DEFEND AGAINST CYBER CRIMINALS WITH ENGAGING SECURITY AWARENESS VIDEOS, TRAINING, TALKS, & TESTING
And many other legal, financial, medical, and technology clients that prefer to remain private.
HOW CYBER ATTACKS START
Social engineering is the act of manipulating people to gain unauthorized access at an organization. This often results in a data breach, account takeover, or financial loss and brand trust issues.
Social engineering was named the #1 threat to organizations in 2021 (ISACA, 2021 State of Cybersecurity Survey)
Social engineering is costly. On average Social Engineering attacks cost organizations $4.47 M per attack (IBM, 2021 Cost of Data Breach Report)
ALL AVAILABLE REMOTELY UNDER COVID-19
SOCIAL ENGINEERING PROTOCOL
MANY ORGS ARE USING OUTDATED METHODS TO VERIFY THE AUTHENTICITY OF REQUESTS INTERNALLY AND EXTERNALLY WHICH ALLOWS CRIMINALS TO HACK
THIS HANDS-ON WORKSHOP FOCUSES ON UPDATING IDENTITY VERIFICATION METHODS USED TO REDUCE THE RISK OF ACCOUNT TAKEOVER, RANSOMWARE, FINANCIAL & DATA LOSS.
LIVE HACKING & SOCIAL ENGINEERING DEMOS
WATCH RACHEL GET A TARGET, DEVELOP A PRETEXT, AND PREPARE A SOCIAL ENGINEERING CAMPAIGN LIVE -- WITH RECOMMENDATIONS TO EDUCATE THE AUDIENCE AND KEEP THEM SAFE. THIS LIGHTHEARTED AND EDUCATIONAL SESSION IS A CURRENT CLIENT FAVORITE.
CAN BE LIVE DURING A WEBINAR, IN PERSON EVENT, OR MEDIA APPEARANCE.
SOCIAL ENGINEERING & HACKING WORKSHOPS
SOCIAL ENGINEERING OSINT AND PRETEXTING CTF
VISHING AND PHISHING DEVELOPMENT WORKSHOP
HACKING COMPETITION TEAM BUILDING WORKSHOP (ENJOYED BY ALL, NO PREREQS REQUIRED)
THIS TRAINING IS FOR TEAMS WHO ARE INTERESTED IN LEVELING UP THEIR OSINT, VISHING, PHISHING, PRETEXTING AND SOCIAL ENGINEERING SKILLSETS.
RECOMMENDED FOR: INFOSEC, RED TEAMS, BLUE TEAMS, CUSTOMER SUPPORT, IT SUPPORT, HELPDESK TEAMS, AND MORE.
LIVE SOCIAL ENGINEERING
OUR TRAININGS ARE CUSTOMIZABLE, ROLE-BASED, AND HANDS-ON
BY THE END OF OUR INTERACTIVE TRAINING, ATTENDEES WILL HAVE THE TOOLS THEY NEED TO MITIGATE HUMAN SECURITY RISKS GOING FORWARD
THESE TRAININGS ARE CUSTOMIZED FOR EACH ORG WITH ALL-HANDS STYLE EVENTS OR INDIVIDUALIZED TEAM EVENTS
*NEW* MUSIC & SPOKEN SECURITY AWARENESS TRAINING VIDEOS
SHORT (2-3 MINUTE) MODULES COVERING TOPICS LIKE PHISHING, RANSOMWARE/MALWARE, PASSWORDS, SOCIAL MEDIA, SOCIAL ENGINEERING, MFA, AND MORE
INCLUDES HACKING DEMONSTRATIONS TO BRING THE RECOMMENDATIONS TO LIFE
THE MUSIC AND SPOKEN WORD CONTENT LIBRARY WILL BE CONTINUALLY UPDATED FOR FRESH ONBOARDING AND MONTHLY CONTENT
THESE SCORM COMPATIBLE VIDEOS ARE CUSTOMIZABLE WITH TAILORED INTROS, KNOWLEDGE CHECK QUIZZES, TAKEAWAYS, LOGOS, AND MORE
ENGINEERING & SECURITY AWARENESS KEYNOTES
INSIDE THE MIND OF A HACKER
HOW I WOULD HACK YOU & HOW TO STOP ME
EXPLOITING TRUST - THE HUMAN ELEMENT OF SECURITY
THE HUMAN EXPLOIT
ACCOUNT TAKE OVER IN 1 DAY AND HOW TO STOP ME
THE STATE OF SOCIAL ENGINEERING
PERSONALIZED SALES KICK OFF, CUSTOM KEYNOTES, PANELS, Q&A, AMA & MORE
SOCIAL ENGINEERING PENETRATION
SOCIAL ENGINEERING VIA
INCLUDES FULL REPORT, EXECUTIVE BRIEFING AND RECOMMENDATIONS
01 / FAST
Our videos, talks, training, workshops and webinars are customized for your company or conference. Our video training modules keep your team's attention with 2-3 minute modules and we've executed Social Engineering events in as little as 30 minutes, trainings in 60 minutes, and we have taken deep dives for a full day. You let us know how much time you have, and we'll get your group in the know quick.
02 / CATCHY
It's hard to forget hearing how a hacker compromises a company and our videos, training, and events tend to stick with your audience, especially when they get to step into the shoes of a hacker while they're learning. Our video training modules are extra catchy with music and choruses that will stick in your team's mind long after the video is done playing. No need to rely on a burner phone though -- our Social Engineering videos and events keep your audience in the know, without all the doom and gloom.
03 / FUN
Our Social Engineering videos, training, and events aren't a typical lecture. We educate your group on what to know, and keep our content role-based so it relates to their everyday personal and professional life. We keep our interactive videos and programs lighthearted, fresh, up-to-date, and just competitive enough that audiences stay engaged the entire time.
We are friendly hackers. We infiltrate companies using Social Engineering (the human element of security) and strengthen your first line of defense -- your people. Rachel got her start in the DEF CON social engineering competition, which she ended up being a 2nd place winner of 3 years in a row! Evan handles the technical side of the operation which includes exploit development, hardware hacking, and more.
We would love to work ourselves out of a job by teaching companies and individuals how to spot and shut down social engineering attacks by becoming Politely Paranoid.