
Mishaal Khan
As a passionate cybersecurity leader and engaging keynote speaker, I specialize in demystifying cybersecurity as an "Ethical Hacker," delivering actionable insights with eye-opening demos and stories.
Mishaal is a subject matter expert in cybersecurity, ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. He takes a hands-on approach to display his passion for security by involving people in his live demos while making it fun and thought-provoking. He's a frequent speaker at popular cybersecurity conferences like DEF CON, Wild West Hacking Fest, Universities, and multiple BSides events.
Mishaal has worked with multinational companies for over 20 years, securing their networks and providing executive-level consultancy as a CISO to manage risk and avoid breaches. He's the author of the book; The Phantom CISO, runs a cybersecurity practice as a vCISO, owns a privacy management and investigations firm and holds a dozen industry-standard credentials like Certified Ethical Hacker (CEH), Certified Social Engineer, IntelTechniques Open Source Intelligence Professional (OSIP), CCIE, and many others.
Mishaal is a subject matter expert in cybersecurity, ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. He takes a hands-on approach to display his passion for security by involving people in his live demos while making it fun and thought-provoking. He's a frequent speaker at popular cybersecurity conferences like DEF CON, Wild West Hacking Fest, Universities, and multiple BSides events.
Mishaal has worked with multinational companies for over 20 years, securing their networks and providing executive-level consultancy as a CISO to manage risk and avoid breaches. He's the author of the book; The Phantom CISO, runs a cybersecurity practice as a vCISO, owns a privacy management and investigations firm and holds a dozen industry-standard credentials like Certified Ethical Hacker (CEH), Certified Social Engineer, IntelTechniques Open Source Intelligence Professional (OSIP), CCIE, and many others.
Keynote
Format: 45 min [keynote]
These keynotes present a hackers perspective on the topic. While they incite some fear and uncertainty with the use of demos and examples, they leave the attendees more aware and hopeful of securing their organizations.
This program is perfect for:
- C-Suite
 - Business Owners
 - Board of Directors
 - All levels of users
 
The...
Your Organization From A Hacker's Perspective
Format: 45 min [keynote]
Examine how the publicly accessible information about your organization can be used against you by your competitors, nation-state attackers and disgruntled employees.
This program is perfect for:
- Business Leaders
 - Executives
 - Entire Organization
 
The audience will leave with:
- A better...
 
The Power of Social Engineering
Format: 50 mins [keynote]
This presentation covers the essential elements of social engineering, how it is used to infiltrate organizations, and what you can do to protect yourself. I will demonstrate techniques like open source intelligence, impersonations, phishing, and vishing in this interactive session. You will gain an in-depth understanding of specific techniques to enhance your ability to effectively perform or identify these methods. This will...
People Hunting From Your Couch
Format: 30-45 mins
This session explores advanced techniques and tools for extracting valuable information from diverse online platforms, social media, public databases, and breaches. By emphasizing responsible approaches to Open Source Intelligence (OSINT), attendees will learn how to navigate vast data sources, analyze digital footprints, and uncover the hidden gems of online information. Learn to harness the power of OSINT,...
