USA
Unlock the secrets of social proof security with CEO Rachel Tobac. Defeated Twitter hack, she empowers companies to stay ahead in the cybersecurity game.
Request fees and availabilitySend a simple request. You’ll get a quick reply with fees and availability
About Rachel
Keynote
Video
Rachel Tobac, a renowned motivational speaker and social engineering expert, brings an unparalleled set of skills to your event. With a proven track record of accurately predicting and unpacking the infamous 2020 Twitter hack, Rachel stands as a trailblazer in the cybersecurity realm. As you book Rachel for your event, you grant your team access to invaluable insights that are vital in staying ahead in the ever-evolving cyber landscape.
As you witness Rachel Tobac on stage, you’ll discover her knack for transforming complex cybersecurity concepts into actionable strategies. Her engaging storytelling creates a lasting impact on your team, igniting a passion for proactive decision-making and fostering a security-focused culture within your organization.
Booking Rachel Tobac is a commitment to fortifying your company’s defenses against social engineering threats. Her dynamic keynote motivates your team to take ownership of cybersecurity, identifying and countering cyber attacks with confidence. Additionally, your organization’s support for gender diversity initiatives helps strengthen not only your team’s resilience but also the industry as a whole.
Don’t miss this exclusive opportunity to elevate your organization’s security posture. Book Rachel Tobac for your event and empower your team with the tools and knowledge to protect your valuable assets from malicious exploits. Prepare to be inspired, informed, and equipped to navigate the cybersecurity landscape with confidence, guided by the expertise of Rachel Tobac, the renowned keynote speaker in the field.
See keynotes with Rachel TobacIn the past year, we’ve witnessed a paradigm shift in hacking with the advent of powerful AI algorithms, AI voice-cloning capabilities, and the accessibility of ChatGPT. These AI innovations have revolutionized the way hackers operate, presenting both unprecedented challenges and opportunities for the cybersecurity community.
Join us as we explore live AI hacking demonstrations, discuss the implications of these hacks on your organization, and how you can still catch these hackers in the act — even in the ever-changing landscape of cybersecurity.
This live demo is one of Tobac’s most sought-after events. YOU pick a team member—ideally someone with a social media presence and a sense of humor! SHE will hack them LIVE—in-person or virtually—but with zero real-world consequences or harm to their social identity or your organization’s cyber security.
As she hacks them, Tobac explains, step by step, what a real hacker would do, how they would do it and why you would be unlikely to see it coming. As the audience, you and your team get a chance to step into the shoes of a hacker and see spear phishing and other trending hacker techniques in action (but in a safe and controlled environment).
It’s a fun and powerful way to make everyone on your team aware of the importance of cyber security while highlighting both the risks we face and the responsibilities we all have as individuals and organizations in the digital realm.
Have you ever experienced a strange email or phone call and wondered if you were being hacked? Rachel Tobac executes these attacks for a living! But she’s not a criminal, she’s a white hat hacker — launching successful social engineering attacks to train others on the up-to-date methods criminals use to gain access to your money, data, or systems, before the bad guys get there first.
Rachel’s fun and fast-paced hacker stories from the field will arm you and your business with current examples of real attacks and the necessary skills, scripts, and best practices to catch hackers like her in the act with takeaways on protecting your firm’s valuable assets.
Security protocols are often built on trust — trust which is exploited by attackers like me. From email to phone communications, attackers study how to insert themselves within your trusted circle and protocols to leverage that trust against you.
This keynote will dive into the anatomy of trust exploitation in real world social engineering attacks, walk through step-by-step examples of attacks happening during COVID-19, and the steps you can take to protect your data, money, security, and privacy from real world attackers, even during a global crisis.
Send a simple request. You’ll get a quick reply with fees and availability