Cybersecurity

WP_Query Object ( [query] => Array ( [taxonomy] => team-category [term] => cybersecurity [team-category] => cybersecurity [do_not_redirect] => 1 [error] => [m] => [p] => 0 [post_parent] => [subpost] => [subpost_id] => [attachment] => [attachment_id] => 0 [name] => [static] => [pagename] => [page_id] => 0 [second] => [minute] => [hour] => [day] => 0 [monthnum] => 0 [year] => 0 [w] => 0 [category_name] => [tag] => [cat] => [tag_id] => [author] => [author_name] => [feed] => [tb] => [paged] => 0 [meta_key] => orden_235 [meta_value] => [preview] => [s] => [sentence] => [title] => [fields] => [menu_order] => [embed] => [category__in] => Array ( )[category__not_in] => Array ( )[category__and] => Array ( )[post__in] => Array ( )[post__not_in] => Array ( )[post_name__in] => Array ( )[tag__in] => Array ( )[tag__not_in] => Array ( )[tag__and] => Array ( )[tag_slug__in] => Array ( )[tag_slug__and] => Array ( )[post_parent__in] => Array ( )[post_parent__not_in] => Array ( )[author__in] => Array ( )[author__not_in] => Array ( )[orderby] => meta_value_num [order] => ASC [ignore_sticky_posts] => [suppress_filters] => [cache_results] => 1 [update_post_term_cache] => 1 [lazy_load_term_meta] => 1 [update_post_meta_cache] => 1 [post_type] => [posts_per_page] => 12 [nopaging] => [comments_per_page] => 50 [no_found_rows] => )[query_vars] => Array ( [taxonomy] => team-category [term] => cybersecurity [team-category] => cybersecurity [do_not_redirect] => 1 [error] => [m] => [p] => 0 [post_parent] => [subpost] => [subpost_id] => [attachment] => [attachment_id] => 0 [name] => [static] => [pagename] => [page_id] => 0 [second] => [minute] => [hour] => [day] => 0 [monthnum] => 0 [year] => 0 [w] => 0 [category_name] => [tag] => [cat] => [tag_id] => [author] => [author_name] => [feed] => [tb] => [paged] => 0 [meta_key] => orden_235 [meta_value] => [preview] => [s] => [sentence] => [title] => [fields] => [menu_order] => [embed] => [category__in] => Array ( )[category__not_in] => Array ( )[category__and] => Array ( )[post__in] => Array ( )[post__not_in] => Array ( )[post_name__in] => Array ( )[tag__in] => Array ( )[tag__not_in] => Array ( )[tag__and] => Array ( )[tag_slug__in] => Array ( )[tag_slug__and] => Array ( )[post_parent__in] => Array ( )[post_parent__not_in] => Array ( )[author__in] => Array ( )[author__not_in] => Array ( )[orderby] => meta_value_num [order] => ASC [ignore_sticky_posts] => [suppress_filters] => [cache_results] => 1 [update_post_term_cache] => 1 [lazy_load_term_meta] => 1 [update_post_meta_cache] => 1 [post_type] => [posts_per_page] => 12 [nopaging] => [comments_per_page] => 50 [no_found_rows] => )[tax_query] => WP_Tax_Query Object ( [queries] => Array ( [0] => Array ( [taxonomy] => team-category [terms] => Array ( [0] => cybersecurity )[field] => slug [operator] => IN [include_children] => 1 )[1] => Array ( [taxonomy] => team-category [terms] => Array ( [0] => cybersecurity )[field] => slug [operator] => IN [include_children] => 1 ))[relation] => AND [table_aliases:protected] => Array ( [0] => wpab_term_relationships [1] => tt1 )[queried_terms] => Array ( [team-category] => Array ( [terms] => Array ( [0] => cybersecurity )[field] => slug ))[primary_table] => wpab_posts [primary_id_column] => ID )[meta_query] => WP_Meta_Query Object ( [queries] => Array ( [0] => Array ( [key] => orden_235 )[relation] => OR )[relation] => AND [meta_table] => wpab_postmeta [meta_id_column] => post_id [primary_table] => wpab_posts [primary_id_column] => ID [table_aliases:protected] => Array ( [0] => wpab_postmeta )[clauses:protected] => Array ( [wpab_postmeta] => Array ( [key] => orden_235 [compare] => = [alias] => wpab_postmeta [cast] => CHAR ))[has_or_relation:protected] => )[date_query] => [request] => SELECT SQL_CALC_FOUND_ROWS wpab_posts.ID FROM wpab_posts LEFT JOIN wpab_term_relationships ON (wpab_posts.ID = wpab_term_relationships.object_id) LEFT JOIN wpab_term_relationships AS tt1 ON (wpab_posts.ID = tt1.object_id) INNER JOIN wpab_postmeta ON ( wpab_posts.ID = wpab_postmeta.post_id ) LEFT JOIN wpab_icl_translations t ON wpab_posts.ID = t.element_id AND t.element_type = CONCAT('post_', wpab_posts.post_type) WHERE 1=1 AND ( wpab_term_relationships.term_taxonomy_id IN (235) AND tt1.term_taxonomy_id IN (235) ) AND ( wpab_postmeta.meta_key = 'orden_235' ) AND wpab_posts.post_type = 'team-member' AND (wpab_posts.post_status = 'publish') AND ( ( t.language_code = 'en' AND wpab_posts.post_type IN ('post','page','portfolio-item','testimonials','carousels','slides','team-member','cookielawinfo','attachment' ) ) OR wpab_posts.post_type NOT IN ('post','page','portfolio-item','testimonials','carousels','slides','team-member','cookielawinfo','attachment' ) ) GROUP BY wpab_posts.ID ORDER BY wpab_postmeta.meta_value+0 ASC LIMIT 0, 12 [posts] => Array ( [0] => WP_Post Object ( [ID] => 12605 [post_author] => 1 [post_date] => 2018-11-28 11:51:06 [post_date_gmt] => 2018-11-28 11:51:06 [post_content] => Eugene began his career in cybersecurity accidentally when his computer became infected with the ‘Cascade’ virus in 1989. Eugene’s specialized education in cryptography helped him analyze the encrypted virus, understand its behavior, and develop a removal tool for it. After successfully removing the virus, Eugene’s curiosity and passion for computer technology drove him to start analyzing more malicious programs and developing disinfection modules for them. This exotic collection of antivirus modules would eventually become the foundation for Kaspersky Lab’s antivirus database. Today the database is one of the most comprehensive and complete collections in cybersecurity, protecting systems from more than 100 million malicious programs.In 1990 Eugene started gathering a team of like-minded enthusiast researchers to create the AVP Toolkit Pro antivirus program, which was recognized by the University of Hamburg in 1994 as the most effective antivirus software in the world.Eugene and his colleagues then decided to establish their own independent company. In 1997 Kaspersky Lab was founded, with Eugene heading the company’s antivirus research. In 2007 he was named Kaspersky Lab’s CEO.Today Kaspersky Lab is the world’s largest privately-held vendor of endpoint protection, operating in almost 200 countries and territories worldwide. The company employs almost 3,300 professionals and IT security specialists in dedicated regional offices across 32 countries and its cybersecurity technologies protect over 400 million users worldwide.Eugene has earned a number of international awards for his technological, scientific and entrepreneurial achievements. He was voted the World’s Most Powerful Security Exec by SYS-CON Media in 2011, awarded an Honorary Doctorate of Science from Plymouth University in 2012, and named one of Foreign Policy Magazine’s 2012 Top Global Thinkers for his contribution to IT security awareness on a global scale. [post_title] => EUGENE KASPERSKY [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => eugene-kaspersky [to_ping] => [pinged] => [post_modified] => 2019-03-21 11:23:42 [post_modified_gmt] => 2019-03-21 11:23:42 [post_content_filtered] => [post_parent] => 0 [guid] => https://aurumbureau.com/?post_type=team-member&p=12605 [menu_order] => 200 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[1] => WP_Post Object ( [ID] => 13290 [post_author] => 1 [post_date] => 2019-03-12 08:04:38 [post_date_gmt] => 2019-03-12 08:04:38 [post_content] => Recognized as two of the most technically proficient hackers on earth by ForeignPolicy.com, Charlie and Chris are best known for the remote hack of a 2014 Jeep Cherokee, in which they obtained total physical control of the vehicle from more than 10 miles away, exposing serious security flaws that led Fiat Chrysler to recall 1.4 million vehicles to fix the issue.They both serve nowadays as Cruise Automation's Principal Autonomous Vehicle Security Architects. Charlie is the former National Security Agency hacker, former head of autonomous vehicle security division at Didi Chuxing, a China-based ride sharing company, and former Application Security Staff Engineer at Twitter. Chris is the former security lead at Uber’s Advanced Technologies Center (along with Charlie, as they both got hired by Uber to work on the security of their autonomous vehicles after their impressive Jeep hack) and former Internet Security Systems Researcher at IBM.In presentations, Charlie and Chris captivate all audiences with insights that will alter your perspective of cybersecurity and the future of self-driving cars. From their roles as hackers for good and the perpetual battle against online adversaries, to emerging threats facing specific industries and companies, this hacker duo sounds the alarm on this 21st century issue, while injecting humor in a twist all their own. Participants walk away enlightened, with strategies and solutions for identifying risks and preventing hacks and breaches. [post_title] => Chris Valasek & Charlie Miller [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => chris-valasek-charlie-miller [to_ping] => [pinged] => [post_modified] => 2019-08-08 17:04:02 [post_modified_gmt] => 2019-08-08 15:04:02 [post_content_filtered] => [post_parent] => 0 [guid] => https://aurumbureau.com/speaker/chris-valasek-charlie-miller/ [menu_order] => 10 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[2] => WP_Post Object ( [ID] => 13379 [post_author] => 1 [post_date] => 2019-03-26 15:28:09 [post_date_gmt] => 2019-03-26 15:28:09 [post_content] => Ben Hammersley is a thought-provoking futurist who has been lecturing to audiences around the globe for over 15 years. He brings a practical, proactive approach to the digital era inspiring audiences to be present now to be prepared for the future.As an international reporter, author and adventure seeker, Hammersley explores the effects of the internet and the digital network on the world’s business, political and social atmospheres. He is also the author of 64 Things You Need to Know Now For Then where he gives us the essential guide to the things we need to know for life in the 21st century.As host of Cybercrimes, he explores a global threat that could impact us all—the dark world of hacking. A new generation of highly organized cybercriminals run complex commercial enterprises, involving leaders, planners, engineers, infantry and hired money mules. As the first specialist correspondent on the internet for The Times and the Guardian, he became the inventor of the popular term, ‘podcast’.With his current position as the Editor-at-Large of  WIRED magazine, Ben Hammersley has been called upon to advise three governments and countless organisations in the area of technology and media including a seat on the European Commission High Level Group on Media Freedom of the European Union. [post_title] => Ben Hammersley [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => ben-hammersley [to_ping] => [pinged] => [post_modified] => 2019-08-12 11:17:34 [post_modified_gmt] => 2019-08-12 09:17:34 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.aurumbureau.com/?post_type=team-member&p=13379 [menu_order] => 200 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[3] => WP_Post Object ( [ID] => 13416 [post_author] => 1 [post_date] => 2019-03-27 17:34:40 [post_date_gmt] => 2019-03-27 17:34:40 [post_content] =>

The New Yorker calls him “a pink-haired, nose-ringed oracle sent from the future”. Best known for his role in setting up – and then taking down – the cyberwarfare firm Cambridge Analytica, Chris has been listed in TIME 100 Most Influential People in the World, Forbes’ 30 Under 30, Politico ’s 50 Most Influential People in Politics and Business Insider ’s 100 Coolest People in Tech.

Named as “the millennials’ first great whistleblower,” his revelations exposing the rampant misuse of data rocked Silicon Valley and forced numerous Fortune 500 companies to overhaul cybersecurity and user privacy practices. Congress held its first ever hearings on the impact of social media on democracy and Facebook experienced the largest single-day share value drop in American corporate history – twice.

His evidence also exposed the deep links between the Alt-Right and Russian intelligence networks, leading to major ongoing FBI and NCA investigations in the US and UK.

With his neon hair and brutally honest candour, Chris engages audiences around the world and makes AI understandable, disturbing – and yet somehow compelling. His mind-bending stories about the power of weaponised algorithms and information warfare have garnered audiences of over 15,000 people at some of the leading global events, including Web Summit, the Royal Institute for International Affairs (‘Chatham House’), the European Commission and Forbes 30 Under 30.

When Chris speaks out about the future of technology, governments around the world take note – he has testified before the United States Congress five times, as well as at the parliaments of the European Union, United Kingdom and Canada.

Chris is currently the Director of Research for Hennes & Mauritz (‘H&M’), the largest global fashion brand. His work on quantifying fashion style with AI systems is already having a major impact on the fashion sector. A recognised expert in cultural trend forecasting, Chris also writes for the youth culture and fashion magazine Dazedand has been featured in Vogue, GQ, Esquire and PAPER.

In a previous life, Chris worked inside the highest levels of the British government and is a graduate of the London School of Economics.

[post_title] => Christopher Wylie [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => christopher-wylie [to_ping] => [pinged] => [post_modified] => 2019-08-01 18:06:50 [post_modified_gmt] => 2019-08-01 16:06:50 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.aurumbureau.com/?post_type=team-member&p=13416 [menu_order] => 200 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[4] => WP_Post Object ( [ID] => 13421 [post_author] => 1 [post_date] => 2019-03-27 17:50:08 [post_date_gmt] => 2019-03-27 17:50:08 [post_content] => Tagged as “the Code Warrior” by Vanity Fair, Mikko Hypponen is one the world’s most sought-out experts on technological security and privacy issues. The Finnish computer scientist has defused high profile viruses and malware that left experts at major tech companies scratching their heads.Hyponnen is Chief Research Officer at F-Secure in Finland, where he has dedicated the past 25 years to protecting people from cyber threats such as Stuxnet, Sasser and the Storm Worm. He was one of the first people to document security threats to smart phones, in his article “Malware Goes Mobile” featured in Scientific American.Since the 1990s, Hypponen has assisted law enforcement in the United States, Europe and Asia on cybercrime cases, containing and terminating some of the most widespread outbreaks in history. He is also a member of the advisory board of IMPACT (International Multilateral Partnership Against Cyber Threats).Hypponen has delivered hundreds of talks in over 40 countries over the last 20 years, including keynotes at the world’s foremost security conferences such as Black Hat, DEF CON, DLD, and RSA, though he is also a frequent speaker at general-interest events including TED, SXSW, and Google Zeitgeist. His TED Talk from 2011 is the most watched online security talk on the Internet, having been watched 1.5 million times and it has been translated to over 40 languages. [post_title] => Mikko Hypponen [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => mikko-hypponen [to_ping] => [pinged] => [post_modified] => 2019-03-28 16:20:04 [post_modified_gmt] => 2019-03-28 16:20:04 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.aurumbureau.com/speaker/mikko-hypponen/ [menu_order] => 200 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[5] => WP_Post Object ( [ID] => 13452 [post_author] => 1 [post_date] => 2019-03-28 10:53:11 [post_date_gmt] => 2019-03-28 10:53:11 [post_content] => Jamie Woodruff is one of the world’s leading authorities on hacking and cyber security. He entered the public eye when he successfully hacked Facebook as part of a student competition at Bangor University where he was studying computer information systems. He has since uncovered security holes in numerous high-profile operations, including Kim Kardashian’s website, which he hacked to reveal that it was putting her fans’ data at serious risk.Jamie Woodruff is currently Chief technology Officer of an IT Support and Security specialist company in the UK. They specialise in training, cloud solutions, penetration testing and support schools with a full range of IT. He is also the cyber safety advisor for the Cyber Smile Foundation which specialises in online cyber bullying.Woodruff talks about the importance of system and network security and is known for disclosing world-wide exploits and vulnerabilities within leading security applications such as Facebook, YouTube, Twitter, Apple and Google. He finds existing exploits by infiltrating the companies in question. He demonstrated this by impersonating a Domino’s pizza delivery boy at a large financial institution and gaining access to their server room via pick-locking. All carried out under fully authorised, ethical penetration testing.Jamie Woodruff also talks passionately about Cryptocurrency - explaining how it works, what to expect in the future and what it means for the future of currency and trading. [post_title] => Jamie Woodruff [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => jamie-woodruff [to_ping] => [pinged] => [post_modified] => 2019-03-28 10:56:00 [post_modified_gmt] => 2019-03-28 10:56:00 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.aurumbureau.com/?post_type=team-member&p=13452 [menu_order] => 200 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[6] => WP_Post Object ( [ID] => 13490 [post_author] => 1 [post_date] => 2019-03-29 12:13:28 [post_date_gmt] => 2019-03-29 12:13:28 [post_content] =>
Michael Coates is the CEO & co-founder of Altitude Networks. Previously, Michael was the Chief Information Security Officer at Twitter. In this role he led the security program for Twitter across all elements of information security. He has led security programs impacting hundreds of millions of users at Twitter and Mozilla. He has also served as the chairman of the board of directors for OWASP, the largest non-profit application security organization spanning 200 chapters in over 100 countries around the world. Michael is heavily involved in the security startup space serving as an adviser for multiple exciting startups.Prior to Twitter, Michael was the Director of Product Security at Shape Security. In this role Michael worked with an amazing team to drastically change the way organizations defend their applications against modern application attacks. Before building and leading security programs, Michael spent six years as a hands-on security practitioner assessing, compromising, and securing the applications and networks for some of the largest banks, governments, and enterprises around the world.Michael has served as an advisor to multiple startups and was also honored in 2012 when he was selected as an SC Magazine Influential Security Mind. Michael is based in San Francisco with his wife, two children and two dogs.
[post_title] => Michael Coates [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => michael-coates [to_ping] => [pinged] => [post_modified] => 2019-08-03 14:12:52 [post_modified_gmt] => 2019-08-03 12:12:52 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.aurumbureau.com/?post_type=team-member&p=13490 [menu_order] => 80 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[7] => WP_Post Object ( [ID] => 12535 [post_author] => 1 [post_date] => 2018-11-19 09:59:42 [post_date_gmt] => 2018-11-19 09:59:42 [post_content] => Principal Autonomous Vehicle Security Architect at Cruise Automation & Renowned “White Hat” HackerRegarded for his work in the automotive security arena, Chris Valasek specializes in offensive research methodologies with a focus on reverse engineering and exploitation. Best known for the remote compromise of a 2014 Jeep Cherokee, whereby he and his research partner, Charlie Miller obtained physical control of the vehicle from more than 10 miles away, Valasek was lauded for exposing serious security flaws in automobiles; the results led Fiat Chrysler to recall 1.4 million vehicles. Valasek is one of the first researchers to discuss automotive security issues in detail, and his release of a library to physically control vehicles through the CAN (Controller Area Network) bus garnered worldwide media attention.Valasek’s hacking of the Jeep Cherokee led Uber to bring him on board as Security Lead at their Advanced Technologies Center. As a result of his work within the automotive industry, Valasek was included on LinkedIn’s Next Wave list, featuring 150 of the top professionals age 35 and under who are transforming different industries.After leaving Uber on July 2017, Chris and his partner Charlie both joined as Principal Autonomous Vehicle Security Architect at Cruise Automation, an American driverless car company headquartered in San Francisco, California acquired by General Motors in 2016 for an undisclosed amount.A popular speaker on security flaws in various technologies and devices, and solutions for preventing and alleviating such critical issues, he has presented at such preeminent cybersecurity conferences around the world, including BlackHat USA, DEFCON and Infiltrate. He is also the Chairman of SummerCon, America’s oldest hacker conference. His insights have been featured in a large range of media outlets, including leading publications, TIME, Fortune, The Washington Post, Forbes and SecurityWeek. [post_title] => Chris Valasek [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => chris-valasek [to_ping] => [pinged] => [post_modified] => 2019-08-08 17:08:37 [post_modified_gmt] => 2019-08-08 15:08:37 [post_content_filtered] => [post_parent] => 0 [guid] => https://aurumbureau.com/?post_type=team-member&p=12535 [menu_order] => 180 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[8] => WP_Post Object ( [ID] => 12537 [post_author] => 1 [post_date] => 2018-11-19 10:01:25 [post_date_gmt] => 2018-11-19 10:01:25 [post_content] => Dr. Charlie Miller is "one of the most technically proficient hackers on Earth", according to Foreign Policy.  After receiving his PhD in Mathematics from the University of Notre Dame, Dr. Miller was a computer hacker for the National Security Agency for five years.Since that time, he has worked for the Twitter information security team, as well as worked on the autonomous vehicle security team for Uber, Didi Chuxing, and currently Cruise Automation.Dr. Miller has found countless vulnerabilities in a number of Apple products including their laptops and phones.  Perhaps the most notorious of these issues was the ability to remotely compromise an iPhone by merely sending it a malicious text message.  He is known as the first to remotely exploit the iPhone when it was released as well as the first Android phone when it was released (on the day it came out).After that, he began focusing on embedded security and has done research in the fields of laptop battery security as well as near field communications (NFC) of cellular phones.Lately, Dr. Miller has spent considerable time in the field of automotive security.  Dr. Miller demonstrated that a variety of Fiat Chrysler vehicles could be remotely hacked from anywhere in the country and he could control the radio, brakes, wipers, transmission, acceleration, and even the steering of the target vehicle.  The demonstration of these vulnerabilities led to the recall of 1.4 million vehicles.Dr. Miller has been featured on the Today Show, ABC World News Tonight, CNN, NPR, CNBC, New York Times, USA Today, Forbes, etc. He has also won the “Super Bowl” of computer hacking, the annual Pwn2Own competition four times. [post_title] => Charlie Miller [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => charlie-miller [to_ping] => [pinged] => [post_modified] => 2019-08-08 17:13:45 [post_modified_gmt] => 2019-08-08 15:13:45 [post_content_filtered] => [post_parent] => 0 [guid] => https://aurumbureau.com/?post_type=team-member&p=12537 [menu_order] => 180 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[9] => WP_Post Object ( [ID] => 12595 [post_author] => 1 [post_date] => 2018-11-28 11:32:41 [post_date_gmt] => 2018-11-28 11:32:41 [post_content] => There is no one like Kevin.Kevin Mitnick is the world’s most famous hacker, bestselling author, and the top cyber security speaker. Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees— learn how to protect their information and themselves from harm.As the CEO of Mitnick Security Consulting, Kevin, and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. Also in his role of Chief Hacking Officer of KnowBe4 he helps produce critically acclaimed security awareness training programs to counteract social engineering and to improve security effectiveness.Kevin is a global bestselling author and his books are availability in over 50 countries and 20 languages. His works include The Art of Intrusion: The Real Story Behind the Exploits of Hackers, Intruders and Deceivers and The Art of Deception: Controlling the Human Element of Security, which are mandatory readings for security professionals. His autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker is a New York Times bestseller and his latest work released in 2017 is The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, a ground-breaking book on privacy.As a one-of-a-kind public speaker, Kevin’s presentations are akin to technology magic shows which include the latest hacking techniques that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness”. Kevin has been a commentator, security analyst, or interview subject for almost every major news outlet around the globe. [post_title] => Kevin Mitnick [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => kevin-mitnick [to_ping] => [pinged] => [post_modified] => 2019-04-04 13:46:50 [post_modified_gmt] => 2019-04-04 13:46:50 [post_content_filtered] => [post_parent] => 0 [guid] => https://aurumbureau.com/?post_type=team-member&p=12595 [menu_order] => 40 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw ))[post_count] => 10 [current_post] => -1 [in_the_loop] => [post] => WP_Post Object ( [ID] => 12605 [post_author] => 1 [post_date] => 2018-11-28 11:51:06 [post_date_gmt] => 2018-11-28 11:51:06 [post_content] => Eugene began his career in cybersecurity accidentally when his computer became infected with the ‘Cascade’ virus in 1989. Eugene’s specialized education in cryptography helped him analyze the encrypted virus, understand its behavior, and develop a removal tool for it. After successfully removing the virus, Eugene’s curiosity and passion for computer technology drove him to start analyzing more malicious programs and developing disinfection modules for them. This exotic collection of antivirus modules would eventually become the foundation for Kaspersky Lab’s antivirus database. Today the database is one of the most comprehensive and complete collections in cybersecurity, protecting systems from more than 100 million malicious programs.In 1990 Eugene started gathering a team of like-minded enthusiast researchers to create the AVP Toolkit Pro antivirus program, which was recognized by the University of Hamburg in 1994 as the most effective antivirus software in the world.Eugene and his colleagues then decided to establish their own independent company. In 1997 Kaspersky Lab was founded, with Eugene heading the company’s antivirus research. In 2007 he was named Kaspersky Lab’s CEO.Today Kaspersky Lab is the world’s largest privately-held vendor of endpoint protection, operating in almost 200 countries and territories worldwide. The company employs almost 3,300 professionals and IT security specialists in dedicated regional offices across 32 countries and its cybersecurity technologies protect over 400 million users worldwide.Eugene has earned a number of international awards for his technological, scientific and entrepreneurial achievements. He was voted the World’s Most Powerful Security Exec by SYS-CON Media in 2011, awarded an Honorary Doctorate of Science from Plymouth University in 2012, and named one of Foreign Policy Magazine’s 2012 Top Global Thinkers for his contribution to IT security awareness on a global scale. [post_title] => EUGENE KASPERSKY [post_excerpt] => [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => eugene-kaspersky [to_ping] => [pinged] => [post_modified] => 2019-03-21 11:23:42 [post_modified_gmt] => 2019-03-21 11:23:42 [post_content_filtered] => [post_parent] => 0 [guid] => https://aurumbureau.com/?post_type=team-member&p=12605 [menu_order] => 200 [post_type] => team-member [post_mime_type] => [comment_count] => 0 [filter] => raw )[comment_count] => 0 [current_comment] => -1 [found_posts] => 10 [max_num_pages] => 1 [max_num_comment_pages] => 0 [is_single] => [is_preview] => [is_page] => [is_archive] => 1 [is_date] => [is_year] => [is_month] => [is_day] => [is_time] => [is_author] => [is_category] => [is_tag] => [is_tax] => 1 [is_search] => 1 [is_feed] => [is_comment_feed] => [is_trackback] => [is_home] => [is_404] => [is_embed] => [is_paged] => [is_admin] => [is_attachment] => [is_singular] => [is_robots] => [is_posts_page] => [is_post_type_archive] => [query_vars_hash:WP_Query:private] => dbb7016e5bcb84ad9528ecd777221bb0 [query_vars_changed:WP_Query:private] => [thumbnails_cached] => [stopwords:WP_Query:private] => [compat_fields:WP_Query:private] => Array ( [0] => query_vars_hash [1] => query_vars_changed )[compat_methods:WP_Query:private] => Array ( [0] => init_query_flags [1] => parse_tax_query ))
Array ( [taxonomy] => team-category [term] => cybersecurity [team-category] => cybersecurity [do_not_redirect] => 1 [error] => [m] => [p] => 0 [post_parent] => [subpost] => [subpost_id] => [attachment] => [attachment_id] => 0 [name] => [static] => [pagename] => [page_id] => 0 [second] => [minute] => [hour] => [day] => 0 [monthnum] => 0 [year] => 0 [w] => 0 [category_name] => [tag] => [cat] => [tag_id] => [author] => [author_name] => [feed] => [tb] => [paged] => 0 [meta_key] => orden_235 [meta_value] => [preview] => [s] => [sentence] => [title] => [fields] => [menu_order] => [embed] => [category__in] => Array ( )[category__not_in] => Array ( )[category__and] => Array ( )[post__in] => Array ( )[post__not_in] => Array ( )[post_name__in] => Array ( )[tag__in] => Array ( )[tag__not_in] => Array ( )[tag__and] => Array ( )[tag_slug__in] => Array ( )[tag_slug__and] => Array ( )[post_parent__in] => Array ( )[post_parent__not_in] => Array ( )[author__in] => Array ( )[author__not_in] => Array ( )[orderby] => meta_value_num [order] => ASC [ignore_sticky_posts] => [suppress_filters] => [cache_results] => 1 [update_post_term_cache] => 1 [lazy_load_term_meta] => 1 [update_post_meta_cache] => 1 [post_type] => [posts_per_page] => 12 [nopaging] => [comments_per_page] => 50 [no_found_rows] => )

EUGENE KASPERSKY

Chairman and CEO of Kaspersky

Chris Valasek & Charlie Miller

Renowned “White Hat” Hackers & Autonomous Vehicle Cybersecurity Experts

Ben Hammersley

Global Digital Leader, Futurist, Host of Cybercrimes with Ben Hammersley

Christopher Wylie

Former Director of Research for Cambridge Analytica and SCL Group

Mikko Hypponen

Chief Research Officer, F-Secure; World-Wide Computer CyberSecurity and Privacy Expert

Jamie Woodruff

The Ethical Hacker and Cyber-Security Expert

Michael Coates

Former CISO at Twitter; Co-founder & CEO at Altitude Networks

Chris Valasek

Principal Autonomous Vehicle Security Architect & Renowned ‘White Hat’ Hacker

Charlie Miller

Former NSA “white hat” Hacker, renowned Automotive and iPhone Hacker

Kevin Mitnick

The World’s Most Famous Hacker

According to recent studies by PwC at the World Economic Forum, cyber security is in the top 5 most important concerns of CEOs and other C-suite executives, ranking behind only over-regulation and policy uncertainty as a threat to economic growth, availability of key skills (delaying effective innovation and increasing people costs), and trade conflicts. In the era of the Internet of Things and ubiquitous social networks, our data has never been more vulnerable. We are now connected to the internet almost all the time, and the security of our devices—and of the companies we trust with our private information—doesn’t seem to be keeping up.

The rapid growth of digital platforms together with the accelerating development of new internet-dependent technologies has opened the door to new forms of business. They have created an economy in which data is extremely valuable, and where the information stored online has to be protected against hacking, fraud, and compromise.

Cyber security is a challenge for everyone, from the largest companies to the individual user of smartphones, computers, and online services. All of our data is at risk. But don’t take our word for it—ask Aurum speakers Chris Valasek and Charlie Miller, two of the top “White Hat” hackers in the world. They make it their business to discover vulnerabilities before they can be exploited, and then find ways to close loopholes, build in extra protections, or otherwise avert danger.

Valasek and Miller famously discovered a weakness in the Chrysler Jeep Cherokee and managed to take full control of a vehicle more than 15 km away. Chrysler was forced to return 1.4 million units to the factory to address their cyber security faults. Other businesses rushed to keep up, hiring experts to deal with this new class of security threat.

If you’re interested in this topic and want to organize an event or bring in a speaker, make sure you work with the best minds in the business. Here at Aurum Speakers Bureau, we offer you the chance to hire the internationally recognized experts who are best equipped to help you face this challenge.

For instance, you might invite the world’s most famous hacker, Kevin Mitnick, give your audience the cutting-edge security advice and provide live demonstrations of hacking. Or you might setup a moderated talk between him and your company’s CEO or CFO, to send a clear message to your top customers and leading investors that the company is 100% secure and absolutely on top of cyber security concerns.

This is an issue worth taking seriously. It is neither capricious nor trendy: simply put, there is no freedom without security. It’s time to call up the experts.