Skip to main content
Christina Lekati - Social Engineering Security Specialist; Open-Source Intelligence Analyst; BlackHat Trainer

Christina Lekati

Profile updated July 2, 2025
LocationTravels from Munich, Germany
$
$10,000 - $20,000
Get Started

About Christina Lekati

Zack Kass
Eric Boles
Daymond John
+17

Discover speakers similar to Christina Lekati

Browse Similar Speakers

Speech topics

1/4

Information Security Is Up Against Weaponized Psychology

Social Engineering has become one of the most effective and efficient attack methods used to initiate and enable cyber attacks. We read in the news about large-scale security violations, where investigators are not able to understand the phase of initiation. Most often, a social engineering attack is involved. By design, this is the type of attack that moves in the shadows, delivered by criminals and state-sponsored agents that are able to blend in multiple environments and often leave no trace, making it very difficult to identify the point of initial compromise. Similar to warfare operations, these threat actors strive to create an asymmetrical advantage based on a carefully planned strategy.

Cybersecurity today is not only a technical challenge.

It is also a behavioural challenge. As long as executives, managers and employees can provide access to critical assets, systems, and data, attackers will be targeting them through social engineering schemes in order to acquire this access. Those who have access to technology and organizational assets have also become responsible for protecting those assets. Do you or your colleagues make the perfect target?

Weaponized psychology has started becoming a tool employed to infiltrate organizations in the public and private sectors, steal sensitive information, recruit insiders, and help attackers breach organizational security.

This talk provides insights on the mechanisms and the methodology of today’s elaborate social engineering attacks and explains the increasingly growing threat of weaponized psychology. It will also discuss how attackers elicit information that assists them in initiating or delivering an attack. The talk will include case studies and lessons learned on the use of weaponized psychology from the fields of business and human intelligence operations (HUMINT) in social engineering and in recruiting insider threats, as well as what makes some targets more attractive than others.

Speaking videos

1/3

Browse Similar Speakers

Page 1 of 3

Speaker Search is a marketplace of speakers designed for talent buyers. We do not represent or manage speakers; instead, we provide event planners with the most comprehensive resource to discover and book the right talent.