Friday, June 6, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Social Engineering 

Home » Cybersecurity » Social Engineering » DEF CON 29: SEVillage Recap

SBN

DEF CON 29: SEVillage Recap

by SEORG on September 28, 2021

The SEVillage was established back in 2010 at DEF CON 18. It has been the official home for all things social engineering for 12 years straight. Our flagship event, the SECTF, has been joined by other events over the years, such as the SECTF4Kids, and SECTF4Teens. SEVillage is also the home for all social engineering speeches at DEF CON.

Over the last two years, we have all adapted to the demands of virtual work, meetings, and yes, even conferences. We truly miss seeing our SEVillage family in person. Fortunately, we can experience SEVillage from the comfort of our own homes! While seeing your faces in 2D isn’t quite the same, we want to thank each of you for your support. This year’s village was one of the most unique ones yet. Until the time we can all be safely together again, let’s look back at DEF CON 29: the SEVillage recap.
DEF CON 29

Friday: SECTF4Kids and SEVillage Speakers

Friday launched the Social Engineering Capture the Flag 4 Kids (SECTF4Kids). Ryan MacDougall and Colin Hadnagy hosted the annual competition this year. They created a virtual world within Minecraft, complete with challenges that all could enjoy. In a world inspired by Wreck It Ralph, participants pictured themselves trapped inside of an arcade game after being sucked into a power strip. They had to complete social-engineering-themed puzzles to gather materials that would help them build a signal for help. What was their objective? First, to obtain enough materials. Second, to climb the radio tower as high as possible. And finally, to project an SOS signal to the arcade owner. The team to make the brightest signal would win.

Techstrong Gang Youtube
AWS Hub

We had 11 kids participate in the competition this year, ages spanning from 7-12 years old. As always, these kids went above and beyond our expectations and handled every challenge we threw at them. The SECTF4Kids is a great way to get kids involved in the community in an entertaining and challenging way. Over the years, some of these children have even given us ideas for future kids CTFs that we implemented! We value the opportunity to be a part of their journey and are excited to see them continue to grow and learn. We want to extend a huge thank you to one such young person. She dedicated hours of her time to help us build and create this virtual competition! SEVillage couldn’t have done it without you, Hydra!
DEF CON 29

Christina Lekati

The first of our amazing speakers was Christina Lekati. Christina is a psychologist, a social engineer and an open-source intelligence analyst. She specializes in behavioral analysis and in intelligence collection and analysis through open-source and human intelligence. Her speech was titled “Judging by the Cover: Profiling & Targeting Through Social Media.” In this presentation, she dissected multiple case studies, broke down social engineering patterns, and helped her audience understand how to apply various profiling techniques to various social media profiles.
def con 29

Ryan MacDougall

Social-Engineer, LLC’s very own Ryan MacDougall was our next presenter. Ryan is the Chief Operating Officer and Open-Source Intelligence trainer for Social-Engineer, LLC. In addition, he runs operations during penetration tests and exercises with clients, as well as managing client relationships. His topic was “SE Team vs. Red Team.” He explained the difference between the two by telling his experience of a standout SE Team engagement. A direct quote from that story: “It was such a surreal experience, to feel like you’re going to die in that moment.” Spoiler alert: they did not die.
Def Con 29

Saturday: SECTF4Teens and SEVillage Speakers

Saturday brought with it another Social Engineering Capture the Flag 4 Teens (SECTF4Teens) hosted by C.G. Consulting Service for the second year in a row. The goal of the event was to retrieve the flags, via open-source intelligence (OSINT) on the targets they were given. We had 3 people, or as we lovingly refer to them, “voluntargets,” who willingly let us use them for the competition. The targets provided us with answers to the flags that the teens would then search the internet for, collecting points along the way.

The SECTF4teens competition gives older kids the chance to practice their social engineering skills. With the virtual format, doing a competition like the OSINT CTF gives them a chance to see what a real engagement looks like and hone skills they can use in a future career. It also highlights how easy it is to find information online. They see the dangers firsthand and see how important it is to keep their personal information safe.

Lisa Forte

Lisa Forte kicked off our Saturday speeches with a bang. She is a social engineering and insider threat expert. Lisa runs cyber crisis simulations for large companies to help them prepare for attacks of all types. She actually started her security career stopping pirates off the coast of Somalia. Her background made her the perfect person to deliver the topic “Using SE to Create Insider Threats and Win all the Things.” She defined the different types of insider threats that exist and how malicious individuals will leverage social engineering tactics to gain footholds in organizations.

John McCombs

We were ecstatic to have Innocent Lives Foundation (ILF) employee John McCombs speak about “The Innocent Lives Foundation: A Beacon of Light in a Dark World.” John’s speech aimed to bring awareness to the ILF and their mission of identifying and bringing child predators to justice. He highlighted why the ILF is needed now more than ever, their stance on vigilantism, and neutrality. To learn how you can help support the ILF in their mission, watch this speech on our YouTube channel or visit their website to get involved.
Def Con 29

Chis Hadnagy

Last but not least, the founder and CEO of Social-Engineer, LLC., Chris Hadnagy wrapped up the day with the presentation “Make Them Want To Tell You: The Science of Elicitation.” Chris brought his 18 years of experience in the information security industry to the fore to define what elicitation is. He explained how social engineers use it, and looked at the science behind it. Chris is an Adjunct Professor of Social Engineering for the University of Arizona’s NSA-designated Center of Academic Excellence in Cyber Operations. He has written 5 books on social engineering and has countless hands-on experiences in the field. This unique skill set made him the perfect speaker to understand and explain these techniques.
Def Con 29

What’s Next?

We want to give a huge shout out to not only or speakers and those at the forefront of our CTF’s, but also to everyone who worked behind the scenes to make this year’s SEVillage run so smoothly. A special thank you to everyone who participated and who continue on this journey of education and learning alongside us. If you missed any of the speeches, or would like to hear one a second time, you can find them here on our YouTube channel. If you would like to hear Ryan and Chris speak again (and have the opportunity to learn from them) keep an eye on our SEVillage Twitter account for an exciting announcement coming soon! Until next year!

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by SEORG. Read the original post at: https://www.social-engineer.org/social-engineering/def-con-29-sevillage-recap/

September 28, 2021September 28, 2021 SEORG Chris Hadnagy, christina lekati, DEF CON, General Social Engineer Blog, john mccombs, Lisa Forte, ryan macdougall, SECTF4KIDS, SECTF4Teens, SEvillage, social engineering
  • ← Ransomware Prevention vs. Recovery: Which Costs Businesses More?
  • BSIMM13: Trends and recommendations to help improve your software security program →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Cloud Field Day

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks
Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps
Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
Survey: Changing Threat Landscape Drives Cybersecurity Spending Shifts
Survey Surfaces Rise on Cyberattacks Fueled by AI
Microsoft Open Sources GitHub Copilot: A New Era for AI Coding
Multiple High-Risk Vulnerabilities in Microsoft Products
Critical Linux Vulnerabilities Risk Password Hash Theft Worldwide
How Morpheus AI Automates the Entire L1 & L2 Pipeline
Interlock and the Kettering Ransomware Attack: ClickFix’s Persistence

Industry Spotlight

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threats & Breaches Vulnerabilities 

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

June 4, 2025 Richi Jennings | 1 day ago 0
USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Industry Spotlight News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

May 30, 2025 Jeffrey Burt | May 30 0
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers

May 29, 2025 Jeffrey Burt | May 29 0

Top Stories

Zscaler Tightens AI Security With New Tools
Application Security Cybersecurity Data Privacy Data Security Featured Network Security News Social - Facebook Social - LinkedIn Social - X Zero-Trust 

Zscaler Tightens AI Security With New Tools

June 5, 2025 Jon Swartz | Yesterday 0
Microsoft Launches Free Security Program for European Governments
Cloud Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Microsoft Launches Free Security Program for European Governments

June 4, 2025 Jeffrey Burt | 1 day ago 0
Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities

June 3, 2025 Jeffrey Burt | 2 days ago 0

Security Humor

Facebook CEO Mark Zuckerberg announces the plan to make Facebook more private at Facebook’s Developer Conference on April 30, 2019

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

Download Free eBook

The State of Cloud Native Security 2020

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×