And many other legal, financial, technology, and military clients that prefer to remain private.
SOCIAL ENGINEERING: HOW CYBER ATTACKS START
Social engineering is the act of manipulating someone to do something that may not be in your company's best interest.
The majority of cyber attacks now start with social engineering (BCI CRR, 2017).
The cost of each cyber attack is on the rise, with each cyber attack now costing a company 11.7 million dollars, on average (Ponemon COCC, 2017).
ALL AVAILABLE REMOTELY UNDER COVID-19
SOCIAL ENGINEERING & HACKING WORKSHOPS
SOCIAL ENGINEERING TOOLKIT WORKSHOP
PRETEXTING IN PRACTICE WORKSHOP
VISHING AND PHISHING DEVELOPMENT WORKSHOP
LEARN TO HACK TEAM BUILDING WORKSHOP (ENJOYED BY ALL, NO PREREQS REQUIRED)
LIVE HACKING & SOCIAL ENGINEERING DEMOS
OUR LIVE HACKING AND SOCIAL ENGINEERING DEMOS GIVE YOUR AUDIENCE A CHANCE SEE HACKING IN ACTION! THEY'LL GET TO PARTICIPATE AND ASK QUESTIONS AS THEY WATCH RACHEL GET A TARGET, DEVELOP A PRETEXT, AND ATTACK LIVE -- WITH RECOMMENDATIONS TO EDUCATE THE AUDIENCE AND KEEP THEM SAFE. THIS LIGHTHEARTED AND EDUCATIONAL SESSION IS A CURRENT CLIENT FAVORITE.
CAN BE LIVE DURING A WEBINAR, IN PERSON EVENT, OR MEDIA APPEARANCE.
SOCIAL ENGINEERING OSINT AND PRETEXTING CTF
OUR UNIQUE CTF COMBINES SOCIAL ENGINEERING, OSINT, AND PRETEXTING FOR POINTS! PRIZES ARE INCLUDED. WE OFTEN RUN THIS CTF AT IN-PERSON OR VIRTUAL CONS, COMPANY, OR NON-PROFIT EVENTS. CUSTOMIZABLE FOR THE LEVEL OF EXPERTISE OF THE AUDIENCE -- FROM NON-INFOSEC FOLKS TO EXPERIENCED PRACTITIONERS.
RED TEAM TRAINING
THIS TRAINING IS FOR FOLKS WHO ARE INTERESTED IN LEVELING UP THEIR OSINT, VISHING, PHISHING, AND SOCIAL ENGINEERING SKILLSETS. BY THE END OF THIS TRAINING, ATTENDEES ARE ABLE TO PREPARE, EXECUTE, AND MEASURE THEIR OWN SOCIAL ENGINEERING ATTACKS.
RECOMMENDED FOR: INFOSEC, RED TEAMS, BLUE TEAMS, CUSTOMER SUPPORT, IT SUPPORT, HELPDESK TEAMS, AND MORE.
OUR TRAININGS ARE CUSTOMIZABLE, ROLE-BASED, AND HANDS-ON. BY THE END OF OUR INTERACTIVE TRAINING, ATTENDEES WILL HAVE THE TOOLS THEY NEED TO MITIGATE HUMAN SECURITY RISKS GOING FORWARD. THESE CAN BE ALL-HANDS STYLE OR INDIVIDUALIZED FOR EACH TEAM.
WE ALSO CREATE CUSTOMIZABLE SOCIAL ENGINEERING EDUCATION AND TRAINING VIDEOS.
ASSESSMENT & ADVISING
OPEN SOURCE DATA LEAKAGE REVIEW
AUTHENTICATION PROTOCOL REVIEW TO PREVENT SOCIAL ENGINEERING
TABLETOP OR WARGAMING EXERCISES
SOCIAL ENGINEERING VIA
INCLUDES FULL REPORT, EXECUTIVE BRIEFING AND RECOMMENDATIONS
SOCIAL ENGINEERING KEYNOTES
HOW I WOULD HACK YOU & HOW TO STOP ME
EXPLOITING TRUST - THE HUMAN ELEMENT OF SECURITY
THE HUMAN EXPLOIT
ACCOUNT TAKE OVER IN 1 DAY AND HOW TO STOP ME
THE PATH TO INFOSEC IS NOT ALWAYS LINEAR
THE STATE OF SOCIAL ENGINEERING
INSIDE THE MIND OF A HACKER
PERSONALIZED SALES KICK OFF, CUSTOM KEYNOTES, PANELS, Q&A, AMA AND MORE
We are white hat hackers. We infiltrate companies using Social Engineering and strengthen your first line of defense -- your people. Rachel got her start in the DEF CON Social Engineering Capture the Flag, which she ended up being a winner of 3 years in a row -- 2nd place every time -- consistency is key! Evan handles the technical side of the operation which includes exploit development, hardware hacking, and SocialProof Security Labs.
We would love to work ourselves out of a job by teaching companies and individuals how to spot and shut down social engineering attacks by becoming Politely Paranoid™.