DEFEND AGAINST ATTACKERS WITH ENGAGING SOCIAL ENGINEERING TRAINING, EVENTS, & TESTING.
And many other legal, financial, medical, and technology clients that prefer to remain private.
SOCIAL ENGINEERING: HOW CYBER ATTACKS START
Social engineering is the act of manipulating someone to do something that may not be in your company's best interest.
The majority of cyber attacks now start with social engineering (BCI CRR, 2017).
The cost of each cyber attack is on the rise, with each cyber attack now costing a company 11.7 million dollars, on average (Ponemon COCC, 2017).
ALL AVAILABLE REMOTELY UNDER COVID-19
SOCIAL ENGINEERING & HACKING WORKSHOPS
SOCIAL ENGINEERING TOOLKIT WORKSHOP
PRETEXTING IN PRACTICE WORKSHOP
VISHING AND PHISHING DEVELOPMENT WORKSHOP
LEARN TO HACK TEAM BUILDING WORKSHOP (ENJOYED BY ALL, NO PREREQS REQUIRED)
LIVE HACKING & SOCIAL ENGINEERING DEMOS
OUR LIVE HACKING AND SOCIAL ENGINEERING DEMOS GIVE YOUR AUDIENCE A CHANCE SEE HACKING IN ACTION! THEY'LL GET TO PARTICIPATE AND ASK QUESTIONS AS THEY WATCH RACHEL GET A TARGET, DEVELOP A PRETEXT, AND ATTACK LIVE -- WITH RECOMMENDATIONS TO EDUCATE THE AUDIENCE AND KEEP THEM SAFE. THIS LIGHTHEARTED AND EDUCATIONAL SESSION IS A CURRENT CLIENT FAVORITE.
CAN BE LIVE DURING A WEBINAR, IN PERSON EVENT, OR MEDIA APPEARANCE.
SOCIAL ENGINEERING OSINT AND PRETEXTING CTF
OUR UNIQUE CTF COMBINES SOCIAL ENGINEERING, OSINT, AND PRETEXTING FOR POINTS! PRIZES ARE INCLUDED. WE OFTEN RUN THIS CTF AT IN-PERSON OR VIRTUAL CONS, COMPANY, OR NON-PROFIT EVENTS. CUSTOMIZABLE FOR THE LEVEL OF EXPERTISE OF THE AUDIENCE -- FROM NON-INFOSEC FOLKS TO EXPERIENCED PRACTITIONERS.
RED TEAM TRAINING
THIS TRAINING IS FOR FOLKS WHO ARE INTERESTED IN LEVELING UP THEIR OSINT, VISHING, PHISHING, AND SOCIAL ENGINEERING SKILLSETS. BY THE END OF THIS TRAINING, ATTENDEES ARE ABLE TO PREPARE, EXECUTE, AND MEASURE THEIR OWN SOCIAL ENGINEERING ATTACKS.
RECOMMENDED FOR: INFOSEC, RED TEAMS, BLUE TEAMS, CUSTOMER SUPPORT, IT SUPPORT, HELPDESK TEAMS, AND MORE.
OUR TRAININGS ARE CUSTOMIZABLE, ROLE-BASED, AND HANDS-ON. BY THE END OF OUR INTERACTIVE TRAINING, ATTENDEES WILL HAVE THE TOOLS THEY NEED TO MITIGATE HUMAN SECURITY RISKS GOING FORWARD. THESE CAN BE ALL-HANDS STYLE OR INDIVIDUALIZED FOR EACH TEAM.
WE ALSO CREATE CUSTOMIZABLE SOCIAL ENGINEERING EDUCATION AND TRAINING VIDEOS.
ASSESSMENT & ADVISING
OPEN SOURCE DATA LEAKAGE REVIEW
AUTHENTICATION PROTOCOL REVIEW TO PREVENT SOCIAL ENGINEERING
TABLETOP OR WARGAMING EXERCISES
SOCIAL ENGINEERING VIA
INCLUDES FULL REPORT, EXECUTIVE BRIEFING AND RECOMMENDATIONS
SOCIAL ENGINEERING KEYNOTES
HOW I WOULD HACK YOU & HOW TO STOP ME
EXPLOITING TRUST - THE HUMAN ELEMENT OF SECURITY
THE HUMAN EXPLOIT
ACCOUNT TAKE OVER IN 1 DAY AND HOW TO STOP ME
THE PATH TO INFOSEC IS NOT ALWAYS LINEAR
THE STATE OF SOCIAL ENGINEERING
INSIDE THE MIND OF A HACKER
PERSONALIZED SALES KICK OFF, CUSTOM KEYNOTES, PANELS, Q&A, AMA AND MORE
01 / FAST
Our talks, training, workshops and webinars are customized for your company or conference. We've done Social Engineering events in as little as 30 minutes, trainings in 60 minutes, and we have taken deep dives for a full day. You let us know how much time you have, and we'll get your group in the know quick.
02 / MEMORABLE
It's hard to forget hearing how a hacker compromises a company. This type of event tends to stick with your audience, especially when they get to try it themselves. No need to rely on a burner phone though -- our Social Engineering events keep your audience in the know, without all the doom and gloom.
03 / FUN
Our Social Engineering events aren't a typical lecture. We educate your group on what to know, so they can jump into the shoes of a hacker and try it themselves. We keep it lighthearted, fresh, up-to-date, and just competitive enough that they'll stay engaged the entire time.
We are white hat hackers. We infiltrate companies using Social Engineering and strengthen your first line of defense -- your people. Rachel got her start in the DEF CON Social Engineering Capture the Flag, which she ended up being a winner of 3 years in a row -- 2nd place every time -- consistency is key! Evan handles the technical side of the operation which includes exploit development, hardware hacking, and SocialProof Security Labs.
We would love to work ourselves out of a job by teaching companies and individuals how to spot and shut down social engineering attacks by becoming Politely Paranoid.