Kevin Poulsen: Cybersecurity Speaker

Kevin Poulsen brings rare insider expertise on cybersecurity, hacking, and digital risk, helping leaders navigate today’s evolving threats with clarity, context, and real-world insight.

Quick Facts:

Highlights:
  • Former hacker turned leading cybersecurity journalist and bestselling author.
  • Broke national stories on hospital breaches, nuclear plant vulnerabilities, and government device intrusions.
  • Former editorial director at SecurityFocus and major contributor to WIRED’s cybersecurity reporting.
  • One of the first hackers to receive the maximum US penalty for computer fraud.

Formats: Keynote 45–60 min, workshop, and seminar.

Audiences: IT teams, cybersecurity groups, government agencies, enterprise leaders, educators, and tech conferences.

Outcomes:
  1. Clear understanding of modern cyber risks and the tactics behind sophisticated attacks.
  2. Practical cybersecurity frameworks drawn from real-world investigations and firsthand experience.
  3. Actionable guidance for building stronger digital hygiene, organizational resilience, and threat awareness.
Reading time: 3 min
Reviews: (0 reviews)
  • Travels from: San Francisco, CA
  • **Fee range: $10,001 - $20,000

Talent Services

Keynote Topics:

If anyone knows the inner workings of internet security systems, it is Kevin Poulsen. This former hacker and cyber crime expert is now a respected journalist working as the senior editor at Wired.com. Audiences will learn from his first-hand experience what cyber criminals will do to steal your privacy and corrupt your online security. Poulsen outlines the various security vulnerabilities that could exist in your company, and what you need to do to improve your IT systems.

Talent Short Bio

Kevin Poulsen is a leading cybersecurity expert, bestselling author, investigative journalist, and former hacker whose extraordinary life story positions him as one of the most credible voices in digital security today. Known for his high-profile hacking cases in the early 1990s—including seizing control of radio station phone lines to win major contests—Kevin became one of America’s most notorious cyber fugitives before being captured in 1991. After serving the maximum sentence for hacking at the time, he redirected his technical talent toward journalism, advocacy, and cybersecurity education.

His transformation led him to write groundbreaking investigative pieces for WIRED, where his reporting exposed critical vulnerabilities in hospitals, nuclear facilities, wireless networks, and government systems. Kevin served as editorial director at Security Focus and played a major role in breaking national cybersecurity stories that shaped public understanding of digital risk. His bestselling books and high-impact keynote presentations continue to give audiences an inside look at how cyber incidents unfold and how organizations can respond effectively.

Kevin Poulsen is a highly-sought keynote speaker and expert covering such topics as cybersecurity and technology. He is a best-selling author, consultant, media pundit, and thought-leader who has spoken at many conferences around the world where he gives leaders the skills they need to deal with fast, big changes in society, the workplace, and education.

Kevin Poulsen is hired to speak at events and conferences where he can give expertise on important global business affairs. He was a former hacker who is most known for breaking into the computers of telephone companies in the early 1990s to win radio station phone-in contests using the information he obtained there. He ensured that he would be the correct number caller to win prizes such as $20,000 and a Porsche 944 S2 Cabriolet by seizing control of the phone lines that connected the various radio stations in the Los Angeles area.

Kevin Poulsen eluded capture by the FBI after they began their search for him. It took him 18 months on the run until he was ultimately apprehended in April 1991, and it was all because of the television show Unsolved Mysteries on NBC. After pleading guilty to the charge of computer fraud, he was given a prison sentence of somewhat more than five years.

At the time, it was the maximum penalty for hacking in the US. After Poulsen got out of jail, he was temporarily prohibited from using computers. After he changed his ways, he became a journalist, but he didn’t have the same curiosity that made him hack as a kid. His first story for a magazine came out in 1998 in WIRED. It was about programmers who used survivalist techniques to prepare for the Y2K bug.

When Poulsen’s court-ordered supervision ended, he became the editorial director of the California-based internet startup SecurityFocus and started writing about security and hacking news. Poulsen often broke big national media articles that were covered by the mainstream press, such as a computer intrusion at a US hospital that, for the first time, compromised patient medical records, hackers “war driving” for open Wi-Fi networks, a computer virus that made the safety system at an Ohio nuclear power plant inoperable. And a southern California hacker’s successful penetration of a Secret Service agent’s PDA and the subsequent theft of sensitive information.

In 2005, Kevin Poulsen left SecurityFocus and is now a senior editor for Wired.com. In 2006, Poulsen made computerized reporting software that looked through MySpace for sexual offenders who had signed up and found hundreds of them. Because of the story, a child molester was caught in the act, leading to big changes in MySpace and federal law. According to what Poulsen found in 2007, the FBI put a type of spyware called a CIPAV on the computers of criminal defendants.

In June 2010, Poulsen and a co-author broke the story that the government had secretly locked up a young Army intelligence analyst in Iraq on suspicion of leaking hundreds of thousands of classified documents to the secret leak website WikiLeaks. Kevin Poulsen is the original editor of the Threat Level blog for Wired. The blog won the 2010 MIN award for best blog and the 2008 Knight-Batten Award for Innovation in Journalism. In 2010, the SANS Institute named Poulsen a “Top Cyber Security Journalist.” This came after he was inducted into the MIN’s Internet Journalism Digital Hall of Fame in 2009.

Contact us at Speakers Inc and follow us on Twitter

Talent Videos

Kevin Poulsen at Stanford Center for Internet and Society: Cybersecurity, Hacking Evolution, and Digital Risk

A sixty-eight minute Stanford presentation where Kevin Poulsen explores the evolution of hacking, critical vulnerabilities, and the societal impact of digital security failures.

This sixty-eight minute talk from the Stanford Center for Internet and Society features Kevin Poulsen delivering an in-depth, highly contextual examination of hacking culture, cybercrime evolution, and the investigative work that shaped his career as a cybersecurity journalist. Drawing from his own past as a high-profile hacker and later as a leading investigative reporter, Kevin explains how early phone-phreaking techniques foreshadowed today’s wide-ranging digital threats, highlighting the human motivations and technical ingenuity that drive cyber incidents.

He provides a detailed look at several landmark cases he has reported on, including hospital breaches, wireless network vulnerabilities, and government device intrusions. These stories illuminate how attackers exploit oversight, outdated systems, and simple human error. Kevin emphasizes that while technology evolves rapidly, many of the vulnerabilities stem from predictable patterns of behavior—both from attackers and the organizations attempting to defend against them.

The presentation also explores the journalistic responsibilities involved in covering cybersecurity events. Kevin discusses how he verifies information, works with victims and authorities, and evaluates the ethical boundaries of reporting on sensitive digital incidents. He shares his investigative process, offering a behind-the-scenes look at uncovering stories that later became national headlines.

Key Moments

00:00–10:30 Overview of Kevin’s background, early hacking culture, and how phone-phreaking shaped modern cybercrime.
10:30–25:00 Exploration of landmark investigations, including hospital breaches and vulnerabilities in critical infrastructure.
25:00–40:00 Discussion of digital risk, attacker psychology, and how organizations typically fail to anticipate evolving threats.
40:00–55:00 Explanation of Kevin’s investigative methods, journalistic ethics, and reporting on high-impact cybersecurity cases.

Interest to Book? Send us your enquiry

Speaker Contact Form

Enquiry Form

Talent FAQ's

Speaker fees can vary depending on factors such as expertise, demand, and event specifics. While some speakers may charge a flat fee for their services, others may have hourly rates. It’s best to discuss fee structures directly with the speaker or their representative to understand the pricing model.

Keynote speeches typically range from 30 to 90 minutes, with the duration determined by the speaker’s expertise, the event’s agenda, and audience preferences. Keynote speeches often include a combination of inspirational stories, practical insights, and actionable advice tailored to the event’s theme or objectives.

The scale of the event and audience size can indeed impact a speaker’s fee. Larger events with a broader reach or higher attendance may command higher fees due to increased exposure and demand. Conversely, smaller events or niche audiences may offer opportunities for more flexible pricing arrangements.

Travel expenses such as transportation, accommodation, and meals are typically negotiated separately from the speaker’s fee. These costs vary depending on the speaker’s location, travel distance, and event duration. It’s important to clarify travel arrangements and expenses during the booking process to avoid misunderstandings.

Many speakers require a deposit to secure a booking, with the remaining balance due closer to the event date. Deposits are often non-refundable and serve as a commitment from both parties. It’s advisable to discuss deposit requirements and payment terms with the speaker or their representative when finalizing the booking.

  • Virtual speaking appearances are a cost-effective alternative to high speaking fees, often 10-50% cheaper than in-person rates.
  • There is typically no difference in fee for a 15-minute speech versus a 60-minute speech.
  • Some motivational speakers are open to discounting their fee if hired for more than one event by the same organization.
  • When browsing speakers, consider their location to keep travel costs down.
  • Personal connections to your organization or event location can increase your chances of securing a renowned speaker.
  • Be upfront about your needs and expectations to ensure a successful partnership.
  • Speaker bureaus like Speakers Inc help guide you through the booking process to negotiate the best deal with favorable terms.

Ready to find the perfect speaker for your event? Use our advanced search feature or contact us to get started today!

Talent Resources

In order to view the below you must be logged in.

  • Powerpoint Slide – For meeting and event planners
  • Gallery Images
  • High Resolution Images
  • PDF Files
  • Books and Magazine Links
  • Music List
  • Podcast Shows
  • Courses
  • + more
Was this profile helpful?

You may be interested in...

  • (10)
Brian Krebs

Brian Krebs is a renowned investigative journalist and cybersecurity expert who has been at the forefront of cybersecurity reporting for over two decades. Best known for his blog Krebs on Security, which has become a leading source of information on cybersecurity breaches, cybercriminal operations, and data privacy issues, Krebs has established himself as a trusted […]

  • Travels from: Arlington, VA
  • Cybersecurity Speakers
  • (44)
Olympia LePoint - Rocket Science Meets Real Life

Olympia LePoint is a force of inspiration, a rocket scientist turned keynote speaker who transforms complex science into compelling stories of triumph, innovation, and human potential. Known globally for her groundbreaking work with NASA’s Space Shuttle Program, Olympia brings unmatched credibility and charisma to every stage she graces. With her riveting presence and profound storytelling, […]

  • Travels from: Los Angeles, CA
  • AI Technology Speakers
  • (26)
  • (3)

Confidence Staveley is Africa’s most celebrated female Cybersecurity Leader, Talent Developer, Blockchain Security Professional, Global Speaker and Inclusion advocate. She has achieved numerous professional certifications and industry recognitions for her outstanding work. Confidence is an official member of the Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs, and technology executives. Winner of the […]

  • Travels from: Atlanta, GA
  • Cybersecurity Speakers
  • (11)
Katie Greer

Katie Greer is a leading expert in internet safety, with a mission to educate and empower audiences on navigating the digital world safely and responsibly. With over a decade of experience in the field, Katie has become a trusted voice for schools, parents, corporations, and law enforcement agencies. Her engaging and informative presentations have made […]

  • Travels from: Boston, MA
  • Security Speakers
  • (32)
Lisa Forte

Lisa Forte is a globally recognized keynote speaker and cybersecurity expert, specializing in ethical hacking, cyber resilience, and social engineering. With a dynamic approach to cybersecurity, she combines her deep technical knowledge with a talent for delivering impactful and relatable talks that engage audiences worldwide. Lisa has earned a reputation for transforming complex cybersecurity concepts […]

  • Travels from: London, UK
  • Cybersecurity Speakers
  • (48)
Scott Augenbaum

Scott Augenbaum is a distinguished cybersecurity expert and keynote speaker, renowned for his practical insights on preventing cybercrime. With over three decades of experience in the FBI’s Cyber Division, Scott has investigated some of the most complex and high-profile cyberattacks in the U.S., giving him a unique perspective on the threats facing organizations today. His […]

  • Travels from: Franklin, TN
  • Cybersecurity Speakers
  • (35)
  • (2)
Dr. Jessica Barker

Dr. Jessica Barker is a globally recognized expert in cybersecurity, known for her pioneering work in the human aspects of security. As the co-founder of Cygenta, she has helped businesses and governments worldwide improve their security cultures and reduce risks by focusing on human behavior. Dr. Barker has become a highly sought-after keynote speaker, author, […]

  • Travels from: London, UK
  • Security Speakers
  • (21)
Brett Williams

Brett Williams is an esteemed keynote speaker, cybersecurity expert, and former military leader whose distinguished career spans over three decades. With a wealth of experience in both national security and corporate cybersecurity, Brett has established himself as one of the foremost authorities in the realm of digital protection and risk management. His captivating presentations are […]

  • Travels from: Durham, NC
  • Security Speakers
Disclaimer
The profiles and images embedded on these pages are from various conference entertainers and other talent.

These remain the property of its owner and are not affiliated with or endorsed by Speakers Inc.

Fee ranges where listed on this website are intended to serve as a guideline only.

All talent fees exclude VAT, travel and accommodation where required.

Subscribe to our Newsletter and get connected:

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Newsletter

Subscribe to our newsletter and stay updated.

We use Brevo as our marketing platform. By submitting this form you agree that the personal data you provided will be transferred to Brevo for processing in accordance with Brevo's Privacy Policy.

Our Mission:

We are your partner creating memorable and engaging experiences that go beyond the event itself.

© All rights reserved 2025.  Designed using Voxel

Speakers Inc Logo 2024
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.