top of page

DEFEND AGAINST CYBER CRIMINALS WITH ENGAGING SECURITY AWARENESS VIDEOS, TRAINING, TALKS, & TESTING

Anchor 2
NEW: SocialProof Security Trailer for Training Video Library

NEW: SocialProof Security Trailer for Training Video Library

Our Clients

OUR CLIENTS

5842f013a6515b1e0ad75b10.png
PALO-ALTO_NETWORKS-VENDOR-LOGO.png
Uber_Logo_Black_RGB.png
WhatsApp_Logo_4-removebg-preview.png
Duo-Security.png
Google-logo-1.png
Lululemon-Symbol.png
pci-security-standards-council-logo-AE4C9F6012-seeklogo.com.png
cs-national-grid-logo-tile.png.imgo_.png
logo (1).png
580b57fcd9996e24bc43c530.png
meta-logo.png
2021 Twitter logo - blue.png
Ghost Logo (for light backgrounds) (5).p
Kimberly-Clark_logo.svg.png
prudential-7-logo.png
CS_Logo_Circle.png
Medtronic-Logo.png
sophos.png
1280px-University_of_Texas_at_Austin_log
cisco-logo-transparent-1024x542.png
download (2).png
1200px-Akamai_logo.svg.png
Personal-Capital-Logo.png
1200px-Otto_Bock_logo.svg.png
Northwest Logo.png
eff-huge.png
DiamondCU.png
ac7820e61ddc1fa492aacb1b75421012ff5b45b2
Logo_ESA_blue_circle_TM-removebg-preview.png
gw_primary_2c_0.png
cr-logo-web-horizontal-black-500px.png
Sans-logo.png
Copper_Logo_L_fullcolor_onwhite.png
Trend-Micro-Logo.svg.png

And many other legal, financial, medical, and technology clients that prefer to remain private.

SOCIAL ENGINEERING:

HOW CYBER ATTACKS START

Social engineering is the act of manipulating people to gain unauthorized access at an organization. This often results in a data breach, account takeover, or financial loss and brand trust issues.

Social engineering was named the #1 threat to organizations (ISACA, State of Cybersecurity Survey)

Social engineering is costly. On average Social Engineering attacks cost organizations $4.47 M per attack (IBM, Cost of Data Breach Report)

Social Engineering: How Cyber Attacks Start
Our Services

OUR SERVICES
 

5

SOCIAL ENGINEERING PROTOCOL
UPDATE WORKSHOP

 

  • MANY ORGS ARE USING OUTDATED METHODS TO VERIFY THE AUTHENTICITY OF REQUESTS INTERNALLY AND EXTERNALLY WHICH ALLOWS CRIMINALS TO HACK
     

  • THIS HANDS-ON WORKSHOP FOCUSES ON UPDATING IDENTITY VERIFICATION METHODS USED TO REDUCE THE RISK OF ACCOUNT TAKEOVER, RANSOMWARE, FINANCIAL & DATA LOSS.

6

LIVE HACKING, AI DEEPFAKE & SOCIAL ENGINEERING DEMOS
 

  • WATCH RACHEL GET A TARGET, DEVELOP A PRETEXT, AND PREPARE A SOCIAL ENGINEERING CAMPAIGN LIVE -- WITH RECOMMENDATIONS TO EDUCATE THE AUDIENCE AND KEEP THEM SAFE. THIS LIGHTHEARTED AND EDUCATIONAL SESSION IS A CURRENT CLIENT FAVORITE.

  • GET TO SEE A LIVE AI DEEPFAKE DEMONSTRATION

  • CAN BE LIVE DURING A WEBINAR, IN PERSON EVENT, OR MEDIA APPEARANCE.

7

SOCIAL ENGINEERING & HACKING WORKSHOPS

 

  • SOCIAL ENGINEERING OSINT AND PRETEXTING CTF

  • VISHING AND PHISHING DEVELOPMENT WORKSHOP

  • HACKING COMPETITION TEAM BUILDING WORKSHOP (ENJOYED BY ALL, NO PREREQS REQUIRED)

8

RED TEAM

TRAINING
 

  •  THIS TRAINING IS FOR TEAMS WHO ARE INTERESTED IN LEVELING UP THEIR OSINT, VISHING, PHISHING, PRETEXTING AND SOCIAL ENGINEERING SKILLSETS. 

  • RECOMMENDED FOR: INFOSEC, RED TEAMS, BLUE TEAMS, CUSTOMER SUPPORT, IT SUPPORT, HELPDESK TEAMS, AND MORE.

1

LIVE SOCIAL ENGINEERING 
PREVENTION 
TRAINING

 

  • OUR TRAININGS ARE CUSTOMIZABLE, ROLE-BASED, AND HANDS-ON

  • BY THE END OF OUR INTERACTIVE TRAINING, ATTENDEES WILL HAVE THE TOOLS THEY NEED TO MITIGATE HUMAN SECURITY RISKS GOING FORWARD

  • THESE TRAININGS ARE CUSTOMIZED FOR EACH ORG WITH ALL-HANDS STYLE EVENTS OR INDIVIDUALIZED TEAM EVENTS


     




2

MUSIC & SPOKEN SECURITY AWARENESS TRAINING VIDEOS

 

  • SHORT (2-3 MINUTE) MODULES COVERING TOPICS LIKE PHISHING, RANSOMWARE/MALWARE, PASSWORDS, SOCIAL MEDIA, SOCIAL ENGINEERING, MFA, AND MORE

  • INCLUDES HACKING DEMONSTRATIONS TO BRING THE RECOMMENDATIONS TO LIFE 

  • ONE NEW VIDEO IS RELEASED QUARTERLY TO ENSURE FRESH ONBOARDING AND ONGOING TRAINING

  • THESE SCORM PACKAGES AND VIDEOS ARE CUSTOMIZABLE WITH TAILORED INTROS/BRANDING, KNOWLEDGE CHECK QUIZZES, TAKEAWAYS, LOGOS, TRANSLATED SUBTITLES AND MORE

3

SOCIAL

ENGINEERING & SECURITY AWARENESS KEYNOTES

  • INSIDE THE MIND OF A HACKER

  • HOW I WOULD HACK YOU & HOW TO STOP ME

  • EXPLOITING TRUST - THE HUMAN ELEMENT OF SECURITY

  • THE HUMAN EXPLOIT

  • ACCOUNT TAKE OVER IN 1 DAY AND HOW TO STOP ME

  • THE STATE OF SOCIAL ENGINEERING

  • PERSONALIZED SALES KICK OFF, CUSTOM KEYNOTES, PANELS, Q&A, AMA & MORE

4

 SOCIAL ENGINEERING PENETRATION

TESTING

 

SOCIAL ENGINEERING VIA

  • PHONE

  • EMAIL

  • CHAT

  • SMS

  • SOCIAL MEDIA

  • ACCOUNT TAKEOVER

INCLUDES FULL REPORT, EXECUTIVE BRIEFING AND RECOMMENDATIONS

OUR EDUCATION

METHOD

01 / FAST

Our videos, talks, training, workshops and webinars are customized for your company or conference.  Our video training modules keep your team's attention with 2-3 minute modules and we've executed Social Engineering events in as little as 30 minutes, trainings in 60 minutes, and we have taken deep dives for a full day. You let us know how much time you have, and we'll get your group in the know quick.

02 / CATCHY

It's hard to forget hearing how a hacker compromises a company and our videos, training, and events tend to stick with your audience, especially when they get to step into the shoes of a hacker while they're learning. Our video training modules are extra catchy with music and choruses that will stick in your team's mind long after the video is done playing. No need to rely on a burner phone though -- our Social Engineering videos and events keep your audience in the know, without all the doom and gloom.

03 / FUN 

Our Social Engineering videos, training, and events aren't a typical lecture. We educate your group on what to know, and keep our content role-based so it relates to their everyday personal and professional life. We keep our interactive videos and programs lighthearted, fresh, up-to-date, and just competitive enough that audiences stay engaged the entire time.

ABOUT US

OUR STORY

We are friendly hackers. We infiltrate companies using Social Engineering (the human element of security) and strengthen your first line of defense -- your people. Rachel got her start in the DEF CON social engineering competition, which she ended up being a 2nd place winner of 3 years in a row! Evan handles the technical side of the operation which includes exploit development, hardware hacking, and more.

OUR VISION

We would love to work ourselves out of a job by teaching companies and individuals how to spot and shut down social engineering attacks by becoming Politely Paranoid

Our Method
About Us
Photos
IMG_4550 4
IMG_0762
IMG_4674
SXSWPanelSizedDown
IMG_4856 2
SXSWPodcastStudio
Screen Shot 2017-10-19 at 5.53.25 PM
IMG_8945
Screen Shot 2022-09-01 at 8.19.15 AM
0BBB8C3F-86CA-4A31-849F-77B9B794F481-583
IMG_6953
IMG_1987
DSC03219
IMG_7423
Screen Shot 2017-10-19 at 5.56.43 PM
IMG_1168
Screen Shot 2017-12-10 at 5.15.45 PM
Screen Shot 2017-10-19 at 6.07.36 PM
CE1F89A7-2019-45A0-92FF-5CFC2A6F940F
Featured

CONTACT US

Please fill in your contact details below if you would like more information about our video library, talks, or training:

Success! Message received.

You can also join our mailing list here to find out first about our public social engineering trainings, events and workshops before they sell out.
Contact Us
Frame 15432_edited.jpg

Check out my brand new eBook

The hacker's guide to securing your org

In this eBook you'll learn:

  • How cyber criminals use principles of persuasion to manipulate

  • How to catch attackers in the act

  • Threat modeling 101

  • AI and and the future of hacking and defense

etsyshop.png

Gear store

Want some gear to show off how Politely Paranoid you are? Check out our Etsy store. We've got stickers, shirts, hacker hoodies and more.

Store
bottom of page