Skip to main content
  • Conferences
  • Speakers
  • Skillcamp
Notifications
  • Strategies for Online and Offline Success
    ×
  • That Will Get You Speaking Engagements in 2024
    ×
  • For a Meeting or Talk
    ×
  • SpeakerHub's commitment to innovation and user-centric design.
    ×
  • How to Make Your Public Speech Professional and Memorable
    ×
  • SIGN UP
  • SIGN IN
  1. Home
  2. Find a speaker
  3. Peter Warmka
Peter Warmka's cover banner
Peter Warmka's picture

Peter Warmka

CFE
People Hacker
Country or state 
United States
Available to 
Global
City 
Orlando
Fee 
Ask for pricing
Languages 
English,
Spanish,
...
Volunteer
Yes

Personal Details

Bio

Following a distinguished career as a Senior Intelligence Officer within the Central Intelligence Agency (CIA), Peter Warmka became a global security professional helping corporate clients mitigate risks in new foreign markets. His areas of specialization include cyber security, intelligence collection, competitive intelligence and asset protection management.

Because of his extensive background in social engineering, Mr. Warmka joined Webster University in 2015 as an Adjunct Professor where he lectures on intelligence and counter-intelligence as it relates to cyber security.

Mr. Warmka is also a frequent speaker on social engineering threats at various conferences for trade associations and wealth management advisory firms

Mr. Warmka received a Bachelor’s Degree in Liberal Arts from the University of Wisconsin-Milwaukee and a Master’s Degree in International Business Management from Thunderbird School of Global Management. Mr. Warmka is a Certified Fraud Examiner (CFE), a Certified Protection Professional (CPP) and Certified Instructor at CIA University (CIAU).

Current position (1)

People Hacker

Degrees (1)
Masters of International Business Administration
Thunderbird
1981 to 1983

Presentations

Presentations (3)
Social Engineering

I take the audience through the stages of a social engineering attack starting with information collection on the organization as well as people who work there. I then demonstrate how this information is utilized across 4 different social engineering attack vectors to effectively manipulate targets thereby circumventing technological controls and leading to security breaches.

"Confessions of a CIA Spy - The Art of Human Hacking"

Most successful data breaches are initiated by human hacking. Threat actors carefully select, assess, and manipulate key employees within a target organization who in turn become the “insider threat.” Advanced social engineering techniques are employed to effectively circumvent the policies, procedures and technological controls put in place to safeguard proprietary information, client data and sensitive personnel records.

For over 20 years of his career with the Central Intelligence Agency, Peter developed expertise in the identification, assessment, and manipulation of insiders to breach the security of target organizations in pursuit of high value foreign intelligence. He now shares his insight to help protect organizations and employees against external threats.

"C-Suite: Insights into Cyber Security Risk Management"

The prospect of their organization suffering a devastating data breach is becoming a growing concern among C-Suite executives worldwide. Such breaches are conducted by a variety of threat actors who design and execute increasingly more sophisticated attacks to steal information (proprietary, client data, customer records) or to conduct financial extorsion in the form of ransomware or business email compromise (BEC). Such attacks can lead to a significant loss in operations and even force the enterprise out of business. C-Suite executives can no longer view security, whether physical or cyber, as a cost accounting item, but rather, an investment in people, processes and technologies.

In this session, Peter will leverage his expertise as a former intelligence officer, to help attendees understand the mindset of threat actors and the methodologies they use to turn employees into insider threats. He will then provide tips on how the C-Suite can lead and foster a successful trans

Past talks (4)
Social Engineering and the Art of Manipulation
28th Annual ACFE Global Conference
Nashville, Tennessee
June 12, 2017
Panelist on "Understanding the Risks of Cybersecurity for Your Business"
CenterState Corporation for Economic Opportunity
Syrachuse, New York
September 12, 2017
Social Engineering
Axa Financial Advisors Western Conference
Las Vegas, Nevada
November 21, 2017
Social Engineering - How Fraudsters Manipulate and Exploit Their Targets
29th Annual ACFE Global Conference
Las Vegas, Nevada
June 18, 2018
  • All
  • Videos
  • Photos
This speaker hasn't uploaded any media content yet.

Books & Articles (2)

The Scam Artist - The 3rd Oldest Profession and Thriving More Than Ever
Artful Manipulation

Expertise (5)

Technology
Business
IT consulting and services
influence Finance
Recommendations
Why choose me? 

Use of passion, humor, expertise and credibility to forever change my audience's way of thinking.

Similar to Peter
  • Tina Greenbaum's picture
    Tina
    Greenbaum
  • Oscar Auliq-Ice's picture
    Oscar
    Auliq-Ice
    Founder
    Auliq
  • Bill Neville's picture
    Bill
    Neville
    Director of Professional Development
    The Entrust Group
  • Dave Deruytter's picture
    Dave
    Deruytter
    Expatriate & Non-resident Banking and Insurance
    ING Bank
  • Himamshu Sharma, CMA's picture
    Himamshu
    Sharma, CMA
    Senior Analyst
    Blackstone COE
  • Speakers
  • Agencies
  • Events
  • How it works
  • Blog
  • Upgrade
  • Podcast
  • About us
  • Organizers
  • Terms of use
  • Privacy policy
  • FAQ
  • API
  • Contact
  • Corporate Speakers Bureau & CRM
  • Motivational speakers
  • Leadership speakers
  • Business speakers
  • Inspirational speakers
  • Keynote speakers
  • Corporate speakers
  • Celebrity speakers
  • Top 50 Business Speakers
  • Top 50 Leadership Speakers
  • Top 50 Motivational Speakers
  • Top 50 Technology Speakers

Get speaking tips & so much more!

Twice a month we send you speaking tips, training ideas and lots of useful updates.

© 2026 SpeakerHub
All rights reserved.

  • Facebook
  • Twitter
  • LinkedIn
  • SoundCloud