DEFEND AGAINST ATTACKERS WITH ENGAGING SOCIAL ENGINEERING TRAINING, EVENTS, & TESTING.

 
 

OUR CLIENTS

5842f013a6515b1e0ad75b10.png
f_logo_RGB-Blue_144.png
PALO-ALTO_NETWORKS-VENDOR-LOGO.png
Uber_Logo_Black_RGB.png
WhatsApp_Logo_4-removebg-preview.png
Duo-Security.png
580b57fcd9996e24bc43c530.png
Ghost Logo (for light backgrounds) (5).p
DiamondCU.png
2021 Twitter logo - blue.png
CS_Logo_Circle.png
gw_primary_2c_0.png
Lululemon-Symbol.png
569128.png
Trend-Micro-Logo.svg.png
Sans-logo.png
Personal-Capital-Logo.png
ac7820e61ddc1fa492aacb1b75421012ff5b45b2
eff-huge.png
Marie_Claire_logo_wordmark_text.png
logo (1).png
sophos.png
1280px-University_of_Texas_at_Austin_log
Copper_Logo_L_fullcolor_onwhite.png
next-caller.png
agari-largeImage-6-a-946.png
esa-logo-icon.png
cr-logo-web-horizontal-black-500px.png
UreekaLogoColor-noTagline.png

And many other legal, financial, technology, and military clients that prefer to remain private.

SOCIAL ENGINEERING: HOW CYBER ATTACKS START

Social engineering is the act of manipulating someone to do something that may not be in your company's best interest.

The majority of cyber attacks now start with social engineering (BCI CRR, 2017).

The cost of each cyber attack is on the rise, with each cyber attack now costing a company 11.7 million dollars, on average (Ponemon COCC, 2017).

 
 

OUR SERVICES

 

ALL AVAILABLE REMOTELY UNDER COVID-19

5

SOCIAL ENGINEERING & HACKING WORKSHOPS

 

  • SOCIAL ENGINEERING TOOLKIT WORKSHOP 

  • PRETEXTING IN PRACTICE WORKSHOP

  • VISHING AND PHISHING DEVELOPMENT WORKSHOP

  • LEARN TO HACK TEAM BUILDING WORKSHOP (ENJOYED BY ALL, NO PREREQS REQUIRED)

6

LIVE HACKING & SOCIAL ENGINEERING DEMOS

OUR LIVE HACKING AND SOCIAL ENGINEERING DEMOS GIVE YOUR AUDIENCE A CHANCE SEE HACKING IN ACTION! THEY'LL GET TO PARTICIPATE AND ASK QUESTIONS AS THEY WATCH RACHEL GET A TARGET, DEVELOP A PRETEXT, AND ATTACK LIVE -- WITH RECOMMENDATIONS TO EDUCATE THE AUDIENCE AND KEEP THEM SAFE. THIS LIGHTHEARTED AND EDUCATIONAL SESSION IS A CURRENT CLIENT FAVORITE.

CAN BE LIVE DURING A WEBINAR, IN PERSON EVENT, OR MEDIA APPEARANCE.

7

SOCIAL ENGINEERING OSINT AND PRETEXTING CTF

 

OUR UNIQUE CTF COMBINES SOCIAL ENGINEERING, OSINT, AND PRETEXTING FOR POINTS! PRIZES ARE INCLUDED. WE OFTEN RUN THIS CTF AT IN-PERSON OR VIRTUAL CONS, COMPANY, OR NON-PROFIT EVENTS. CUSTOMIZABLE FOR THE LEVEL OF EXPERTISE OF THE AUDIENCE -- FROM NON-INFOSEC FOLKS TO EXPERIENCED PRACTITIONERS. 

8

RED TEAM TRAINING

 

 

THIS TRAINING IS FOR FOLKS WHO ARE INTERESTED IN LEVELING UP THEIR OSINT, VISHING, PHISHING, AND SOCIAL ENGINEERING SKILLSETS. BY THE END OF THIS TRAINING, ATTENDEES ARE ABLE TO PREPARE, EXECUTE, AND MEASURE THEIR OWN SOCIAL ENGINEERING ATTACKS.

RECOMMENDED FOR: INFOSEC, RED TEAMS, BLUE TEAMS, CUSTOMER SUPPORT, IT SUPPORT, HELPDESK TEAMS, AND MORE.

1

 SOCIAL ENGINEERING

TRAINING

OUR TRAININGS ARE CUSTOMIZABLE, ROLE-BASED, AND HANDS-ON. BY THE END OF OUR INTERACTIVE TRAINING, ATTENDEES WILL HAVE THE TOOLS THEY NEED TO MITIGATE HUMAN SECURITY RISKS GOING FORWARD. THESE CAN BE ALL-HANDS STYLE OR INDIVIDUALIZED FOR EACH TEAM.

WE ALSO CREATE CUSTOMIZABLE SOCIAL ENGINEERING EDUCATION AND TRAINING VIDEOS.

2

VULNERABILITY

ASSESSMENT & ADVISING

 

  • OPEN SOURCE DATA LEAKAGE REVIEW

  • AUTHENTICATION PROTOCOL REVIEW TO PREVENT SOCIAL ENGINEERING

  • TABLETOP OR WARGAMING EXERCISES

  • EXECUTIVE BRIEFINGS

3

 PENETRATION

TESTING

 

SOCIAL ENGINEERING VIA

  • PHONE

  • EMAIL

  • CHAT

  • SMS

  • SOCIAL MEDIA

INCLUDES FULL REPORT, EXECUTIVE BRIEFING AND RECOMMENDATIONS

4

SOCIAL ENGINEERING KEYNOTES

  • HOW I WOULD HACK YOU & HOW TO STOP ME

  • EXPLOITING TRUST - THE HUMAN ELEMENT OF SECURITY

  • THE HUMAN EXPLOIT

  • ACCOUNT TAKE OVER IN 1 DAY AND HOW TO STOP ME

  • THE PATH TO INFOSEC IS NOT ALWAYS LINEAR

  • THE STATE OF SOCIAL ENGINEERING

  • INSIDE THE MIND OF A HACKER

  • PERSONALIZED SALES KICK OFF, CUSTOM KEYNOTES, PANELS, Q&A, AMA AND MORE

OUR EDUCATION

METHOD

01 / FAST

Our talks, training, workshops and webinars are customized for your company or conference. We've done Social Engineering events in as little as 30 minutes, trainings in 60 minutes, and we have taken deep dives for a full day. You let us know how much time you have, and we'll get your group in the know quick.

02 / MEMORABLE

It's hard to forget hearing how a hacker compromises a company. This type of event tends to stick with your audience, especially when they get to try it themselves. No need to rely on a burner phone though -- our Social Engineering events keep your audience in the know, without all the doom and gloom.

03 / FUN 

Our Social Engineering events aren't a typical lecture. We educate your group on what to know, so they can jump into the shoes of a hacker and try it themselves. We keep it lighthearted, fresh, up-to-date, and just competitive enough that they'll stay engaged the entire time.

ABOUT US

OUR STORY

We are white hat hackers. We infiltrate companies using Social Engineering and strengthen your first line of defense -- your people. Rachel got her start in the DEF CON Social Engineering Capture the Flag, which she ended up being a winner of 3 years in a row -- 2nd place every time -- consistency is key! Evan handles the technical side of the operation which includes exploit development, hardware hacking, and SocialProof Security Labs.

OUR VISION

We would love to work ourselves out of a job by teaching companies and individuals how to spot and shut down social engineering attacks by becoming Politely Paranoid

 
 
 
IMG_4856 2
IMG_4550 2
IMG_4674
Screen Shot 2017-10-19 at 5.53.25 PM
IMG_8945
0BBB8C3F-86CA-4A31-849F-77B9B794F481-583
IMG_1987
Screen Shot 2017-10-19 at 5.57.41 PM
Screen Shot 2017-12-10 at 5.15.45 PM
IMG_7423
Screen Shot 2017-10-19 at 5.56.43 PM
DSCN2375-768x576
IMG_0762
Screen Shot 2017-10-19 at 6.07.36 PM
 

CONTACT US

Please fill in your contact details below if you would like more information on our talks, trainings, or webinars:

Success! Message received.

You can also join our mailing list here to find out first about our public social engineering trainings, events and workshops before they sell out.