Speaker profile last updated by AAE Talent Team on 10/02/2024.
Format: 20-90 minute keynote or training seminar.
Most successful data breaches are initiated by human hacking. Threat actors carefully select, assess, and manipulate key employees within a target organization who in turn become the “insider threat.” Advanced social engineering techniques are employed to effectively circumvent the policies, procedures and technological controls put in place to safeguard proprietary information, client data and sensitive personnel records. For over 20 years of his career with the Central Intelligence Agency, Peter developed expertise in the identification, assessment, and manipulation of insiders to breach the security of target organizations in pursuit of high value foreign intelligence. He now shares his insight to help protect organizations and employees against external threats.
This program is perfect for: Senior and midlevel management Chief security officers Chief information security officers Human resource managers Public relations managers
The audience will leave with: Why humans are so susceptible to human hacking An understanding of threat actors and their objectives How threat actors use social media platforms to identify and assess employees as potential insider candidates How insider motivations and vulnerabilities are leveraged into the design and execution of advanced social engineering techniques including Spear Phishing, Smishing, Vishing and Face-to-Face approaches The evolution and impact of Deep Fake technology in human hacking schemes Three key actionable tips to prevent falling victim to human hacking
Format: 20-90 minute key note or training seminar
The prospect of their organization suffering a devastating data breach is becoming a growing concern among C-Suite executives worldwide. Such breaches are conducted by a variety of threat actors who design and execute increasingly more sophisticated attacks to steal information (proprietary, client data, customer records) or to conduct financial extorsion in the form of ransomware or business email compromise (BEC). Such attacks can lead to a significant loss in operations and even force the enterprise out of business. C-Suite executives can no longer view security, whether physical or cyber, as a cost accounting item, but rather, an investment in people, processes and technologies.
In this session, Peter will leverage his expertise as a former intelligence officer, to help attendees understand the mindset of threat actors and the methodologies they use to turn employees into insider threats. He will then provide tips on how the C-Suite can lead and foster a successful transformation of the organization's security awareness culture at all levels. The ultimate goal is to harden the security of enterprise forcing threat actors to move onto softer targets.
The audience will leave with: Understanding who are the external threat actors and what are their objectives Methodologies used to design and execute a variety of attacks Best practices incorporated into policies and procedures greatly diminishing successful attacks Creating a security awareness culture throughout all levels of the enterprise
Format: 20-90 minute keynote or training session
Technology is neither good nor evil. Its impact on society depends upon the intentions of the beholder. Since its inception in 2017, the use of synthetic media to create Deepfakes is evolving at an explosive rate. While proponents of such technology enthusiastically embrace numerous applications for the benefit of humankind, its use by fraudsters has already resulted in several successful multi-million dollar fraud schemes.
Leveraging his expertise as a human hacker , Certified Fraud Examiner (CFE) and cybercrime investigator, Peter will demonstrate how Deepfakes can easily be incorporated into advanced social engineering schemes.
This program is perfect for: Employees responsible for fraud prevention and detection Officials responsible for enterprise security Those responsible for public relations and monitoring of online reputation Business intelligence analysts
The audience will leave with: An understanding of the evolution of Deepfake technology Beneficial applications for society How deep fakes are used for deception to include financial fraud, manipulation of public opinion and reputational damage What tools are available for the detection of Deepfakes Examples of how enterprises can establish verification and authentication procedures to mitigate deep fake threats
Format: 20-90 minute keynote or training session
In this era of big data expansion, many people reluctantly relinquish control over their privacy allowing their identity to be transformed into a marketable binary code. While their personal information may be used to enhance a company's efficiency in marketing products and services, it can also be exploited by criminals and other threat actors for identity theft leading to devastating consequences for its victims. In 2021 alone, over 1.5 million Americans suffered identity theft resulting in 52 billion dollars in reported loses. Can you afford to become part of that statistic?
Few people realize that there are many ways they can effectively take back control over their privacy by incorporating specific settings on a variety of online applications in addition to exercising care in what they post on their social media platforms.
Leveraging his expertise as a former CIA intelligence officer and private investigator, Peter will clearly illustrate the evolution of victims who had to react to identity theft instead of proactively incorporating best practices which would have prevented them from ever happening in the first place.
This program is perfect for: Individuals who are concerned about their loss of privacy and digital security Those wanting to take back control over their identity and privacy
The audience will leave with: Understanding how big data is collected and what are its many applications Identification of threat actors and how they utilize this information for identity theft Specific procedures for changing privacy control settings on major online applications Numerous resource guides (PDF)
Format: 20-90 minute keynote or training seminar
U.S. Business executives and their families frequently become targets of opportunity for state intelligence services, industrial competitors and organized criminal groups when they travel overseas to high CI threat environments. Managing their public profile, deciding where to stay, who to trust and criteria for the media devices they carry are a few of the many considerations. Mishaps can lead to damage to personnel reputations, financial extorsion and/or devastating financial consequences for their firms. As a former intelligence officer with the CIA who has travelled to over 56 countries, Peter is well versed on the methodologies utilized by these threat actors to compromise corporate executives who are typically more focused on physical security over privacy, human hacking operations and data protection. He shares and analyzes numerous case studies along with the lessons painfully learned by stakeholders.
This program is perfect for: Mid-level to senior executives from all industries who travel overseas on behalf of their company Executives and family members relocating overseas Chief of security Those responsible for the design and management of travel plans
The audience will leave with: What makes business travelers high priority targets How to manage your profile before and during travel Understanding cultural differences and loss of legal protection How family members can help protect or endanger you How to minimize opportunities for electronic data collection How to protect yourself from blackmail and extorsion schemes
Peter Warmka is a keynote speaker and industry expert who speaks on a wide range of topics such as "Confessions of a CIA Spy - The Art of Human Hacking", "C-Suite - Insights into Cyber Security Management" , "Deepfake Technology - A Fraudster's Paradise", "Taking Back Control Over Your Identity and Privacy" and "Espionage 101 for International Business Travelers and their Families". The estimated speaking fee range to book Peter Warmka for your event is $10,000 - $20,000. Peter Warmka generally travels from Orlando, FL, USA and can be booked for (private) corporate events, personal appearances, keynote speeches, or other performances. Similar motivational celebrity speakers are Rachel Tobac, Scott Augenbaum, Brett Johnson, Dewayne Hart and Prashanth Challa. Contact All American Speakers for ratings, reviews, videos and information on scheduling Peter Warmka for an upcoming live or virtual event.
This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.
All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.
If you are the talent and wish to request a profile update or removal from our online directory, please submit a profile request form.