PRICING: SINGLE-CITY ENGAGEMENTS ___________________________________________ 20

Kevin Uses All-Inclusive* Presentation Fees ______________________________________________ 20

Easy to Manage – No Stipends! ______________________________________________________________ 20 Current All-Inclusive* Presentation Fees: _________________________________________________________ 20 *IncludeD IN THE FEES: ______________________________________________________________________ 20 *Not Included IN THE FEES ___________________________________________________________________ 21

MULTIPLE-CITY DISCOUNTS AND TOUR PACKAGES ________________________________ 22

Page 4: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

3 of 24 Worldwide Speaking Engagements

ABOUT KEVIN MITNICK

THERE IS NO ONE LIKE KEVIN

Kevin Mitnick is the world's most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI's Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.

Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers —from students to retirees— learn how to protect their information and themselves from harm.

As the CEO of Mitnick Security Consulting, Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. Also, in his role of Chief Hacking Officer of KnowBe4 he helps produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness.

Kevin is a global bestselling author and his books are available in over 50 countries and 20 languages. His works include The Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers and The Art of Deception: Controlling the Human Element of Security, which are both mandatory readings for security professionals. His autobiography, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker is a New York Times bestseller and his latest work released in 2017 is The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, a ground-breaking book on privacy.

As a one-of-a-kind public speaker, Kevin's presentations are akin to technology magic shows, which include the latest hacking techniques that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases "security awareness". Kevin has been a commentator, security analyst, or interview subject for almost every major news outlet around the globe.

“In our world, Kevin Mitnick is our David Beckham or Lebron James.”

Micho Schumann, Principal Advisory at KPMG 2016

Page 5: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

4 of 24 Worldwide Speaking Engagements

KEVIN THEN: THE BLACK HAT

GHOST IN THE WIRES: MY ADVENTURES AS THE WORLD'S MOST WANTED HACKER

By Kevin Mitnick and William Simon

Forward by Steve Wozniak, Co-founder of Apple

HIS NEW YORK TIMES BESTSELLING AUTOBIOGRAPHY SAYS IT ALL

PUBLISHER’S DESCRIPTION: Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats: it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. As the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

“…into the mind of one who truly mastered the art…”

Frank Abagnale, author of Catch Me if You Can

Now available in more than 20 Languages, the book is being adapted into a screenplay for a major motion picture.

Page 6: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

5 of 24 Worldwide Speaking Engagements

KEVIN NOW: A WHITE HAT

KEVIN IS THE LEADER OF THE WORLD'S TOP SECURITY PENETRATION TESTING TEAM

EXAMPLES OF HIS SECURITY TESTING

A major internationally recognized credit bureau wanted an external party to challenge their security. Mitnick Security's team was deployed and simulated threats by black-hat attackers against the bureau. Using physical exploits and social engineering, the team penetrated critical systems and data centers. The team could access the credit reports and personal information of consumers. As a result of the findings and recommendations, the bureau was able to dramatically improve their security.

The government of Ecuador was under the threat of having the presidential election stolen by hackers and hostile foreign governments capable of destabilizing the country. Mitnick Security's team was engaged to protect and monitor the systems that tabulated Ecuador's 2013 elections to prevent tampering and manipulation. Vulnerabilities were assessed, and security was improved. The elections went smoothly and all unwanted activities were blocked.

EXAMPLES OF THE RESULTS

"Kevin showed me the check he had written to himself using our internal system for $6 million; I knew all of our

preconceived notions of security had to be changed."

CEO, Financial Company - Fortune 500

"In two weeks, $4 billion worth of our data and intellectual property was sitting in front of me on an

external drive! My own team told me nothing was missing, the same team that had said hacking us would

be impossible."

CEO, Software Company - Fortune 500

HE FINDS THE HOLES BEFORE THE REAL BAD GUYS DO

Page 7: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

6 of 24 Worldwide Speaking Engagements

KEVIN IS THE WORLDWIDE AUTHORITY ON HACKING AND IS A MEDIA COMMENTATOR FOR BREAKING NEWS

“If hackers were rock stars, Kevin Mitnick would be Mick Jagger.”

Mathew Dunn, Technology Editor at News.Com 2015

Page 8: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

7 of 24 Worldwide Speaking Engagements

MASS MEDIA: RECENT HIGHLIGHTS

TV WORLDWIDE - NATIONAL GEOGRAPHIC CHANNEL

SEASON FINALE: I AM REBEL

Rebels, Radicals, Mavericks, Change Makers. I Am Rebel is a documentary series about outsiders finding their voices in the underworld of vice and proving that change only happens when you break the rules. Doug Liman, director of “The Bourne Identity” produced this live action re-enactment of highlights of Kevin’s story of a maverick hacker to a highly-respected computer security expert.

National Geographic chose Kevin Mitnick to be the subject of the season finale, Phreaks and Geeks, in part because of his global appeal and fan base. It premiered in the USA in the summer of 2016 and was then released in the fall in 172 countries and 25 languages worldwide. It is available on iTunes.

THEATRES WORLDWIDE - LO AND BEHOLD: REVERIES OF THE CONNECTED WORLD

DIRECTED BY CINEMATIC LEGEND WERNER HERZOG

Oscar-nominated Werner Herzog chronicles the virtual world from its origins to its outermost reaches, exploring the digital landscape with the same curiosity and imagination he previously trained on earthly destinations as disparate as the Amazon, the Sahara, the South Pole and the Australian outback.

Herzog conducted interviews with cyberspace pioneers and prophets such as PayPal and Tesla co-founder Elon Musk, Internet protocol inventor Bob Kahn, and Kevin for his wisdom on hacking. After a critically acclaimed showing at the Sundance Film Festival, it was picked up for worldwide release by Magnolia Pictures. It premiered in theatres on August 19th, 2016 and then was released for home on November 22nd. It will be available on different platforms in 2017.

Page 9: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

8 of 24 Worldwide Speaking Engagements

SPEAKING ENGAGEMENTS

Kevin’s presentations are technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

ENTERTAINING – RELEVANT – INFORMATIVE

“Delegates at the event gave Kevin a rating of 98% for content and 98% for delivery. I’m sure you will agree with me the scores were sensational.”

Joyce Ong, Accenture

“...the unique ability to connect with both technical and nontechnical groups.”

John Dietrich, Dell

“...he showed how readily information can be gathered by hackers...”

Capt. “Doc” Simon, United States Navy

“...funny and definitely in the zone...”

Amy Draves, Microsoft

KEVIN IS THE TOP CYBER SECURITY SPEAKER

Page 10: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

9 of 24 Worldwide Speaking Engagements

EXAMPLE HOSTS OF KEVIN

41st Parameter, A10 Networks, Abbey Reid Public Safety and Security Group, Accenture, AIM Institute, Alabama Power, Allegro, Altiris, American Financial Services Association (AFSA), American Financial Systems Association, Arco, Asgent, Association for Communications Technology Professionals in Higher Education (ACUTA), AT & T, ATI, Banamex (National Bank of Mexico), BBVA Compass, BIC Gipuzkoa Berrilan, Carnegie Mellon, CAIS, Casa Editorial El Tiempo S.A., C4XPO, CAIS Calgary Board of Education, CBS, CeBIT, CIOSynergy, Cirosec, Citrix, Cloudmark, Cmark, College of Healthcare Information Management Executives (CHIME), ConnectWise, CSC Executive Exchange, CyberSource, Cyber Innovation Center, Cyber Protection Resources, D Software, Dasher Technologies, Dell, Dell Security Group, Dell Software, Deutsche Messe AG, Diebold, Discover Card, DST Systems, Dubai World Trade Center, e.Republic, Ecuadorian Systems, Elsag, Energy Insurance Mutual, EuroFinance, Federal Aviation Administration (FAA), FedEx, Federal Bureau of Investigation (FBI), Fidelity, First Financial Bank, First National Bank, FireMon, FIS Global, Fiserv, Fishnet, Food Industry Services, Fort-Ross, Freescale, Futura Networks, Future Com, General Dynamics, General Satellite, Globb TV, Google, Guard ID, Harvard, Hannover Fairs, Health Information System Society, Hewlett Packard (HP), Hewlett Packard Enterprise (HPE), Humana, IBM, Ioconvex, IDC, InfoBlox, Information Systems Security Association (ISSA), Information Today, InfoSec, Infragard

FIFTEEN YEARS OF PUBLIC SPEAKING WORLDWIDE

Investment Company Institute (ICI), Investment Management Consultants Association (IMCA), ITT Market, IT Web, JP Morgan Chase, Juniper Networks, KnowBe4, KPMG, Liberty Stage, Lifelock, Lockheed Martin, Mailchimp, Management Circle, MasterCard, Menlo Ventures, Merchant Risk Council, MetLife, Microsoft, MIS Training, MOBI Wireless, Moneris, Narus, NASA, National Association of Convenience Stores (NASC), National Geographic, Nationwide, nCircle, NCLGISA, NETpeas, NETucation, Neustar, Nordic eCommerce Knowledge, OneBeacon, Ontario Systems, OpenText, Oracle, Panda, Palo Alto Networks, Palsit, Phion, Pereira & O’Dell, Principa College, Public World, Relay Ventures, Rhino, RiskMathics, Rose State College, Qualys, Quest Media, Sabre, Sailpoint Technologies, Security Network of America, Skyrr, Shift4, Social Security Administration, Solve Media, Southern Utah University, SupportSoft, Symantec, Systems Management Planning, Tata Consulting Services, Technology Nexus, Techweb, Telefonica, Teleperformance, Tomascon, Toshiba, Toyota, Travelocity, Trinidad and Tobago Chamber of Industry and Commerce, UAE PMO, UBM, ULM, United Business Media, US Congress, US Pretrial Services, US Senate, Unatek, Vækstfonden, Vantagem, Verafin, Visa, VIA Technology, VMware, VMware User Group (VMUG), Vocent, Voxeo, Watchcom, Websense, Wells Fargo, World Game Protection, World Government Summit, Worldnet, Young Presidents' Organization (YPO), Zenlok, Ziff Davis, Zilog, Zimperium, Zix Corporation

KEVIN CREATES A POWERFUL DRAW AND DELIVERS AN UNFORGETTABLE EXPERIENCE.

Page 11: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

10 of 24 Worldwide Speaking Engagements

WHY CHOOSE KEVIN FOR YOUR EVENT?

IF THEY DON’T KNOW KEVIN, ASK THIS SIMPLE QUESTION:

“WOULD YOU LIKE TO MEET THE WORLD’S MOST FAMOUS HACKER?”

The answer is almost always yes! Whether your target market knows Kevin by name or not, hosts find promoting and holding events based upon “The World’s Most Famous Hacker” achieves and exceeds their goals and thereby an excellent return-on-investment (ROI).

IF THEY KNOW KEVIN, THERE IS NO QUESTION

There is no other celebrity like Kevin.

He was once the most wanted hacker in the world. Kevin never stole for money and the world has forgiven him for his “electric joyride”.

Kevin has millions and millions of fans around the world in every country. Many of the key decision makers you are trying to reach and the teams that support them, both men and women, grew up reading about the exploits and adventures of Kevin.

They will stop, look and listen to your marketing message once they know Kevin Mitnick is presenting at your event.

KEVIN HAS MILLIONS OF LOYAL FANS INCLUDING MANY WITHIN YOUR TARGET AUDIENCE

Kevin Delivers: • Maximum draw for attendees, sponsors and news media

• The ability to ensure the decision makers attend

• Increased length-of-stay by attendees

• Event memory retention by attendees

• Affinity with you and your knowledge experts

• Illustrating the real threats your products and services address

• Unique ways that provide follow-up opportunities

Page 12: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

11 of 24 Worldwide Speaking Engagements

KEYNOTE SELECTIONS

CHOOSE FROM THREE UNIQUE PRESENTATION EXPERIENCES

If you don’t want to be “owned” this is a must see

#1) HOW HACKERS ATTACK AND HOW TO FIGHT BACK: WITH LIVE HACKING DEMONSTRATIONS OF THE CURRENT THREATS TO YOU AND YOUR ORGANIZATION

IT TAKES ONE TO KNOW ONE.

People are the weakest link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates how a hacker’s thought process works and how they ply their tradecraft. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."

Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure. Kevin is `now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team, which maintains a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into by using a combination of technical exploits and social engineering.

Kevin is the worldwide authority on social engineering and constantly improves and updates this highly effective and acclaimed "security awareness" presentation that illustrates the latest threats and risks most people don’t even know exist.

You’ll learn how to detect manipulation and take steps to protect yourself and your organization. Gain the power to think defensively.

THE #1 RECOMMENDED PRESENTATION TO RAISE “SECURITY AWARENESS”

Presentation Length: Choose from either a set 75-minute or a shortened 60-minute keynote followed by 15 minutes of Q&A

Page 13: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

12 of 24 Worldwide Speaking Engagements

When your audience needs an escape

#2) GHOST IN THE WIRES: GO ON THE RUN WITH THE MOST WANTED HACKER IN THE WORLD

THE “CATCH ME IF YOU CAN” THRILL RIDE OF THE DIGITAL AGE

Treat yourself to an unforgettable experience by a master storyteller. Join the chase and escape with Kevin as he takes you on this hilarious and mind-boggling adventure, based upon his New York Times bestselling autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker.

Kevin puts you right in the action of this sophisticated cat-and- mouse game with authorities by recounting his use of false identities, jumping from city to city, his close shaves and ultimately, a bizarre showdown with the feds. He was the most elusive computer break-in artist in history. Although he never

stole for financial gain or damaged systems, he did hack into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, and no matter how fast the authorities were, Kevin was faster, using technology not only to evade but also to spy on and track his pursuers. His story-- packed with hysterical pranks and fear-driven hysteria--actually started a movement and changed how companies secure their information.

THE STORY THE GOVERNMENT DOESN’T WANT YOU TO KNOW

Presentation Length: This is a set 75-minute keynote plus 15 minutes of Q&A

Page 14: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

13 of 24 Worldwide Speaking Engagements

Leverage Kevin for your specific needs

#3) CUSTOM KEYNOTE CREATED FOR YOU: A SCRIPTED CONVERSATION WITH LIVE HACKING

REINFORCE THE MESSAGING OF YOUR PRODUCT, SERVICES, TOPIC AND EVENT

With your team Kevin will create a custom experience with real live hacking that will inform, entertain and educate your attendees.

Don’t just tell them… show them!

Kevin stands alone in the world of cyber security speakers. This presentation will provide you the advanced ability of making your talking points come alive on stage. In this very popular scripted Q&A format you’ll coordinate pre-arranged questions with Kevin so that he’ll have amazing hacking demonstrations to illustrate the key answers and event messaging. Your audience will be more attentive as they are engrossed within a unique experience akin to a “technology magic show”.

CREATE AFFINITY WITH THE TOP KNOWLEDGE EXPERT

You will provide a moderator, who, we suggest, should be part of your closing team for enterprise clients after the event, to be on stage with Kevin. This will help to create affinity for your team and recognition of the individual.

Your audience will easily grasp your concepts as Kevin showcases current hacks both he and his team use during penetration testing to evaluate his clients’ networks, systems and devices for security vulnerabilities. He’ll also stand side-by-side with you to help elevate the services, competency and message of you and your team because of his own first class reputation as a world authority on cybersecurity.

Create an unforgettable message from an unforgettable event experience.

AFTER KEVIN REVEALS THE THREATS, YOUR TEAM SHOWS THE SOLUTIONS.

Presentation Length: This presentation can be designed for any length up to 90 minutes including Kevin’s Q&A with the audience

Page 15: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

14 of 24 Worldwide Speaking Engagements

EVENT ADD-ONS

VIP APPEARANCES AND BOOK SIGNINGS

You may wish to add-on a “VIP Appearance”. This time may be used for a book-signing, media event, a mix and mingle, a reward, an intimate meal, a draw, exclusive time for co-sponsor’s important VIP clients or even the sponsors themselves.

MORE GUESTS WILL COME TO YOUR EVENT AND STAY LONGER TO MEET THE LEGEND

Length of Add-ons: Purchase event-day appearances in addition to your presentation for up to 90-minutes each

Page 16: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

15 of 24 Worldwide Speaking Engagements

PANELS

THE #1 PANELIST TO ILLUSTRATE REAL THREATS

Example: Kevin performed live hacking demonstrations to kick off the 30th Annual International Telecommunications Week (2015) in front of a crowd of 6,000 representing all the world's telecommunications companies.

This was immediately followed on stage by Kevin participating in a three-person panel discussion on the state of cybersecurity with General Keith Alexander (ex-head of the NSA) and Sir John Sawers (ex-head of Mi6)

KEVIN IS THE PERFECT COUNTER-POINT WHO BRINGS A ONE-OF-A-KIND PERSPECTIVE

Your event sponsors line up to be on a panel with Kevin to raise their affinity and credibility. Audiences love his real-world examples and his truth-to-power approach in discussions.

Page 17: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

16 of 24 Worldwide Speaking Engagements

PAID PROMOTIONAL INTERVIEWS

Create event promotion, prestige and branding opportunities by adding on to your event different styles of promotional interviews. This can be done either prior to, or at the event itself. From one-on-one interviews to full media scrums, Kevin is very apt at dealing with all levels of media engagements in a unique and intriguing style which capture eyeballs and creates clicks.

Special Insert

Page 18: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

17 of 24 Worldwide Speaking Engagements

EVENT GIVEAWAYS

GIVEAWAY: KEVIN’S FAMOUS LOCK PICK CARDS

Your attendees may receive this coveted memorabilia directly from Kevin. This unique item is actually a lock pick which people tend to carry with them always and talk about it. They remember you.

COMBINE THE GIVEAWAY WITH ABOOTH APPEARANCE AND CREATE A SHOW-STOPPING LINE-UP!

Previous hosts continually give us the feedback that their guests always carry with them to show off to friends, families and colleagues.

YOUR GUESTS ALWAYS CARRY A REMINDER OF YOUR EVENT IN THEIR POCKET

Page 19: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

18 of 24 Worldwide Speaking Engagements

GIVEAWAY: HIS NEW YORK TIMES BESTSELLING THRILL RIDE (PAPERBACK)

GHOST IN THE WIRES: MY ADVENTURES AS THE WORLD’S MOST WANTED HACKER

Please use the following process to order Kevin’s Autobiography directly from the publisher (and just have them shipped to your hotel/event). This way you are receiving the maximum discount that a bookstore, school or even Kevin would get if ordering. We cannot guarantee publisher stock or delivery, though they are constantly in reprint.

Call the publisher as soon as you can to understand the process (Hachette Books, part of Little Brown www.hbgusa.com) if you wish to place larger orders. By ordering over 50 books, you start to receive slight discounts, and then discounts gradually increase to 50% at 100 books.

We only have statistics for USA timelines for delivery:

• It takes 2 – 3 business days to be set up as an account

• It takes 2 business days to fulfill

• It takes 4 business days to ship (they use UPS)

Most hosts order his thriller New York Times bestseller:

Paperback copies – Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker = ISBN 9780316037723

Place your order / inquire at 1-800-759-0190.

Other Backlist Best Sellers Available

GIVEAWAY: HIS NEW BOOK FOR 2017 (HARDCOVER)

THE ART OF INVISIBILITY: THE WORLD’S MOST FAMOUS HACKER TEACHES YOU HOW TO BE SAFE IN THE AGE OF BIG BROTHER AND BIG DATA

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is being done without your knowledge--and he teaches you "the art of invisibility." He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

FOLLOW UP WITH THEM LATER TO SEE IF THEY LIKED IT

Page 20: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

19 of 24 Worldwide Speaking Engagements

SOCIAL MEDIA PROMOTION

TWEET TO ONE OF THE TOP CYBER SECURITY SOCIAL MEDIA CHANNELS: @KEVINMITNICK

Did you know just about the entire world’s press and security community follow @kevinmitnick? Kevin is pleased to tweet to help promote your event. We’ll work with you to formulate messaging with the proper #hashtags, @twitter handles and links you would like. Kevin may adjust your text slightly to suit his audience. We have tremendous success in driving news and attendance interest.

GAIN INTEREST FROM ATTENDEES, NON-ATTENDEES, SPONSORS, INVESTORS & NEWS

Page 21: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

20 of 24 Worldwide Speaking Engagements

PRICING: SINGLE-CITY ENGAGEMENTS

KEVIN USES ALL-INCLUSIVE* PRESENTATION FEES

EASY TO MANAGE – NO STIPENDS!

CURRENT ALL-INCLUSIVE* PRESENTATION FEES:

Prices Subject to Change Without Notice

• USA $40,000 • Canada, Mexico and Central America $45,000 • Caribbean and South America $50,000 • Europe $55,000 • Africa, Asia, Middle East and Oceania $60,000

*INCLUDED IN THE FEES:

• Kevin’s Speaker Fee • Roundtrip Airfare • Hotel Accommodations & Incidentals • Hotel Room Internet & Phone • Meals & Expenses • Kevin’s Equipment Transportation • Event City Transportation (USA and Canada only)

Page 22: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

21 of 24 Worldwide Speaking Engagements

*NOT INCLUDED IN THE FEES

You are also responsible for directly arranging and pre-paying for:

• AUDIO VISUAL (AV):

o You will provide the local AV equipment and crew associated with your selection keynote presentation.

• EVENT CITY GROUND TRANSPORTATION (For events outside the USA and Canada):

o You will provide secure ground transportation via a private, professional car service (including fares and gratuities; no taxis or shuttles, please) between the airport(s), accommodations venue(s), and the event venue(s).

• SECURITY GUARD SERVICES (if applicable): o You may have to provide licensed security personnel

depending on your location, choice of presentation, and scheduling. Kevin's valuable presentation equipment must not be left unattended at any time.

• TAXES (if applicable):

o This includes all taxes or fees levied by the host country and/or city of the event, as well as any taxes on speaking fees or on any electronics brought into the country. It is the hosting group’s responsibility to determine if any taxes or fees will be due in the event city or country and to make all such payments directly to the appropriate governing body; the amount received by the speaker must equal the amount outlined in the agreement.

• VISAS (if applicable):

o This includes all costs for the visa application (including travel and any expenses the speaker must incur to obtain the visa from the appropriate embassy prior to the event) and processing fees (if required by the hosting country; it is the hosting group’s responsibility to determine whether the speaker requires a visa to participate in the event); the speaker will cooperate fully in this process.

Optional Add-ons Not Included:

• BOOKS:

o These are ordered directly from the publisher. How to do this is outlined previously in this brochure except for his latest release.

• VIP APPEARANCES:

o Please contact your agent or speaking bureau with your special requirements so they can provide you a quote for this add-on.

• LOCK PICKS:

o These are normally $12 retail each and are now available for $3.50 in bulk for hosts. Please order from your agent or speaking bureau.

Page 23: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

22 of 24 Worldwide Speaking Engagements

MULTIPLE-CITY DISCOUNTS AND TOUR PACKAGES

You are eligible for the following discount tiers based upon the number of cities you book at the same time:

REPEAT CUSTOMER

MINISERIES TOUR GRAND TOUR

3 to 5 Cities 6 to 11 Cities 12 to 23

Cities 24 + Cities

DISCOUNT Applied to

All-Inclusive* Pricing

7.5% off 10% off 15% off 20% off

BONUS

Social Media

Tweets Tweets Tweets plus Video Invite**

Tweets plus Video Invite**,

PR Quotes*** & Media Interviews*****

BONUS

VIP Appearance

Included***** Included***** Included*****

BONUS

Lock Picks Per City

50 Free 100 Free 200 Free

** Video Invite is a 3-minute recording via Skype or through your expense at a studio *** Press Release (PR) quote is a mutual agreed to paragraph that can be used throughout your materials **** Promotional Interviews - Up to 2 hours of onsite or remote interviews regarding the tour ***** Must be used on the same day. This is a savings of $8,000 - $12,000 per city

Page 24: Worldwide Speaking Engagementsworldwide.streamer.espeakers.com/assets/6/8726/130388.pdf · Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers

THERE IS NO ONE LIKE KEVIN. His story is legendary.

Now he’s the world’s most famous hacker and leads the top security penetration testing team.

KEVIN DEMONSTRATES THE LATEST HACKS. He knows and shows the real

cyber threats people and organizations face from hackers as the top cyber security speaker.

It takes one to know one. Book your legendary event today!