Cybersecurity Speakers

According to recent studies by PwC at the World Economic Forum, cyber security is in the top 5 most important concerns of CEOs and other C-suite executives. It’s no surprise that our cybersecurity speakers – some of the most famous white hackers in the world – are in high demand nowadays.

In the era of the Internet of Things and ubiquitous social networks, our data has never been more vulnerable. We are now connected to internet almost all the time, and the sensitive security of our devices—and of the companies we trust with our private information—doesn’t seem to be keeping up. The rapid growth of digital platforms together with the accelerating development of new internet-dependent technologies has opened the door to new forms of business. They have created an economy in which data is extremely valuable, and where the information stored online has to be protected against hacking, fraud, and compromise.

Cyber security is a challenge for everyone, from the largest companies to the individual user of smartphones, computers, and online services. All of our data is at risk. If you’re interested in this topic and want to organize an event or bring in a top cybersecurity speaker, make sure you work with the best minds in the business. Here at Aurum Speakers Bureau, we offer you the chance to hire the internationally recognized experts who are best equipped to help you face this challenge. From the world’s most famous hacker, Kevin Mitnick, who can give your audience cutting-edge security advice and provide live demonstrations of hacking to IoT cybersecurity speakers Chris Valasek and Charlie Miller, two of the top “White Hat” hackers in the world who will tell how they managed to remotely hack a Jeep Cherokee and gain total control of the vehicle. This is an issue worth taking seriously. It is neither capricious nor trendy: simply put, there is no freedom without security. It’s time to call up the experts in cybersecurity.

europe range4 AI_Speakers Cybersecurity_Speakers Speakers Technology_Speakers TED_Speakers Virtual_Keynote_Speakers

Mikko Hypponen

Chief Research Officer at WithSecure (Formerly F-Secure). Cybersecurity & Privacy Expert. Bestselling Author, If it's Smart, it's Vulnerable

namerica range4 Bestselling_Author_Speakers Big_Data_Speakers CEO_Keynote_Speakers Cybersecurity_Speakers Famous_Speakers Speakers Virtual_Keynote_Speakers

Kevin Mitnick

The World’s Most Famous Hacker & Cybersecurity Speaker

asia range2 Cybersecurity_Speakers Speakers TED_Speakers Virtual_Keynote_Speakers Women_Speakers

Keren Elazari

Cyber Security Analyst, Author & Researcher

namerica range2 Cybersecurity_Speakers Speakers Virtual_Keynote_Speakers

Charlie Miller

Former NSA “white hat” Hacker, renowned Automotive and iPhone Hacker

namerica range2 Cybersecurity_Speakers Speakers Virtual_Keynote_Speakers

Chris Valasek

Principal Autonomous Vehicle Security Architect & Renowned ‘White Hat’ Hacker

europe range4 Big_Data_Speakers Business_Ethics_Speakers Cybersecurity_Speakers Media_Speakers Social_Media_Speakers Speakers Virtual_Keynote_Speakers

Christopher Wylie

Cambridge Analytica Whistleblower. Social Researcher & Data Scientist

namerica range4 AI_Speakers Big_Data_Speakers Business_Speakers CEO_Keynote_Speakers Cybersecurity_Speakers E-Commerce_Speakers Entrepreneurship_Speakers Innovation_Speakers Robotics_Speakers Speakers Technology_Speakers Virtual_Keynote_Speakers

Werner Vogels

Amazon's Chief Technology Officer

namerica range2 AI_Speakers Big_Data_Speakers Business_Ethics_Speakers Business_Speakers Cybersecurity_Speakers Digital_Transformation_Speakers E-Commerce_Speakers Entrepreneurship_Speakers Speakers TED_Speakers Virtual_Keynote_Speakers

Harper Reed

Hacker, Entrepreneur, Former CTO Obama for America

namerica range1 Cybersecurity_Speakers Speakers Virtual_Keynote_Speakers

Dan Lohrmann

Chief Security Officer & Chief Strategist at Security Mentor Inc. Former CSO, State of Michigan

namerica range4 Business_Speakers CEO_Keynote_Speakers Cybersecurity_Speakers Entrepreneurship_Speakers Famous_Speakers Innovation_Speakers Speakers Technology_Speakers Virtual_Keynote_Speakers

Eugene Kaspersky

Cybersecurity expert; CEO of Kaspersky Lab

namerica range2 Business_Speakers Cybersecurity_Speakers Digital_Transformation_Speakers Future_of_Work_Speakers Futurist_Speakers Speakers Technology_Speakers Virtual_Keynote_Speakers

Ben Hammersley

Global Digital Leader, Futurist, Host of Cybercrimes with Ben Hammersley. Former Editor of WIRED magazine

namerica range2 Cybersecurity_Speakers Speakers Virtual_Keynote_Speakers

Michael Coates

Former CISO at Twitter; Co-founder & CEO at Altitude Networks

namerica range1 Cybersecurity_Speakers Speakers TED_Speakers Virtual_Keynote_Speakers

Samy Kamkar

Creator of the MySpace worm, Cybercrime, Hacking and GDPR authority

europe range4 CEO_Keynote_Speakers Cybersecurity_Speakers Innovation_Speakers Speakers Technology_Speakers TED_Speakers Virtual_Keynote_Speakers

Jimmy Wales

Founder, Wikipedia - World's 5th Most Visited Website & Founder, WT.Social

europe range1 Cybersecurity_Speakers Speakers Technology_Speakers Virtual_Keynote_Speakers

Geoff White

Channel 4 News & BBC Investigative Journalist; Technology specialist; Expert in Personal Data, Digital Security & Dark Web

europe range1 Cybersecurity_Speakers Speakers Virtual_Keynote_Speakers

Thom Langford

Experienced CISO and C-Suite Security executive in multi-national organisations; Founder of (TL)2 Security

namerica range4 Big_Data_Speakers Cybersecurity_Speakers Speakers Technology_Speakers TED_Speakers Virtual_Keynote_Speakers

Bruce Schneier

Security Technologist & Cybersecurity Guru. Bestselling Author

Basic Data Protection Information
Address Doctor Ullés 2, 3º 1ª, CP 08224, TERRASSA (Barcelona)
Purposes We will use your data to respond to your requests and deliver our services to you.
Marketing We will only send you marketing correspondence if you have given your prior consent, which you can do by ticking the box for that purpose.
Lawful basis We will only process your data if you have given your prior consent, which you can do by ticking the box for that purpose.
Recipients Generally, only our members of staff who have been duly authorised may access the data that you have provided.
Your Rights You have the right to know what information we hold about you, to rectify it and to erase it, as explained in the additional information available on our website.
Additional Information For more information, please see “PRIVACY POLICY” on our website.