Mishaal Khan

Mishaal Khan

Hacker, Author, CISOCA, US

As a passionate cybersecurity leader and engaging keynote speaker, I specialize in demystifying cybersecurity as an "Ethical Hacker," delivering actionable insights with eye-opening demos and stories.

Mishaal is a subject matter expert in cybersecurity, ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. He takes a hands-on approach to display his passion for security by involving people in his live demos while making it fun and thought-provoking. He's a frequent speaker at popular cybersecurity conferences like DEF CON, Wild West Hacking Fest, Universities, and multiple BSides events.


Mishaal has worked with multinational companies for over 20 years, securing their networks and providing executive-level consultancy as a CISO to manage risk and avoid breaches. He's the author of the book; The Phantom CISO, runs a cybersecurity practice as a vCISO, owns a privacy management and investigations firm and holds a dozen industry-standard credentials like Certified Ethical Hacker (CEH), Certified Social Engineer, IntelTechniques Open Source Intelligence Professional (OSIP), CCIE, and many others.

Mishaal is a subject matter expert in cybersecurity, ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. He takes a hands-on approach to display his passion for security by involving people in his live demos while making it fun and thought-provoking. He's a frequent speaker at popular cybersecurity conferences like DEF CON, Wild West Hacking Fest, Universities, and multiple BSides events.


Mishaal has worked with multinational companies for over 20 years, securing their networks and providing executive-level consultancy as a CISO to manage risk and avoid breaches. He's the author of the book; The Phantom CISO, runs a cybersecurity practice as a vCISO, owns a privacy management and investigations firm and holds a dozen industry-standard credentials like Certified Ethical Hacker (CEH), Certified Social Engineer, IntelTechniques Open Source Intelligence Professional (OSIP), CCIE, and many others.

Keynote

Format: 45 min [keynote]


These keynotes present a hackers perspective on the topic. While they incite some fear and uncertainty with the use of demos and examples, they leave the attendees more aware and hopeful of securing their organizations.


This program is perfect for:

  • C-Suite
  • Business Owners
  • Board of Directors
  • All levels of users

 

The...

Cyber SecurityEducational / InformativeTechnical / SpecificStrategic PlanningRisk Management

Your Organization From A Hacker's Perspective

Format: 45 min [keynote]

 

Examine how the publicly accessible information about your organization  can be used against you by your competitors, nation-state attackers and  disgruntled employees.


This program is perfect for:

  • Business Leaders
  • Executives
  • Entire Organization

 

The audience will leave with:

  • A better...
Identity TheftCyber SecurityEducational / InformativeTechnical / SpecificStrategic PlanningRisk Management

The Power of Social Engineering

Format: 50 mins [keynote]

 

This presentation covers the essential elements of social engineering, how it is used to infiltrate organizations, and what you can do to protect yourself. I will demonstrate techniques like open source intelligence, impersonations, phishing, and vishing in this interactive session. You will gain an in-depth understanding of specific techniques to enhance your ability to effectively perform or identify these methods. This will...

Identity TheftCyber SecurityAudience ActivityEducational / InformativeRisk Management

People Hunting From Your Couch

Format: 30-45 mins


This session explores advanced techniques and tools for extracting valuable  information from diverse online platforms, social media, public databases, and breaches. By emphasizing responsible approaches to Open Source Intelligence (OSINT),  attendees will learn how to navigate vast data sources, analyze digital  footprints, and uncover the hidden gems of online information. Learn to  harness the power of OSINT,...

Identity TheftCyber SecurityEducational / InformativeTechnical / SpecificRisk Management