DEFEND AGAINST ATTACKERS WITH ENGAGING SOCIAL ENGINEERING TRAINING, EVENTS, & TESTING.

 
 

OUR CLIENTS

And many other legal, financial, technology, and military clients that prefer to remain private.

SOCIAL ENGINEERING: HOW CYBER ATTACKS START

Social engineering is the act of manipulating someone to do something that may not be in your company's best interest.

The majority of cyber attacks now start with social engineering (BCI CRR, 2017).

The cost of each cyber attack is on the rise, with each cyber attack now costing a company 11.7 million dollars, on average (Ponemon COCC, 2017).

 
 

OUR SERVICES

 

ALL AVAILABLE REMOTELY UNDER COVID-19

5

SOCIAL ENGINEERING & HACKING WORKSHOPS

 

  • SOCIAL ENGINEERING TOOLKIT WORKSHOP 

  • PRETEXTING IN PRACTICE WORKSHOP

  • VISHING AND PHISHING DEVELOPMENT WORKSHOP

  • LEARN TO HACK TEAM BUILDING WORKSHOP (ENJOYED BY ALL, NO PREREQS REQUIRED)

6

LIVE HACKING & SOCIAL ENGINEERING DEMOS

OUR LIVE HACKING AND SOCIAL ENGINEERING DEMOS GIVE YOUR AUDIENCE A CHANCE SEE HACKING IN ACTION! THEY'LL GET TO PARTICIPATE AND ASK QUESTIONS AS THEY WATCH RACHEL GET A TARGET, DEVELOP A PRETEXT, AND ATTACK LIVE -- WITH RECOMMENDATIONS TO EDUCATE THE AUDIENCE AND KEEP THEM SAFE. THIS LIGHTHEARTED AND EDUCATIONAL SESSION IS A CURRENT CLIENT FAVORITE.

CAN BE LIVE DURING A WEBINAR, IN PERSON EVENT, OR MEDIA APPEARANCE.

7

SOCIAL ENGINEERING OSINT AND PRETEXTING CTF

 

OUR UNIQUE CTF COMBINES SOCIAL ENGINEERING, OSINT, AND PRETEXTING FOR POINTS! PRIZES ARE INCLUDED. WE OFTEN RUN THIS CTF AT IN-PERSON OR VIRTUAL CONS, COMPANY, OR NON-PROFIT EVENTS. CUSTOMIZABLE FOR THE LEVEL OF EXPERTISE OF THE AUDIENCE -- FROM NON-INFOSEC FOLKS TO EXPERIENCED PRACTITIONERS. 

8

RED TEAM TRAINING

 

 

THIS TRAINING IS FOR FOLKS WHO ARE INTERESTED IN LEVELING UP THEIR OSINT, VISHING, PHISHING, AND SOCIAL ENGINEERING SKILLSETS. BY THE END OF THIS TRAINING, ATTENDEES ARE ABLE TO PREPARE, EXECUTE, AND MEASURE THEIR OWN SOCIAL ENGINEERING ATTACKS.

RECOMMENDED FOR: INFOSEC, RED TEAMS, BLUE TEAMS, CUSTOMER SUPPORT, IT SUPPORT, HELPDESK TEAMS, AND MORE.

1

 SOCIAL ENGINEERING

TRAINING

OUR TRAININGS ARE CUSTOMIZABLE, ROLE-BASED, AND HANDS-ON. BY THE END OF OUR INTERACTIVE TRAINING, ATTENDEES WILL HAVE THE TOOLS THEY NEED TO MITIGATE HUMAN SECURITY RISKS GOING FORWARD. THESE CAN BE ALL-HANDS STYLE OR INDIVIDUALIZED FOR EACH TEAM.

WE ALSO CREATE CUSTOMIZABLE SOCIAL ENGINEERING EDUCATION AND TRAINING VIDEOS.

2

VULNERABILITY

ASSESSMENT & ADVISING

 

  • OPEN SOURCE DATA LEAKAGE REVIEW

  • AUTHENTICATION PROTOCOL REVIEW TO PREVENT SOCIAL ENGINEERING

  • TABLETOP OR WARGAMING EXERCISES

  • EXECUTIVE BRIEFINGS

3

 PENETRATION

TESTING

 

SOCIAL ENGINEERING VIA

  • PHONE

  • EMAIL

  • CHAT

  • SMS

  • SOCIAL MEDIA

INCLUDES FULL REPORT, EXECUTIVE BRIEFING AND RECOMMENDATIONS

4

SOCIAL ENGINEERING KEYNOTES

  • HOW I WOULD HACK YOU & HOW TO STOP ME

  • EXPLOITING TRUST - THE HUMAN ELEMENT OF SECURITY

  • THE HUMAN EXPLOIT

  • ACCOUNT TAKE OVER IN 1 DAY AND HOW TO STOP ME

  • THE PATH TO INFOSEC IS NOT ALWAYS LINEAR

  • THE STATE OF SOCIAL ENGINEERING

  • INSIDE THE MIND OF A HACKER

  • PERSONALIZED SALES KICK OFF, CUSTOM KEYNOTES, PANELS, Q&A, AMA AND MORE

OUR EDUCATION

METHOD

01 / FAST

Our talks, training, workshops and webinars are customized for your company or conference. We've done Social Engineering events in as little as 30 minutes, trainings in 60 minutes, and we have taken deep dives for a full day. You let us know how much time you have, and we'll get your group in the know quick.

02 / MEMORABLE

It's hard to forget hearing how a hacker compromises a company. This type of event tends to stick with your audience, especially when they get to try it themselves. No need to rely on a burner phone though -- our Social Engineering events keep your audience in the know, without all the doom and gloom.

03 / FUN 

Our Social Engineering events aren't a typical lecture. We educate your group on what to know, so they can jump into the shoes of a hacker and try it themselves. We keep it lighthearted, fresh, up-to-date, and just competitive enough that they'll stay engaged the entire time.

ABOUT US

OUR STORY

We are white hat hackers. We infiltrate companies using Social Engineering and strengthen your first line of defense -- your people. Rachel got her start in the DEF CON Social Engineering Capture the Flag, which she ended up being a winner of 3 years in a row -- 2nd place every time -- consistency is key! Evan handles the technical side of the operation which includes exploit development, hardware hacking, and SocialProof Security Labs.

OUR VISION

We would love to work ourselves out of a job by teaching companies and individuals how to spot and shut down social engineering attacks by becoming Politely Paranoid™. 

 
 
 
IMG_4856 2
IMG_4550 2
IMG_4674
Screen Shot 2017-10-19 at 5.53.25 PM
IMG_8945
0BBB8C3F-86CA-4A31-849F-77B9B794F481-583
IMG_1987
Screen Shot 2017-10-19 at 5.57.41 PM
Screen Shot 2017-12-10 at 5.15.45 PM
IMG_7423
Screen Shot 2017-10-19 at 5.56.43 PM
DSCN2375-768x576
Screen Shot 2017-10-19 at 5.57.25 PM
IMG_0762
Screen Shot 2017-10-19 at 6.07.36 PM
 

CONTACT US

Please fill in your contact details below if you would like more information on our talks, trainings, or webinars:
You can also join our mailing list here to find out first about our public social engineering trainings, events and workshops before they sell out.
 
LINKS
ADDRESS

SocialProof Security LLC

2443 Fillmore Street

#380-6871

San Francisco, CA 94115

FOLLOW 
  • Twitter Social Icon
new-mailchimp-logo-vertical-black.png

© 2020 by SocialProof Security LLC