the top cyber security speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfinternational...

29
Worldwide Speaking Engagements

Upload: others

Post on 10-Mar-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

Worldwide Speaking Engagements

Page 2: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

1 of 27 Worldwide Speaking Engagements

The Top Cyber Security Speaker

Page 3: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

2 of 27 Worldwide Speaking Engagements

ABOUT KEVIN MITNICK ................................................................................................. 4

There is no one like Kevin ........................................................................................................... 4 Why choose Kevin for your event? .................................................................................... 4

KEVIN THEN: THE BLACK HAT ..................................................................................... 6

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker .............................. 6

KEVIN NOW: A WHITE HAT .......................................................................................... 10

Kevin is the Leader of the World's Top Security Penetration Testing Team ........................ 10

SPEAKING ENGAGEMENTS BY KEVIN MITNICK ...................................................... 13

Entertaining – Relevant – Informative ........................................................................................ 13 Example Hosts of Kevin .................................................................................................. 14

Kevin Creates a Powerful Draw and Delivers an Unforgettable Experience....... 15 Choose from Four Unique Presentation Experiences ..................................................... 16

Full Keynote Descriptions ......................................................................................................... 17 #1: THE ART OF DECEPTION: How Hackers and Con Artists Manipulate You and What You Can Do About It ....................................................................................................... 17

People are the weakest security link. .................................................................. 17 #2: THE ART OF INTRUSION: How Hackers Attack and How to Fight Back .................. 18

Breaking into your technology and security is easy. ........................................... 18 #3: GHOST IN THE WIRES: The Story the Government Doesn’t Want You to Know ..... 19

Would you like to see a real ghost? .................................................................... 19 #4: CUSTOM Q&A WITH LIVE HACKING: To Illustrate and Reinforce Your Messaging 20

After Kevin reveals the threats, your team shows the solutions. ......................... 20

Event Add-ons ............................................................................................................................ 21 VIP Appearances ............................................................................................................ 21

Guests stay longer to meet the legend ............................................................... 21

Event Giveaways ........................................................................................................................ 22 Kevin’s Famous Lock Pick Cards .................................................................................... 22

They always carry a reminder of your event in their pocket................................ 22 His Bestselling Thrill Ride ................................................................................................ 23

Follow up with them later on if they liked it ......................................................... 23

Event Promotion Bonus ............................................................................................................ 24 Tweet to one of the Top Cyber Security Social Media channels ...................................... 24

Gain interest from attendees, non-attendees, investors & news ........................ 24

PRICING .......................................................................................................................... 25

Single City – All-inclusive* Presentation Fees ........................................................................ 25 Kevin’s fee, airfare, hotel and much more are included with no stipends to manage! ..... 25

*Items “not included”, “if applicable” & “optional” ................................................ 26

Multi-City Pricing Discounts and Tour Packages .................................................................... 27

Page 4: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

3 of 27 Worldwide Speaking Engagements

Page 5: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

4 of 27 Worldwide Speaking Engagements

About Kevin Mitnick There is no one like Kevin

Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide. Kevin and The Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives and staff on both the theory and practice of social engineering, topics in which he is the leading global authority.

Kevin's presentations are akin to technology magic shows which include the latest hacking techniques that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases "security awareness".

Why choose Kevin for your event? Whether your target market knows Kevin by name or not, hosts find promoting and holding events based upon “The World’s Most Famous Hacker” achieves their goals and an excellent return-on-investment (ROI). Kevin delivers:

• Maximum draw for attendees, sponsors and news media • The ability to ensure the decision makers attend • Increased length-of-stay by attendees • Event memory retention by attendees • Affinity with you and your knowledge experts • Illustrating the real threats your products and services address • Unique ways that provide follow-up opportunities

Page 6: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

5 of 27 Worldwide Speaking Engagements

Now being adapted into a screenplay for a major motion picture

Page 7: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

6 of 27 Worldwide Speaking Engagements

KEVIN THEN: The Black Hat Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

By Kevin Mitnick and William Simon Forward by Steve Wozniak Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats, it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. As the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

"...into the mind of one who truly mastered the art..."

Frank Abagnale, author of Catch Me if You Can

Page 8: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

7 of 27 Worldwide Speaking Engagements

Page 9: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

8 of 27 Worldwide Speaking Engagements

If hackers were rock stars, Kevin Mitnick would be Mick Jagger.

Mathew Dunn 2015 Technology Editor at News.Com

Page 10: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

9 of 27 Worldwide Speaking Engagements

Page 11: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

10 of 27 Worldwide Speaking Engagements

KEVIN NOW: A White Hat

Kevin and his team finds the holes before the real bad guys do.

What he does:

A major internationally recognized credit bureau wanted an external party to challenge their security. Mitnick Security's team was deployed and simulated threats by black-hat attackers against the bureau. Using physical exploits and social engineering, the team penetrated critical systems and data centers. The team could access the credit reports and personal information of consumers. As a result of the findings and recommendations, the bureau was able to dramatically improve their security. The government of Ecuador was under the threat of having the presidential election stolen by hackers or hostile foreign governments capable of destabilizing the country. Mitnick Security's team was engaged to protect and monitor the systems that tabulated Ecuador's 2013 elections to prevent tampering and manipulation. Vulnerabilities were assessed, and security was improved. The elections went smoothly and all unwanted activities were blocked.

What they say:

"Kevin showed me the check he had written to himself using our internal system for $6 million; I knew all of our preconceived notions of security had to be changed." CEO, Financial Company - Fortune 500 "In two weeks, $4 billion worth of our data and intellectual property was sitting in front of me on an external drive! My own team told me nothing was missing, the same team that had said hacking us would be impossible." CEO, Software Company - Fortune 500

Kevin is the Leader of the World's Top Security Penetration Testing Team

Page 12: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

11 of 27 Worldwide Speaking Engagements

2015 Highlight

Hacking Live to Kick Off the 30th Annual International Telecommunications Week in front of a crowd of 6,000 representing all of the world's telecommunications company. This was immediately followed on stage by Kevin participating in a three person panel on the state of cybersecurity with General Keith Alexander (ex-head of the NSA) and Sir John Sawers (ex-head of Mi6).

At the Movies in 2016 Coming to the big screen Kevin will help expose how vulnerable the world is to cyber-attack as a chapter of the critically acclaimed documentary "Lo and Behold, Reveries of the Connected World" by famed director Werner Herzog.

Page 13: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

12 of 27 Worldwide Speaking Engagements

In our world, Kevin Mitnick is our David Beckham or Lebron James

Micho Schumann 2016 Principal, IT Advisory at KPMG

Page 14: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

13 of 27 Worldwide Speaking Engagements

Speaking Engagements by Kevin Mitnick

Entertaining – Relevant – Informative

Kevin’s presentations are technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

“Delegates at the event gave Kevin a rating of 98% for content and 98% for delivery.

I’m sure you will agree with me the scores were sensational.”

Joyce Ong, Accenture

“...the unique ability to connect with both technical and nontechnical groups.”

John Dietrich, Dell

“...he showed how readily information can be gathered by hackers...”

Capt. “Doc” Simon, United States Navy

“...funny and definitely in the zone...”

Amy Draves, Microsoft

Page 15: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

14 of 27 Worldwide Speaking Engagements

41st Parameter, A10 Networks, Abbey Reid Public Safety and Security Group, Accenture, AIM Institute, Alabama Power, Allegro, Altiris, Arco, Asgent, American Financial Systems Association, Association for Communications Technology Professionals in Higher Education (ACUTA), AT & T, Altiris, ATI, Banamex (National Bank of Mexico), BIC Gipuzkoa Berrilan, Carnegie Mellon, CAIS, Casa Editorial El Tiempo S.A., C4XPO, Calgary Board of Education, CBS, CeBIT, CIOSynergy, Cirosec. Citrix, Cloudmark, Cmark, ConnectWise, CSC Executive Exchange, CyberSource, Cyber Innovation Center, Cyber Protection Resources, Dasher, Dell, Dell Security Group, Dell Software, Deutsche Messe, Diebold, Discover Card, DST Systems, Dubai World Trade Center, e.Republic, Ecuadorian Systems, Elsag, Energy Insurance Mutual, EuroFinance, Federal Aviation Administration (FAA), Fedex, Federal Bureau of Investigation (FBI), Fidelity, First Financial Bank, First National Bank, FireMon, FIS Global, Fishnet, Food Industry Services, Fort-Ross, Freescale, Futura Networks, Future Com, General Dynamics, General Satellite, Globb TV, Google, Guard ID, Harvard, Health Information System Society, HP, Humana, IBM, Ioconvex, IDC, InfoBlox, Information Systems Security Association (ISSA), Information Today, InfoSec, Infragard, ITT Market,

Example Hosts of Kevin IT Web, JP Morgan Chase, Juniper Networks, KnowBe4, evel Lifelock, Lockheed Martin, Mailchimp, Management Circle, Mastercard, Menlo Ventures, Merchant Risk Council, MetLife, Microsoft, MIS Training, Moneris, Narus, NASA, National Association of Convenience Stores, National Geographic, nCircle, NETpeas, NETucation, Neustar, Nordic eCommerce Knowledge, OneBeacon, Ontario Sytems, OpenText, Oracle, Panda, Palo Alto Networks, Palsit, Phion, Pereira & O’Dell, Principa College, Public World, Relay Venture Fund, Rhino, RiskMathics, Rose State College, Qualys, Quest Media, Sabre, Sailpoint Technologies, Security Network of America, Skyrr, Shift4, Social Security Administration, Solve Media, Southern Utah University, SupportSoft, Symantec, Systems Management Planning, Tata Consulting Services, Technology Nexus, Techweb, Telefonica, Tomascon, Toshiba, Toyota, Travelocity, Trinidad and Tobago Chamber of Industry and Commerce, United Business Media, Visa, Vantagem, VIA Technology, VMware User Group (VMUG), Vocent, Voxeo, US Pretrial Services, US Congress, US Senate, Unatek, Vækstfonden, Verafin, Visa, Voxeo, Watchcom, Wells Fargo, Websense, World Game Protection, Worldnet, World Government Summit, Young Presidents' Organization (YPO), Zenlok, Ziff Davis, Zilog, Zimperium, Zix Coporation

Page 16: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

15 of 27 Worldwide Speaking Engagements

Kevin Creates a Powerful Draw and Delivers an Unforgettable

Experience.

Page 17: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

16 of 27 Worldwide Speaking Engagements

Choose from Four Unique Presentation Experiences

Kevin currently offers three excellent keynote presentations, which are based on his best-selling books. Each of these presentations is 90 minutes long which consist of a 75 minute keynote plus an additional 15 minutes of Q&A. Plus: he provides a custom Q&A experience with real live hacking that can be tailored for any length of time.

1. THE ART OF DECEPTION: How Hackers and Con Artists Manipulate You and What You Can Do About It

The #1 recommend presentation to raise security awareness

2. THE ART OF INTRUSION: How Hackers Attack and How

to Fight Back

Rich in real case studies

3. GHOST IN THE WIRES: The Story the Government Doesn’t Want You to Know

The Catch Me if You Can thrill ride of the modern age

4. CUSTOM Q&A WITH LIVE HACKING: Reinforce Your

Event’s Messaging

Effective educational entertainment

Coming Soon in 2017…

THE ART OF INVISIBILITY: Defending Your Privacy against Hackers, Spies, and Big Brother

Page 18: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

17 of 27 Worldwide Speaking Engagements

Full Keynote Descriptions

#1: THE ART OF DECEPTION: How Hackers and Con Artists Manipulate You and What You Can Do About It

Kevin’s Most Popular Speech for All Audiences. A Must See!

People are the weakest security link. They can be manipulated or influenced into unknowingly helping hackers break into their organization’s computers. You’ll learn how easily you can be an unsuspecting victim who can be manipulated into handing over the keys the kingdom, if you haven’t done so already. Kevin Mitnick will entertain and educate you by performing his "live technology magic show" of the latest hacking techniques. You just might realize that you—like almost everyone else on the planet—have a misplaced reliance on security technology, which has now become ineffective against a motivated hacker using a technique called "social engineering."

Social engineering is a technique used by hackers and con artists that leverages your tendency to trust. Trust is a truly noble human characteristic; however, in terms of personal and organizational security, it’s also a significant weakness because trust can be exploited. Kevin is the worldwide authority on social engineering and constantly improves and updates this highly acclaimed "security awareness" presentation with the latest threats and risks most people don’t even know exist. You’ll learn how to detect manipulation and take steps to protect yourself and your organization. Gain the power to think defensively.

“The #1 recommended presentation to raise security awareness for everyone”

Page 19: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

18 of 27 Worldwide Speaking Engagements

#2: THE ART OF INTRUSION: How Hackers Attack and How to Fight Back

Rich in Real Case Studies – A Deep Tech Dive

Breaking into your technology and security is easy. To learn why, first you must think like a hacker. In this engaging and demonstration-rich experience, Kevin Mitnick illustrates how a hacker’s thought process works and how they ply their tradecraft. You’ll start to see you and your organization as a target through the hacker’s eyes and gain new insights into "security awareness”. Kevin then enables you to strengthen your defenses through concrete and actionable guidance. Kevin is uniquely qualified to take you inside the mind of a hacker, as it takes one to know one. He was once the FBI’s Most Wanted, although he never stole for profit or damaged systems. He is the most elusive computer break-in artist in history because he hacked into the NSA and more than 40 major corporations just for the fun and adventure. Kevin is now a trusted security consultant to Fortune 500 companies and governments worldwide, and he leads the world’s top security penetration testing team. You’ll gain current and valuable insight into the hacker mindset by examining real-life computer break-ins. You’ll see how the perpetrators hacked in and how they successfully covered their tracks. Most importantly, Kevin will share how you can prevent these same horror stories from being repeated in your organization in a cost-effective manner that offers maximum protection.

Page 20: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

19 of 27 Worldwide Speaking Engagements

#3: GHOST IN THE WIRES: The Story the Government Doesn’t Want You to Know

The “Catch Me if You Can” Thrill Ride of the Modern Age Treat yourself to an unforgettable experience. Come on the run and escape with Kevin as he takes you on this hilarious and mind-boggling adventure based upon his New York Times bestselling autobiography, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. Kevin is a master storyteller who puts you right in the action of this sophisticated cat-and- mouse game with authorities by recounting the false identities, jumping from city to city, his close shaves and and ultimately, a bizarre showdown with the feds. He was the most elusive computer break-in artist in history. Although he never stole for financial gain or damaged systems, he did hack into the NSA and more than 40 major corporations just for the fun and adventure. He spent years skipping through cyberspace, and no matter how fast the authorities were, Kevin was faster, using technology not only to evade but also to spy on and track his pursuers. His story-- packed with hysterical pranks and fear-driven hysteria--actually started a movement and changed how companies secure their information.

Would you like to see a real ghost? The New York Times best seller this presentation is based upon makes a great giveaway for any event.

Page 21: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

20 of 27 Worldwide Speaking Engagements

#4: CUSTOM Q&A WITH LIVE HACKING: To Illustrate and Reinforce Your Messaging

Reinforce the Messaging of Your Product, Services and Event With your team Kevin will create a custom Q&A experience with real live hacking that will inform, entertain and educate your attendees. This will provide you the advanced ability of making your talking points come alive on stage. In this very popular Q&A format you’ll coordinate pre-arranged questions with Kevin so that he’ll have amazing hacking demonstrations to illustrate the key answers and event messaging. Your audience will be more attentive as they are engrossed within a unique experience akin to a “technology magic show”. Don’t Just Tell Them – Show Them You will provide a moderator, who, we suggest, should be part of your closing team for enterprise clients after the event, to be on stage with Kevin. This will help to create affinity for your team and recognition of the individual. Your audience will easily grasp your concepts as Kevin showcases current hacks both he and his team use during penetration testing to evaluate his clients’ networks, systems and devices for security vulnerabilities. He’ll also stand side-by-side with you to help raise affinity for you and your team and help imbue and raise legitimacy for your messaging because of his own positioning as a world authority on cybersecurity. Create an unforgettable message from an unforgettable event experience.

After Kevin reveals the threats, your team shows the solutions.

Page 22: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

21 of 27 Worldwide Speaking Engagements

Event Add-ons VIP Appearances

You may wish to add-on a “VIP Appearance”. This time may be used for a book-signing, media event, a mix and mingle, a reward, draw, for another co-sponsor’s important VIP clients, or even the sponsors themselves.

Guests stay longer to meet the legend

Page 23: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

22 of 27 Worldwide Speaking Engagements

Event Giveaways Kevin’s Famous Lock Pick Cards Your attendees may receive this coveted memorabilia directly from Kevin. This unique item is actually a lock pick which people tend to carry with them always and talk about it. They remember you.

They always carry a reminder of your event in their pocket

Page 24: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

23 of 27 Worldwide Speaking Engagements

His Bestselling Thrill Ride

Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker

Please use the following process to order Kevin’s Autobiography directly from the publisher (and just have them shipped to your hotel/event). This way you are receiving the maximum discount that a bookstore, school or even Kevin would get if ordering. We cannot guarantee publisher stock or delivery, though they are constantly in reprint. Call the publisher as soon as you can to understand the process (Hachette Books, part of Little Brown www.hbgusa.com) if you wish to place larger orders. By ordering over 50 books, you start to receive slight discounts, and then discounts gradually increase to 50% at 100 books. We only have statistics for USA timelines for delivery:

• It takes 2 – 3 business days to be set up as an account • It takes 2 business days to fulfill • It takes 4 business days to ship (they use UPS)

Most hosts order his thriller New York Times bestseller: Paperback copies – Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker = ISBN 9780316037723 Place your order / inquire at 1-800-759-0190. These bestsellers are also available: Coming in 2017:

Follow up with them later on if they liked it

Page 25: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

24 of 27 Worldwide Speaking Engagements

Event Promotion Bonus

Tweet to one of the Top Cyber Security Social Media channels Did you know just about the entire world’s press and security community follow @kevinmitnick? Kevin is pleased to tweet to help promote your event. We’ll work with you to formulate messaging with the proper #hashtags, @twitter handles and links you would like. Kevin may adjust your text slightly to suit his voice. We try not to shorten your links to provide maximum SEO for you. We have tremendous success in driving news and attendance interest this way. Gain interest from attendees, non-attendees, investors & news

Page 26: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

25 of 27 Worldwide Speaking Engagements

Pricing

Single City – All-inclusive* Presentation Fees

Kevin’s fee, airfare, hotel and much more are included with no stipends to manage!

** Caribbean Islands are $40,000

**

Page 27: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

26 of 27 Worldwide Speaking Engagements

*Items “not included”, “if applicable” & “optional”

You are also responsible for directly arranging and pre-paying for:

• EVENT CITY GROUND TRANSPORTATION (not included): You will provide ground transportation via a private, professional car service (including fares and gratuities; no taxis or shuttles, please) between the airport(s), accommodations venue(s), and the event venue(s). For USA engagements, Kevin will arrange for himself and will invoice you after the event.

• AUDIO VISUAL (not included): You will provide the local AV equipment and crew associated with your selection keynote presentation

• TAXES AND VISAS (if applicable):This includes all taxes or fees levied by the host country and/or city of the event, as well as any taxes on speaking fees or on any electronics brought into the country. It is the hosting group’s responsibility to determine if any taxes or fees will be due in the event city or country and to make all such payments directly to the appropriate governing body; the amount received by the speaker must equal the amount outlined in the agreement.

• VISAS (if applicable): This includes all costs for the visa application (including travel and any expenses the speaker must incur to obtain the visa from the appropriate embassy prior to the event) and processing fees (if required by the hosting country; it is the hosting group’s responsibility to determine whether the speaker requires a visa to participate in the event); the speaker will cooperate fully in this process.

• SECURITY GUARD SERVICES (if applicable): You may have to provide a security guard depending on your location, choice of presentation, and scheduling. Kevin's valuable presentation equipment must not be left unattended at any time. Please ask your agent or bureau if this applies to you.

• BOOKS (optional): These are ordered directly from the publisher. How to do this is outlined previously in this brochure

• VIP APPEARANCES (optional): Please contact your agent or bureau with your special requirements so they can provide you a quote for this add-on.

• LOCK PICKS (optional): These are normally $12 retail each and are available for $3.50 in bulk for hosts. Please order from your agent or bureau.

Page 28: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

27 of 27 Worldwide Speaking Engagements

Multi-City Pricing Discounts and Tour Packages You are eligible for the following discount tiers based upon the number of cities:

REPEAT CUSTOMER

MINISERIES TOUR GRAND TOUR

2 to 5 Cities

6 to 11 Cities

12 to 23 Cities

24 + Cities

DISCOUNT Applied to

All-Inclusive* Pricing

7.5% off 10% off 15% off 20% off

BONUS

Social Media

Tweets Tweets Tweets plus Video Invite**

Tweets plus Video Invite**,

PR Quotes*** & Media Interviews*****

BONUS

VIP Appearance

Included***** Included***** Included*****

BONUS

Lock Picks Per City

50 Free 100 Free 200 Free

BONUS Ground

Transport

Included Free Included Free

** Video Invite is a 3 minute recording via Skype or through your expense through a local studio *** Press Release (PR) quote is a mutual agreed to paragraph that can be used throughout your materials **** Media Interviews - Up to 2 hours of onsite or remote interviews regarding the tour ***** Must be used consecutively on the same day. This is a savings of $8,000 - $12,000 per city

Page 29: The Top Cyber Security Speakerworldwide.streamer.espeakers.com/assets/6/8726/122093.pdfInternational Telecommunications Week in front of a crowd of 6,000 representing all of the world's

There is no one like Kevin. He is the legend that started it all. Now he’s the world’s most famous hacker He knows and demonstrates live hacks to show the real cyber threats people and organizations face from hackers.

It takes one to know one. Book your legendary event today!