Threat Actor Psychology: Using Social Engineering and Other Jedi Tricks - Part 2

Alex Holden | Oct. 3, 2025 | 31 min
Threat Actor Psychology: Using Social Engineering and Other Jedi Tricks - Part 2

Forget textbook phishing templates and generic vishing scripts. This is a continuation of the talk that continues a deep dive into the psychology, culture, and behavior of real-world threat actors and shows how we turn their own tactics against them. We’ve been successfully using social engineering techniques against cyber threat actors for decades, and in this presentation, I’ll share some of the key techniques and approaches that have made this possible.

Watch on BrightTALK

Logo
Solutions Threat Intelligence Services Credential Integrity Service Domain Integrity Service Information Security Assessment Services Incident Response and Investigation
Our offices
Copyright © 2025 Hold Security