DEF CON 23 SECTF Results Webinar


Date: Tuesday, December 1, 2015

Time: 10 am PT/ 1 pm ET

Duration: 1 hour
Presenters: Chris Hadnagy, Chief Human Hacker and Michele Fincher, Chief Influencing Agent, Social-Engineer, LLC

Registration: click here

The Social Engineering Capture the Flag (SECTF) Competition, presented by Social-Engineer LLC, is held annually at the DEF CON hacking conference to generate awareness for the dangers social engineering poses to organizations.  This year’s competition featured 14 contestants from diverse backgrounds and experience levels testing their social engineering abilities against 14 large telecommunication organizations including Comcast, AT&T, Dish Network and Verizon.

Join us for this free webinar to learn:

  •      Which organizations were selected for this year’s competition
  •      Specific attack pretexts leveraged, and which had the most successful outcomes
  •      How the telecommunications industry fared against social engineering attacks
  •      How data from this year’s competition compares to data from previous years and industries
  •      What this year’s data reveals about large organizations’ ability to detect and handle social engineering attacks
  •      Best practices for defending against social engineering attacks

This webinar will consist of a 45-minute presentation, featuring an analysis of results from the official 2015 SECTF Report, and will be followed by a short question and answer forum where attendees will have the opportunity to submit live questions.

To register for this webinar, please click here.

DEF CON 23 – Recap, Updates and More!


We just came out of our coma and realized we haven’t updated all of you who couldn’t make it on what happened at DEF CON 23. So, we pulled ourselves up from the floor and started writing. 

Social Engineering the Classroom


There are those who loved school and those who, like Ferris Bueller, loved getting out of school. You really can’t get much more classic SE than Ferris Bueller’s Day Off, but where the movie focused on the power of manipulation and rapport to escape, SEORG is getting more and more reports of students focused on Continue Reading >

What comes after the huffing and puffing?


In the midst of all the recent articles about information breaches, a trend is emerging. We seem to be hearing more lately that prevention of breaches, while not to be ignored, should not be the sole focus of digital or physical security programs. More news articles, tweets from the infosec community, and even commercial products Continue Reading >