Mikko Hypponen
Chief Research Officer at WithSecure (Formerly F-Secure). Cybersecurity & Privacy Expert. Bestselling Author, If it's Smart, it's Vulnerable
According to recent studies by PwC at the World Economic Forum, cyber security is in the top 5 most important concerns of CEOs and other C-suite executives. It’s no surprise that our cybersecurity speakers – some of the most famous white hackers in the world – are in high demand nowadays.
In the era of the Internet of Things and ubiquitous social networks, our data has never been more vulnerable. We are now connected to internet almost all the time, and the sensitive security of our devices—and of the companies we trust with our private information—doesn’t seem to be keeping up. The rapid growth of digital platforms together with the accelerating development of new internet-dependent technologies has opened the door to new forms of business. They have created an economy in which data is extremely valuable, and where the information stored online has to be protected against hacking, fraud, and compromise.
Cyber security is a challenge for everyone, from the largest companies to the individual user of smartphones, computers, and online services. All of our data is at risk. If you’re interested in this topic and want to organize an event or bring in a top cybersecurity speaker, make sure you work with the best minds in the business. Here at Aurum Speakers Bureau, we offer you the chance to hire the internationally recognized experts who are best equipped to help you face this challenge. From the world’s most famous hacker, Kevin Mitnick, who can give your audience cutting-edge security advice and provide live demonstrations of hacking to IoT cybersecurity speakers Chris Valasek and Charlie Miller, two of the top “White Hat” hackers in the world who will tell how they managed to remotely hack a Jeep Cherokee and gain total control of the vehicle. This is an issue worth taking seriously. It is neither capricious nor trendy: simply put, there is no freedom without security. It’s time to call up the experts in cybersecurity.
Chief Research Officer at WithSecure (Formerly F-Secure). Cybersecurity & Privacy Expert. Bestselling Author, If it's Smart, it's Vulnerable
The World’s Most Famous Hacker & Cybersecurity Speaker
Cyber Security Analyst, Author & Researcher
Former NSA “white hat” Hacker, renowned Automotive and iPhone Hacker
Principal Autonomous Vehicle Security Architect & Renowned ‘White Hat’ Hacker
Cambridge Analytica Whistleblower. Social Researcher & Data Scientist
Amazon's Chief Technology Officer
Hacker, Entrepreneur, Former CTO Obama for America
Chief Security Officer & Chief Strategist at Security Mentor Inc. Former CSO, State of Michigan
Cybersecurity expert; CEO of Kaspersky Lab
Global Digital Leader, Futurist, Host of Cybercrimes with Ben Hammersley. Former Editor of WIRED magazine
Former CISO at Twitter; Co-founder & CEO at Altitude Networks
Renowned “White Hat” Hackers & Autonomous Vehicle Cybersecurity Experts
Creator of the MySpace worm, Cybercrime, Hacking and GDPR authority
Founder, Wikipedia - World's 5th Most Visited Website & Founder, WT.Social
Channel 4 News & BBC Investigative Journalist; Technology specialist; Expert in Personal Data, Digital Security & Dark Web
Experienced CISO and C-Suite Security executive in multi-national organisations; Founder of (TL)2 Security
Security Technologist & Cybersecurity Guru. Bestselling Author
Basic Data Protection Information | |
---|---|
Data controller | AURUM SPEAKERS BUREAU S.L. |
Address | Doctor Ullés 2, 3º 1ª, CP 08224, TERRASSA (Barcelona) |
Purposes | We will use your data to respond to your requests and deliver our services to you. |
Marketing | We will only send you marketing correspondence if you have given your prior consent, which you can do by ticking the box for that purpose. |
Lawful basis | We will only process your data if you have given your prior consent, which you can do by ticking the box for that purpose. |
Recipients | Generally, only our members of staff who have been duly authorised may access the data that you have provided. |
Your Rights | You have the right to know what information we hold about you, to rectify it and to erase it, as explained in the additional information available on our website. |
Additional Information | For more information, please see “PRIVACY POLICY” on our website. |