2 Results for
Event Location: Illinois
Speaker Location: Maryland
Speaker Location: Oregon
Speaker Location: Asia
Consumer Behavior
Cyber Security

Former Hacker, Cyber Security Expert & Author

Fees
Please Inquire
Keren Elazari is an internationally recognized cyber security analyst, author, and researcher with more than 20 years of experience in the cyber security field. Keren covers emerging security technologies and trends as an independent strategic advisor, working with leading technology providers, government agencies, innovative start-ups, and Fortune 500 companies. In 2014, Keren became the first Israeli woman to speak at the prestigious TED Conference. Keren’s talk has been viewed by millions, translated to 30 languages, and chosen for TED’s ‘Most Powerful Ideas’. Today, Keren’s TED talk is still one of TED’s most watched talks on the topic of security and hacking. Keren holds a CISSP certification and a Masters in Security Studies, and is a senior researcher at the Interdisciplinary Cyber Research Center at Tel Aviv University . Keren is the founder of Israel’s largest security research community event, BSidesTLV, part of the global SecurityBSides movement, and the Leading Cyber Ladies, a global professional network for Women in Cyber Security.

President of Secure Mentem & Expert on Technology and Information Security

Fees
  • Local: $10,001 - $20,000*
  • US East: $10,001 - $20,000*
  • US West: $10,001 - $20,000*
  • Europe: Please Inquire
  • Asia: Please Inquire
Considered one of the world’s most influential security professionals, Ira Winkler, CISSP, is the president of Secure Mentem. Ira has been named a "Modern Day James Bond" by the media after performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the world and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs.
Viewing 1 - 2 of 2