Webinar

Industry Leaders

About Our Experts

David Hawkins

Director, Consulting Engineer at BitSight
David Hawkins has 20+ years of experience in IT and physical security. As a Consulting Engineer at BitSight, he helps organizations manage risk, compliance, and technology programs, while promoting the maturity of the security ratings industry as a unified discipline encompassing information security, data protection, and business risk.

Rachel Tobac

CEO & White-Hat Hacker at SocialProof Security
Rachel Tobac, CEO of SocialProof Security, trains organizations on social engineering risks and pentesting. A three-time DEF CON Social Engineering Capture the Flag winner, she is a recognized media expert and Chair of Women in Security and Privacy (WISP), advancing women leaders in cybersecurity and privacy.

Inside the Mind of a Hacker

Feb 25 / IT GRC Forum

Discover how hackers survey companies to find gaps in security—and how to stop them—led by Rachel Tobac, a renowned white-hat hacker and social engineering expert. Rachel demonstrates how cybercriminals exploit human and technical weaknesses to access money, data, and systems, using real-world examples to teach organizations how to defend themselves.

This engaging, fast-paced webinar provides actionable insights into improving security posture, hardening employees as the first line of defense, and leveraging tools like BitSight to identify external vulnerabilities. Participants will learn how to conduct a Social Engineering Risk Assessment, recognize vulnerable practices and policies, and analyze the information collected during such assessments.

The session also covers evaluating and quantifying risk to prioritize remediation efforts effectively. By attending, organizations can strengthen both their technical controls and employee awareness, mitigating the risk of social engineering attacks and other exploit methods.

Join us to gain practical skills, current hacker insights, and strategies to safeguard your firm’s critical assets while staying ahead of evolving social engineering threats.