<p>Rachel is an ethical hacker and CEO of SocialProof Security where she helps people and companies keep their data and money safe from social engineering threats.</p><p>A winner of DEFCON's wild spectator sport, the Social Engineering ‘Capture the Flag’ contest, she was also one of the first to correctly predict and unpack the infamous 2020 Twitter hack in real time while providing recommendations to the public to help other organizations avoid disastrous social engineering attacks in the future. In her spare time, Rachel is the Chair of the Board for the nonprofit Women in Security and Privacy which where she works to advance women to lead in the fields. Rachel has shared her real life social engineering stories with NPR, <em>Last Week Tonight with John Oliver</em>, <em>The New York Times</em>, <em>Business Insider</em>, CNN, <em>NBC Nightly News with Lester Holt</em> and many more.</p>

First Name
Rachel
Last Name
Tobac
Twitter
RachelTobac
Siebel ID
SPKR-1348
Trending Topic
Moniker

CEO of SocialProof Security, ethical hacker

Speech Topics

<ul><li><strong>Hacking in the Age of AI: How AI, Voice Cloning, and ChatGPT Has Changed the Way We Hack</strong></li><li>In the past year, we've witnessed a paradigm shift in hacking with the advent of powerful AI algorithms, AI voice-cloning capabilities, and the accessibility of ChatGPT. These AI innovations have revolutionized the way hackers operate, presenting both unprecedented challenges and opportunities for the cybersecurity community. Join us as we explore live AI hacking demonstrations, discuss the implications of these hacks on your organization, and how you can still catch these hackers in the act -- even in the ever-changing landscape of cybersecurity.</li><li><strong>How I Would Hack You: Live!</strong></li><li>This live demo is one of Tobac’s most sought-after events. YOU pick a team member—ideally someone with a social media presence and a sense of humor! SHE will hack them LIVE—in-person or virtually—but with zero real-world consequences or harm to their social identity or your organization’s cyber security. As she hacks them, Tobac explains, step by step, what a real hacker would do, how they would do it and why you would be unlikely to see it coming. As the audience, you and your team get a chance to step into the shoes of a hacker and see spear phishing and other trending hacker techniques in action (but in a safe and controlled environment). It’s a fun and powerful way to make everyone on your team aware of the importance of cyber security while highlighting both the risks we face and the responsibilities we all have as individuals and organizations in the digital realm.</li><li><strong>Inside the Mind of a Hacker</strong></li><li>Have you ever experienced a strange email or phone call and wondered if you were being hacked?  Rachel Tobac executes these attacks for a living! But she's not a criminal, she's a white hat hacker -- launching successful social engineering attacks to train others on the up-to-date methods criminals use to gain access to your money, data, or systems, before the bad guys get there first. Rachel's fun and fast-paced hacker stories from the field will arm you and your business with current examples of real attacks and the necessary skills, scripts, and best practices to catch hackers like her in the act with takeaways on protecting your firm’s valuable assets.</li><li><strong>Exploiting Trust - The Human Element of Security</strong></li><li>Security protocols are often built on trust -- trust which is exploited by attackers like me. From email to phone communications, attackers study how to insert themselves within your trusted circle and protocols to leverage that trust against you. This keynote will dive into the anatomy of trust exploitation in real world social engineering attacks, walk through step-by-step examples of attacks happening during COVID-19, and the steps you can take to protect your data, money, security, and privacy from real world attackers, even during a global crisis.</li></ul>

Hide Fee
On
Exclusive
Off
Environment
Image Alt Tag
<p>Rachel Tobac, Cyber Security Expert, Keppler Speakers Bureau</p>
Marketing Toolkit
Tobac R-Bio.docx
Tobac R-Photo (High Res HEADSHOT 7_20).jpg
Tobac R-Topics.docx
Ignore Keppler Lit?
No