Wednesday, May 28, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Social Engineering 

Home » Cybersecurity » Social Engineering » Human Hacking Conference 2021 Goes Virtual!

SBN

Human Hacking Conference 2021 Goes Virtual!

by Social-Engineer on January 21, 2021

2020 was a tough year, we all can agree on that. However, one great thing happened very early in the year for us. On February 20th, we kicked off our very first Human Hacking Conference (HHC). Year Alpha was a massive success. We had an amazing venue, fantastic trainers, and guests who came with open minds, ready to learn.  We left that weekend feeling buzzed from the excitement of it all. HHC 2021 will be just as exciting, despite having to make some changes to our original plans. We are happy to announce that HHC will being going completely virtual!  But before we get ahead of ourselves, let’s start with the basics.  

What is HHC?  

The HHC was created by Chris Hadnagy, the CEO of Social-Engineer, LLC. After running several social engineering villages at other conferences, Chris was inspired to create his own conference. This conference was unlike any other. It is an all-encompassing event, offering to teach people from all fields – business, security, psychology, and more. With experts in deception, body language, intelligence research, and more, this conference appealed to a variety of people for different reasons. The skills and insight gained from the event benefited the attendees in countless ways. 

Techstrong Gang Youtube
AWS Hub

The conference centered around training workshops that allow attendees to learn skills from professionals of various fields. Joe Navarro, a former FBI special agent, specializing in behavioral assessment, hosted a Nonverbal Communications workshop. Attendees were able to learn from Joe how to assess what is being said and what is being felt, all by focusing on body language. Nick Furneaux, an expert in cyber security and digital forensics, taught a packed workshop on how to use OSINT for investigative purposes. R. Paul Wilson, an elite con artist and magician, taught the Dark Side of the Hand workshop.  Attendees were shown how to deal with the expectation of your audience at any time.  

This is just a small sample of the attendee experience in 2020.  We had other workshops with experts such as Robin Dreeke, Stephanie Paul, Dov Baron and more! As we went through our attendees’ comments on the workshops, we were so proud of what was accomplished. It left us motivated to bring an even better event to 2021.  

Enter Coronavirus… 

We never could have expected that, just a few short weeks after HHC 2020, the entire world would find itself amid a pandemic. With a global shutdown happening and more and more people getting sick, this meant that planning HHC 2021 would be a bumpy road. Early on, we were hopeful that we would be able to host an event like we did in 2020; however, it soon became clear that we were going to have to improvise. The safety of our attendees and staff was the most important thing to us. So, after a lot of planning, and a few changes along the way, we’re happy to say we are going 100% virtual for HHC 2021.  

HHC Goes Virtual!

Our attendees will have access to all the workshops via an interactive livestream. They will have the ability to ask questions and interact with our workshop trainers! It will also give them access to unique networking opportunities including happy hour events happening all 3 nights of the conference.  

We also are happy to announce that we have added 3 new workshop trainers to our line up! We highlighted our originally scheduled trainers in our June blog post, but we want to introduce you to our newly added professionals!  

Anne-Maartje Oud 

Anne-Maartje has been a behavioral advisor/consultant for 20 years. She is the CEO and Founder of The Behaviour Company, where she helps customize personal development programs for companies worldwide. She specializes in creating better working environments, developing interpersonal skills, and encouraging more effective communication. By focusing on creating awareness in organizations, she helps managers, executives, and team members to communicate and lead better.  

Her workshop, “The Art and Science of Conducting Difficult Conversations,” is an interactive session that will help attendees be more effective when it comes to having inevitable difficult conversations. The workshop will focus on how to define these conversations, how to prepare for them, and how influence techniques can be used to attain a positive outcome.  

Joshua Bitton 

Joshua Bitton is one of the most sought-after acting and dialogue coaches in Los Angeles, USA. With a plethora of plays, TV shows, and movies under his belt, Joshua’s experience has led to him coaching some of the biggest names in Hollywood. His work as an acting coach has included set coaching, auditions, readings, monologues, script breakdown, and character development.  

Joshua’s workshop, “The Mechanics of Breaking Down Dialects,” will help attendees design the voice and speech of a character or pretext for engagements. By learning the mechanics of breaking down dialects, Joshua’s workshop will help attendees acquire an authentic accent that can prove useful for any operation or objective.  

Sam Qurashi  

Dr. Sam Qurashi is a writer, entrepreneur, Instagrammer, and YouTuber. After helping over 10,000 patients as a psychiatric resident in an addiction hospital, Sam walked away from his medical career, believing that there must be a more effective way to help people. He started interviewing experts that live beyond the frame of traditional psychology and who are “masters of the mind.”. This included learning from a ninja, the Horse Whisperer, a samurai, and a pickpocket. He now shares his thoughts and concepts on psychology via his social media platforms, where he has 680 thousand followers.  

Dr. Quarashi’s workshop will highlight the verbal and nonverbal communication that alters the emotional state of self and others. His psycholinguistics workshop will help you create a safe feeling in others, resolve conflicts, redirect others’ focus, and help give feedback that builds momentum in others.  

Hope to See You At HHC 2021

While we are disappointed to not be able to physically see all our attendees, we are very excited about the event. And we are happy to make a virtual event available. However, HHC would not be possible without our amazing sponsors, Living Security and CG Silvers Consulting! We know the skills and insights that our attendees will learn will benefit them in countless ways, both personally and professionally. We are very excited for this event and we can’t wait to see you!  

The post Human Hacking Conference 2021 Goes Virtual! appeared first on Security Through Education.

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by Social-Engineer. Read the original post at: https://www.social-engineer.org/social-engineering/human-hacking-conference-2021-goes-virtual/?utm_source=rss&utm_medium=rss&utm_campaign=human-hacking-conference-2021-goes-virtual

January 21, 2021January 21, 2021 Social-Engineer Chase Hughes, Chris Hadnagy, Dov Baron, General Social Engineer Blog, HHC, human hacking conference, Joe Navarro, Mark Bowden, social engineering
  • ← 10 Tips to Protect Your Company’s Data in 2021
  • New 451 Research Predicts a Growth in DaaS Adoption Due to Work From Home Trend →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Security Field Day

Upcoming Webinars

Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

RSA and Bitcoin at BIG Risk from Quantum Compute
Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas 
Understanding the Importance of Incident Response Plans for Nonprofits
Mental Denial of Service: Narrative Malware and the Future of Resilience
FTC Orders GoDaddy to Bolster Its Security After Years of Attacks
Cyber Heads Up: “BadSuccessor”—A Critical Active Directory Privilege Escalation Vulnerability in Windows Server 2025
Ensuring Stability with Robust NHI Strategies
When AI Fights Back: Threats, Ethics, and Safety Concerns
Feel Protected: Advances in NHI Security Techniques
Crypto Drainers are Targeting Cryptocurrency Users

Industry Spotlight

RSA and Bitcoin at BIG Risk from Quantum Compute
Analytics & Intelligence Blockchain CISO Suite Cloud Security Cybersecurity Data Privacy Data Security DevOps Digital Currency Featured Governance, Risk & Compliance Humor Industry Spotlight Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

RSA and Bitcoin at BIG Risk from Quantum Compute

May 27, 2025 Richi Jennings | Yesterday 0
Signal Gives Microsoft a Clear Signal: Do NOT Recall This
Application Security Cyberlaw Cybersecurity Data Privacy Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Most Read This Week News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Signal Gives Microsoft a Clear Signal: Do NOT Recall This

May 22, 2025 Richi Jennings | May 22 0
Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty

May 16, 2025 Jeffrey Burt | May 16 0

Top Stories

FTC Orders GoDaddy to Bolster Its Security After Years of Attacks
Application Security Cloud Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

FTC Orders GoDaddy to Bolster Its Security After Years of Attacks

May 28, 2025 Jeffrey Burt | 1 hour ago 0
U.S. Authorities Seize DanaBot Malware Operation, Indict 16
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Malware Network Security News Security Boulevard (Original) Spotlight Threats & Breaches 

U.S. Authorities Seize DanaBot Malware Operation, Indict 16

May 23, 2025 Jeffrey Burt | May 23 0
Survey Surfaces Limited Amount of Post Quantum Cryptography Progress
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Survey Surfaces Limited Amount of Post Quantum Cryptography Progress

May 23, 2025 Michael Vizard | May 23 0

Security Humor

Randall Munroe’s XKCD ‘Drafting’

Randall Munroe’s XKCD ‘Drafting’

Download Free eBook

Managing the AppSec Toolstack

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×

Security in AI

Step 1 of 7

14%
How would you best describe your organization's current stage of securing the use of generative AI in your applications?(Required)
Have you implemented, or are you planning to implement, zero trust security for the AI your organization uses or develops?(Required)
What are the three biggest challenges your organization faces when integrating generative AI into applications or workflows? (Select up to three)(Required)
How does your organization secure proprietary information used in AI training, tuning, or retrieval-augmented generation (RAG)? (Select all that apply)(Required)
Which of the following kinds of tools are you currently using to secure your organization’s use of generative AI? (select all that apply)(Required)
How valuable do you think it would it be to have a solution that classifies and quantifies risks associated with generative AI tools?(Required)
What are, or do you think would be, the most important reasons for implementing generative AI security measures? (Select up to three)(Required)

×