Advantage Point

Kevin Leyes: Why Privacy Has Become the New Luxury for Florida’s Ultra-Wealthy, Says LeyesX CEO

For Florida’s wealthiest families, the most devastating breach does not begin in the darknet. It begins in plain sight.

Presented by Ascend Agency September 29, 2025

Image: Ascend Agency

For Florida’s wealthiest families, the most devastating breach does not begin in the darknet. It begins in plain sight. A home address tucked inside a property filing. A child’s school appearing in a charity program. A personal number left exposed by a data broker. To an attacker, these are not coincidences, they are entry points.

And sometimes, the consequences run into tens of millions. In one of the most notorious cases, investor Michael Terpin lost $24 million in cryptocurrency after attackers hijacked his mobile number in a SIM swap. His phone went dark mid-flight, and by the time he landed, his accounts were drained.

“Hackers do not need to be geniuses,” says Kevin Leyes, CEO and founder of LeyesX. “If someone connects enough breadcrumbs, they can impersonate you, hijack your accounts, or worse. Our job is to erase those breadcrumbs or reroute them into dead ends.”

From his base in Miami, Kevin leads LeyesX, an AI cybersecurity firm that caters to billionaires, family offices, and celebrities. The company’s signature service delivers what few others promise: digital invisibility. Clients pay anywhere from $10,000 to $100,000 per month for continuous protection.

The New Luxury: Silence Online

Florida’s coastlines are lined with glass towers, golf estates, and private hangars. But the newest status symbol, Leyes argues, is not visible at all. It is the ability to vanish from the digital map.

“You insure your yachts, your art, your planes,” he says. “Now privacy itself has become the new luxury. It is the most fragile asset, and if it gets compromised, everything else can unravel.”

Image: Ascend Agency

LeyesX has a personalized system and cybersecurity experts that scour both the surface and dark web for leaked data, delete or suppress exposure, and deploy decoys that send attackers chasing ghosts. A rapid-response channel with carriers, platforms, and legal teams ensures speed when incidents arise.

More Than Cybersecurity

Leyes’s empire extends beyond cyber defense. With Leyes Media, he builds reputations for corporations, governments, and high-profile individuals. The firm delivers PR campaigns, search engine dominance, and verified profiles that amplify credibility. And through Babys, a creator management agency, he scales models and influencers while shielding them from leaks and impersonation.

“Some clients want to be invisible. Others want to be everywhere,” Leyes explains. “That is why we built a trifecta. Cyber without PR leaves scars exposed. PR without cyber leaves leaks uncontained. Babys merges both for creators who need attention and protection at the same time.”

One of Babys’s top names is Maeurn Smiles, an OnlyFans star with more than five million followers. Babys protects her from leaks and impersonators while engineering her rise in media and partnerships. “If someone already grew half a million followers on their own, that means she understands the business,” Leyes says. “That is when I step in to scale her to millions with the right infrastructure.”

Scarcity as a Product

Unlike mainstream antivirus products, LeyesX and its sister companies are intentionally exclusive. “Scarcity is part of the product,” Leyes says. “Our clients know very few people in the world have access to this level of protection.”

The roster includes undisclosed billionaires, corporations such as Stripe and Crypto.com, and governments including El Salvador and Argentina. El Salvador’s ambassador, Milena Mayorga, has publicly recognized Leyes for his digital advisory work.

Q&A with Kevin Leyes

Sarasota Magazine: What is the most shocking thing you have shown a new client?

Kevin Leyes: “We once presented a report to a billionaire who thought he was invisible. It revealed his private jet tail number connected to flight-tracking apps, along with his children’s school listed in a public record. Anyone could have followed his plane and known exactly where his kids would be. That was a wake-up call.”

Sarasota Magazine: Can you share an example of what can happen when protection is missing?

Kevin Leyes: “The case of Michael Terpin is the clearest example. A SIM swap drained him of $24 million. All it took was his phone signal being cut off for a few hours. That kind of breach is not rare, and it is why we lock carriers and accounts before an attacker even tries. For our clients, the stakes are always in the millions.”

Sarasota Magazine: What small detail can spiral into real danger?

Kevin Leyes: “A recycling bill. A gala photo. Something as ordinary as that can reveal a home address or a family member. Once an attacker has one thread, they can weave it into blackmail, stalking, or even kidnapping attempts. People imagine attacks start in the dark web. In truth, they usually start on the surface.”

Sarasota Magazine: Do ultra-wealthy clients ever request unusual services?

Kevin Leyes: “Yes. Some want to disappear from Google entirely. Others ask us to build full decoy personas, with fake addresses, numbers, and even family trees, so that anyone chasing them spends weeks on false trails. They are not only buying protection. They are buying time and misdirection.”

Sarasota Magazine: What do billionaires fear most?

Kevin Leyes: “It is not always money. Most can recover from losing millions. What they cannot recover is their family’s safety. A leaked school record, a spouse’s health file, or a private address showing up in search results. That is what keeps them awake. And that is why they call us.”

The Next Chapter of Wealth

For Leyes, the evolution of wealth protection is obvious. In the 1990s, the elite armored their cars. In the 2000s, they bought private jets and concierge doctors. In the 2020s, the most coveted asset is digital invisibility.

“The softest target today is not the house or the plane,” he says. “It is the SIM card, the search result, the database entry. That is where attackers start. And that is where we stop them.”

Filed under
Share
Show Comments