Professional Speakers Bureau International

Professional Speakers Bureau International

The Working Bureau with the Working Speaker for the Working Client!

CEO & Chief Human Hacker | Social-Engineer, LLC

Christopher hadnagy

TOPICS - • Cybersecurity • Decision Making

 • Human Trafficking • Safety • Social Engineering

christopher hadnagy - PROGRAMS

Keynotes

  • A Peek Inside the Trojan Horse: Insider threat and social engineering
  • The Science Behind Human Hacking
  • Phishing, Vishing, SMiSHing, Impersonation – OH MY! How you are getting hacked daily
  • Why Vigilantism Doesn’t Work – Catching Predators the right way.
  • Keeping Your Kids Safe in an Advanced Digital World
  • Understanding Vishing Through Data and Science
  • Dynamic Risk Taking and Social Engineering


Training

  • Foundational Application of Social Engineering

Read More...

  • Practical Application of Social Engineering

Read More...

  • Certified Ethical Social Engineer Certification

Read More...

  • Masters Level Social Engineering

Read More...

  • Red Team Labs

Read More...

christopher hadnagy - BIOGRAPHY

Chris Hadnagy is the Founder and CEO of Social-Engineer, LLC. During Chris’ 19 years in information security, he created the world’s first social engineering framework and newsletter. He has also hosted the first social engineering-based podcast. Chris is the Founder, Executive Director, and Board Member, for the Innocent Lives Foundation, a nonprofit organization that identifies anonymous child predators and helps bring them to justice.

Having written five books on social engineering, Chris is also a well-known author. His most recent book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You,” was released January 5, 2021.

Chris leads the way in educating people about social engineering. He created the world’s first Social Engineering Capture the Flag (SECTF) to raise awareness of this serious threat. Chris is also an Adjunct Professor of Social Engineering for the University of Arizona’s NSA designated Center of Academic Excellence in Cyber Operations (CAE-CO). And he also lectures and teaches about social engineering around the globe. Moreover, he was invited to speak at the Pentagon and other high-security facilities.

Chris works with some of the world’s leaders in scientific research for the purpose of acquiring a deeper understanding of social engineering. Notably, Chris authored a book with Dr. Paul Ekman regarding the use of nonverbal communication by social engineers.

Chris is certified as an Offensive Security Certified Professional (OSCP), as well as an Offensive Security Wireless Professional (OSWP). He is also the creator of the Social Engineering Pentest Professional (SEPP), Certified Ethical Social Engineer (CESE), and Master’s Level Social Engineering (MLSE), certifications.

“Understanding the ways humans make decisions is integral in everything we do from maintaining security to communicating with the people in your life. Social engineering skills, when used properly, can make your life so much better.” – Chris Hadnagy

Check Availability

christopher hadnagy- MEDIA

A global security expert draws on psychological insights to help you master the art of social engineering—human hacking. Make friends, influence people, and leave them feeling better for having met you by being more empathetic, generous, and kind.

Eroding social conventions, technology, and rapid economic change are making human beings more stressed and socially awkward and isolated than ever. We live in our own bubbles, reluctant to connect, and feeling increasingly powerless, insecure, and apprehensive when communicating with others.

A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good—to help you regain your confidence and control. Human Hacking provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and protect yourself from manipulators. Ultimately, you’ll become far more self-aware about how you’re presenting yourself—and able to use it to improve your life. 

Hadnagy includes lessons and interactive “missions”—exercises spread throughout the book to help you learn the skills, practice them, and master them. With Human Hacking, you’ll soon be winning friends, influencing people, and achieving your goals.

Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats
  • Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

Social Engineering: The Science of Human Hacking

Harden the human firewall against the most current threats

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.

Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks.

  • Examine the most common social engineering tricks used to gain access
  • Discover which popular techniques generally don’t work in the real world
  • Examine how our understanding of the science behind emotions and decisions can be used by social engineers
  • Learn how social engineering factors into some of the biggest recent headlines
  • Learn how to use these skills as a professional social engineer and secure your company
  • Adopt effective counter-measures to keep hackers at bay

By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Unmasking the Social Engineer: The Human Element of Securtiy

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming.

  • Clearly combines both the practical and technical aspects of social engineering security
  • Reveals the various dirty tricks that scammers use
  • Pinpoints what to look for on the nonverbal side to detect the social engineer

Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, Unmasking the Social Engineer arms readers with the knowledge needed to help protect their organizations.

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.

Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay.

  • Learn what a phish is, and the deceptive ways they've been used
  • Understand decision-making, and the sneaky ways phishers reel you in
  • Recognize different types of phish, and know what to do when you catch one
  • Use phishing as part of your security awareness program for heightened protection

Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

Share by: