Hacking with Hackers: Uncovering the Human Element of Cybercrime

Hackers Rachel Tobac and James Linton share how to better protect against socially-engineered attacks. Watch the on-demand webinar from Vision 2023.

From the Nigerian Prince scams of the late 1990s to the sophisticated invoice fraud of today, one thing remains the same: attackers know how to take advantage of human emotions. Whether the goal is to steal thousands from your Grandma Sue or millions from a tech giant like Google, social engineering tactics typically play a role.

Rachel Tobac and James Linton are two well-known hackers who are both intimately familiar with how social engineering can be used for evil. Rachel is best known for her sophisticated vishing attacks at DEFCON, while James gained notoriety for a successful email attack on Eric Trump.

In this recorded session from Vision 2023, Rachel and James discuss:

  • How they became successful hackers, with stories about their most notorious attacks

  • What information hackers can uncover, both on the impersonated victim and the target, to run their attacks

  • What security leaders can do to better protect their employees and their organizations

  • How the social engineering landscape is changing as we all become a little more aware of the threat

Watch the webinar to see why social engineering is both the threat of the present and of the future.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)².

Hacking with Hackers: Uncovering the Human Element of Cybercrime

Watch Now

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Resources

B NFP
See how NFP moved beyond the limitations of the SEG to simplify and improve their email security.
Watch Now
B 5 15 23 Saskatoon PS
Saskatchewan’s largest school division uses Abnormal to detect and auto-remediate advanced attacks, reclaim time, and save money.
Read More
B CISO Fireside Chat OD Webinar
Cybersecurity leaders from Rubrik, Noname, Wiz, and Abnormal Security share their experiences and insights in this on-demand CISO fireside chat.
Watch Now
B 1500x1500 Rubicon Case Study L1 R1
Abnormal has eliminated the waste of reviewing copious email alerts and false positives, allowing the Rubicon team to focus on more strategic initiatives.
Read More
B TAG Cyber Buyers Guide
Download the buyer's guide for valuable advice on effectively securing cloud email environments and choosing the right cloud email security solutions provider.
Download Now
B Video Redefining Cloud Email Security
Abnormal's Head of Marketing, Arun Singh, explores the new solutions and strategies needed for the detection of and defense against advanced email attacks.
Watch Now
B 1 05 22 VBCPS
With a small team, complex challenges, & limited resources, Virginia Beach City Public Schools needed better security tools. Learn why they chose Abnormal.
Read More
B 04 20 23 Gartner report
Abnormal’s fundamentally different approach to cloud email security provides the best protection against existing and emerging attack techniques.
Read More
B Securing Cloud Email Video
Abnormal Security's CISO, Mike Britton, shares how enterprises can protect their cloud email environments from inbound attacks and email platform attacks.
Watch Now