Rachel Tobac

Ethical Hacker and CEO of SocialProof Security
Speaker Rachel Tobac
  • Helps people and companies keep their data safe by training and pentesting them on social engineering risks
  • 3-time 2nd place winner of DEF CON, the Social Engineering Capture the Flag contest
  • Chair of the Board for the nonprofit Women in Security and Privacy (WISP)

Play Video View Fees Add to List

Check Fees & Availability

Rachel Tobac is a hacker and the CEO of SocialProof Security where she helps people and companies keep their data safe by training and pentesting them on social engineering risks. Rachel was also 2nd place winner of DEF CON's wild spectator sport, the Social Engineering Capture the Flag contest, 3 years in a row. Rachel has shared her real life social engineering stories with NPR, Last Week Tonight with John Oliver, The New York Times, Business Insider, CNN, NBC Nightly News with Lester Holt, Forbes and many more. In her remaining spare time, Rachel is the Chair of the Board for the nonprofit Women in Security and Privacy (WISP) where she works to advance women to lead in the fields. 

Continue Reading »

Speaker Video

Rachel Tobac - Watch a CNN Reporter Get Hacked

DEEP 2018: Rachel Tobac

Inside The Mind of A Hacker

Have you ever come across a phishy email trying to take advantage of you? What about a phone call that just doesn't seem right?

Our keynote, Rachel Tobac, executes these types of attacks for a living! But she's not a criminal, she's an ethical hacker -- launching successful social engineering attacks to train others on the up-to-date methods criminals use to gain access to your money, data, or systems, before the criminals get there first. Rachel's fun and fast-paced hacker stories from the field will arm you with current examples of real attacks and the skills, scripts, and best practices to catch hackers like her in the act.

Exploiting Trust - The Human Element of Security

Security protocols are often built on trust -- trust which is exploited by attackers like me. From email to phone communications, attackers study how to insert themselves within your trusted circle and protocols to leverage that trust against you. This keynote will dive into the anatomy of trust exploitation in real world social engineering attacks, walk through step-by-step examples of attacks happening during COVID-19, and the steps you can take to protect your data, money, security, and privacy from real world attackers, even during a global crisis.

How I Would Hack You & How To Stop Me

Have you watched cyber attacks unfold on the news and wondered: "how would those cyber criminals hack me or my company?" 

Now is your chance to find out in a safe and educational keynote! This event covers famous social engineering attacks in the news, security awareness best practices, and how to protect your team and company from human hacker's recent tricks. You'll witness multiple live hacking demonstrations while learning how to catch attackers like me in the act.

Continue Reading »