All American Entertainment Named to Inc. Best Workplaces in 2022. Read more
AAE Named to Inc. Best Workplaces in 2022. Read more
Click to Open Search Bar

Christina Lekati

Social Engineering Security Specialist

REQUEST BOOKING INFORMATION

Christina Lekati Biography

Christina Lekati is a psychologist with a long history in cyber security. She is an expert on the human element of cyber-attacks, social engineering, and in open-source intelligence.

Lekati has trained and educated thousands of people around the globe on current security issues, social engineering and intelligence collection & analysis.

Lekati specializes in people profiling through social media and combines this with her knowledge of the modus operandi of attackers. She helps clients and audiences identify their vulnerabilities and protect themselves against cyber threats.

With her skills in open-source intelligence, she also conducts high-value target & corporate vulnerability assessments. She is working with Cyber Risk GmbH as a social engineering expert consultant and trainer.

Lekati is frequently invited as a speaker or keynote speaker at cyber-security events around the globe. Her presentations combine the art of storytelling with science, research, and her own professional experience.

She is also an Executive Board Member at the OSINT Curious project, contributing regularly to the international scene of Open-Source Intelligence (OSINT).

Speaking Topics
  • Information Security Is Up Against Weaponized Psychology

    Social Engineering has become one of the most effective and efficient attack methods used to initiate and enable cyber attacks. We read in the news about large-scale security violations, where investigators are not able to understand the phase of initiation. Most often, a social engineering attack is involved. By design, this is the type of attack that moves in the shadows, delivered by criminals and state-sponsored agents that are able to blend in multiple environments and often leave no trace, making it very difficult to identify the point of initial compromise. Similar to warfare operations, these threat actors strive to create an asymmetrical advantage based on a carefully planned strategy.

    Cybersecurity today is not only a technical challenge.

    It is also a behavioural challenge. As long as executives, managers and employees can provide access to critical assets, systems, and data, attackers will be targeting them through social engineering schemes in order to acquire this access. Those who have access to technology and organizational assets have also become responsible for protecting those assets. Do you or your colleagues make the perfect target?

    Weaponized psychology has started becoming a tool employed to infiltrate organizations in the public and private sectors, steal sensitive information, recruit insiders, and help attackers breach organizational security.

    This talk provides insights on the mechanisms and the methodology of today’s elaborate social engineering attacks and explains the increasingly growing threat of weaponized psychology. It will also discuss how attackers elicit information that assists them in initiating or delivering an attack. The talk will include case studies and lessons learned on the use of weaponized psychology from the fields of business and human intelligence operations (HUMINT) in social engineering and in recruiting insider threats, as well as what makes some targets more attractive than others.

  • How Cyber Attackers Profile & Target Key People Through Social Media

    While to the rest of the world social media are friendly platforms of communication and sharing, for cyber attackers & malicious social engineers, they are targeting and information harvesting platforms. Even though social media do not always demonstrate our true personalities, they do demonstrate the way we want to be viewed and treated by others. This can be a lot more useful for attackers and social engineers who tailor their approach to their targets and lure them in through their victims’ personal wants and needs. In our social media profiles, we "leak" behavioral tendencies and characteristics that provide significant intelligence for any type of operation targeting humans.

    The talk covers the topic of information gathering through social media intelligence (SOCMINT), and explains how even seemingly innocent information can be used to manipulate or influence targets. Case studies will be provided.

    It also discusses the art & science of profiling, along with its limitations for social engineering. A two-part demonstration is included on how a profiler’s mind works when harvesting information on social media:

    The first part includes real examples of posts that expose vulnerabilities, attract attackers and ultimately can be exploited and lead to a security breach.

    The second part dives deeper and demonstrates how the information found on a social media profile (from the pictures to the words used by an individual in their captions) are gathered, categorized into a profiling matrix and then analyzed, bringing into the surface a personality profile. The target's profile can then provide actionable intelligence that increases the success of attacks, or attack simulations.

    Real life case examples will be provided.

  • The Behavioral Science Influencing Your Cybersecurity Culture

    What does it take from a cybersecurity professional to be heard in their organization and spread their message about the importance of cybersecurity to both the leadership and the other employees? And if that wasn’t already hard enough, what does it take to lead behavior change and build a cybersecurity culture? It has become clear that technical cybersecurity measures need to operate in harmony with, and to be applied from people. Today’s employees need to practice good cyber security habits to protect the assets they handle and their organization. However convenience, productivity requirements, and other organizational realities are often competing in people’s heads; and it makes them conclude that cybersecurity is simply an “inconvenience” that they soon decide to ignore. On the other hand, security professionals -who were originally focused on securing technology alone, are now tasked with a vastly different requirement: to lead behavioral change within their organization. This topic discusses the psychological elements & behavioral science involved in shifting the user’s perspectives towards cybersecurity and driving behavior change. It discusses what drives motivation, people’s perception of risk & reward, the psychology of willful compliance, and more.

    Ultimately, this topic helps security managers & executives to more effectively communicate & implement the necessary cybersecurity requirements that employees need to practice within their organization.

  • When Your Biggest Threat is on Your Payroll: Drivers & Enablers of Insider Threats

    It is an irony in organizational security: Although so much capital is invested in the protection of the organizational assets against external threats, some of the largest compromises have occurred as a result of insider threats, sometimes resulting in irrecoverable damage, reputation risk, and liability. This type of threat is more important for organizations that are part of the critical infrastructure and industries where intellectual property and the protection of sensitive information are critical elements for their operations. Employees in security-focused environments learn to treat outsiders with suspicion and to maintain trust boundaries. However, it is often the case that once an “outsider” enters the payroll of an organization they are given a "carte blanche" in terms of trust and disclosure of information. They are now treated as the "insiders" that they are• members of the same tribe, fighting and working towards the same goals and using their skills to benefit their organization. Employees do not always realize that some “colleagues” consider the exploitation of organizational weaknesses a high-reward activity that serves their personal interests better than loyalty to the employer.

    This presentation aims to shed light on the challenging topic of insider threats. It will discuss the motives that lead employees to unauthorized disclosure of sensitive information, process corruption, electronic sabotage, and/or the facilitation of third-party access to organizational assets. Research has repeatedly found a clear link between insider activity taking place and exploitable weaknesses in an organization’s security and management processes. Therefore, this talk will go on discussing the organizational factors enabling insider threat operations as well as countermeasures against them, by combining the lessons learned on insider activity prevention from the fields of counterintelligence, psychology, and cyber-security.

Videos
FAQs
  • HOW TO BOOK Christina Lekati?

    Our booking agents have successfully helped clients around the world secure talent like Christina Lekati for both live and virtual events for over 15 years. The team at All American Entertainment represents and listens to the needs of organizations and corporations seeking to hire keynote speakers, celebrities or entertainers for speaking engagements, personal appearances, product endorsements, or corporate entertainment. Fill out a booking request form for Christina Lekati, or call our office at 1.800.698.2536 to discuss your upcoming event. One of our experienced agents will be happy to help you get pricing information and check availability for Christina Lekati or any other celebrity of your choice.
  • HOW MUCH DOES IT COST TO BOOK Christina Lekati?

    Booking fees for Christina Lekati, or any other speakers and celebrities, are determined based on a number of factors and may change without notice. Pricing often varies between live and virtual events. Other factors that can affect speaker fees include the talent's schedule, market conditions, length of presentation, and the location of the event. The live and virtual event speaking fees listed on this website are intended to serve as a guideline only. In some cases, the actual quote may be above or below the stated range. For the most current fee to hire Christina Lekati, please fill out the booking request form or call our office at 1.800.698.2536 to speak with an experienced booking agent.
  • WHO IS THE AGENT FOR Christina Lekati?

    All American Entertainment has successfully secured celebrity talent like Christina Lekati for clients worldwide for more than 15 years. As a full-service talent booking agency, we have access to virtually any speaker or celebrity in the world. Our agents are happy and able to submit an offer to the speaker or celebrity of your choice, letting you benefit from our reputation and long-standing relationships in the industry. Fill out the booking request form or call our office at 1.800.698.2536, and one of our agents will assist you to book Christina Lekati for your next private or corporate function.
  • WHAT IS A FULL-SERVICE TALENT BOOKING AGENCY?

    All American Speakers is a "buyers agent" and exclusively represents talent buyers, meeting planners and event professionals, who are looking to secure celebrities and speakers for personal appearances, speaking engagements, corporate entertainment, public relations campaigns, commercials, or endorsements. We do not exclusively represent Christina Lekati or claim ourselves as the exclusive booking agency, business manager, publicist, speakers bureau or management for Christina Lekati or any other speaker or celebrity on this website. For more information on how we work and what makes us unique, please read the AAE Advantage.
Check Availability

Tell us about your event!

During normal business hours, we respond to most inquiries within 4 hours.

Users also viewed these speakers:

This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.

All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.

If you are the talent, and wish to request removal from this catalog or report an issue with your profile, please click here.

Social Engineering Security Specialist

Travels From:
Germany
Speaking Fee:

Christina Lekati Biography

Christina Lekati is a psychologist with a long history in cyber security. She is an expert on the human element of cyber-attacks, social engineering, and in open-source intelligence.

Lekati has trained and educated thousands of people around the globe on current security issues, social engineering and intelligence collection & analysis.

Lekati specializes in people profiling through social media and combines this with her knowledge of the modus operandi of attackers. She helps clients and audiences identify their vulnerabilities and protect themselves against cyber threats.

With her skills in open-source intelligence, she also conducts high-value target & corporate vulnerability assessments. She is working with Cyber Risk GmbH as a social engineering expert consultant and trainer.

Lekati is frequently invited as a speaker or keynote speaker at cyber-security events around the globe. Her presentations combine the art of storytelling with science, research, and her own professional experience.

She is also an Executive Board Member at the OSINT Curious project, contributing regularly to the international scene of Open-Source Intelligence (OSINT).

Christina Lekati Speaking Topics

  • Information Security Is Up Against Weaponized Psychology

    Social Engineering has become one of the most effective and efficient attack methods used to initiate and enable cyber attacks. We read in the news about large-scale security violations, where investigators are not able to understand the phase of initiation. Most often, a social engineering attack is involved. By design, this is the type of attack that moves in the shadows, delivered by criminals and state-sponsored agents that are able to blend in multiple environments and often leave no trace, making it very difficult to identify the point of initial compromise. Similar to warfare operations, these threat actors strive to create an asymmetrical advantage based on a carefully planned strategy.

    Cybersecurity today is not only a technical challenge.

    It is also a behavioural challenge. As long as executives, managers and employees can provide access to critical assets, systems, and data, attackers will be targeting them through social engineering schemes in order to acquire this access. Those who have access to technology and organizational assets have also become responsible for protecting those assets. Do you or your colleagues make the perfect target?

    Weaponized psychology has started becoming a tool employed to infiltrate organizations in the public and private sectors, steal sensitive information, recruit insiders, and help attackers breach organizational security.

    This talk provides insights on the mechanisms and the methodology of today’s elaborate social engineering attacks and explains the increasingly growing threat of weaponized psychology. It will also discuss how attackers elicit information that assists them in initiating or delivering an attack. The talk will include case studies and lessons learned on the use of weaponized psychology from the fields of business and human intelligence operations (HUMINT) in social engineering and in recruiting insider threats, as well as what makes some targets more attractive than others.

  • How Cyber Attackers Profile & Target Key People Through Social Media

    While to the rest of the world social media are friendly platforms of communication and sharing, for cyber attackers & malicious social engineers, they are targeting and information harvesting platforms. Even though social media do not always demonstrate our true personalities, they do demonstrate the way we want to be viewed and treated by others. This can be a lot more useful for attackers and social engineers who tailor their approach to their targets and lure them in through their victims’ personal wants and needs. In our social media profiles, we "leak" behavioral tendencies and characteristics that provide significant intelligence for any type of operation targeting humans.

    The talk covers the topic of information gathering through social media intelligence (SOCMINT), and explains how even seemingly innocent information can be used to manipulate or influence targets. Case studies will be provided.

    It also discusses the art & science of profiling, along with its limitations for social engineering. A two-part demonstration is included on how a profiler’s mind works when harvesting information on social media:

    The first part includes real examples of posts that expose vulnerabilities, attract attackers and ultimately can be exploited and lead to a security breach.

    The second part dives deeper and demonstrates how the information found on a social media profile (from the pictures to the words used by an individual in their captions) are gathered, categorized into a profiling matrix and then analyzed, bringing into the surface a personality profile. The target's profile can then provide actionable intelligence that increases the success of attacks, or attack simulations.

    Real life case examples will be provided.

  • The Behavioral Science Influencing Your Cybersecurity Culture

    What does it take from a cybersecurity professional to be heard in their organization and spread their message about the importance of cybersecurity to both the leadership and the other employees? And if that wasn’t already hard enough, what does it take to lead behavior change and build a cybersecurity culture? It has become clear that technical cybersecurity measures need to operate in harmony with, and to be applied from people. Today’s employees need to practice good cyber security habits to protect the assets they handle and their organization. However convenience, productivity requirements, and other organizational realities are often competing in people’s heads; and it makes them conclude that cybersecurity is simply an “inconvenience” that they soon decide to ignore. On the other hand, security professionals -who were originally focused on securing technology alone, are now tasked with a vastly different requirement: to lead behavioral change within their organization. This topic discusses the psychological elements & behavioral science involved in shifting the user’s perspectives towards cybersecurity and driving behavior change. It discusses what drives motivation, people’s perception of risk & reward, the psychology of willful compliance, and more.

    Ultimately, this topic helps security managers & executives to more effectively communicate & implement the necessary cybersecurity requirements that employees need to practice within their organization.

  • When Your Biggest Threat is on Your Payroll: Drivers & Enablers of Insider Threats

    It is an irony in organizational security: Although so much capital is invested in the protection of the organizational assets against external threats, some of the largest compromises have occurred as a result of insider threats, sometimes resulting in irrecoverable damage, reputation risk, and liability. This type of threat is more important for organizations that are part of the critical infrastructure and industries where intellectual property and the protection of sensitive information are critical elements for their operations. Employees in security-focused environments learn to treat outsiders with suspicion and to maintain trust boundaries. However, it is often the case that once an “outsider” enters the payroll of an organization they are given a "carte blanche" in terms of trust and disclosure of information. They are now treated as the "insiders" that they are• members of the same tribe, fighting and working towards the same goals and using their skills to benefit their organization. Employees do not always realize that some “colleagues” consider the exploitation of organizational weaknesses a high-reward activity that serves their personal interests better than loyalty to the employer.

    This presentation aims to shed light on the challenging topic of insider threats. It will discuss the motives that lead employees to unauthorized disclosure of sensitive information, process corruption, electronic sabotage, and/or the facilitation of third-party access to organizational assets. Research has repeatedly found a clear link between insider activity taking place and exploitable weaknesses in an organization’s security and management processes. Therefore, this talk will go on discussing the organizational factors enabling insider threat operations as well as countermeasures against them, by combining the lessons learned on insider activity prevention from the fields of counterintelligence, psychology, and cyber-security.

Christina Lekati Videos

  • Keynote Presentation SecIT by Heise - Christina Lekati

FAQs on booking Christina Lekati

  • How to book Christina Lekati?

    Our booking agents have successfully helped clients around the world secure talent like Christina Lekati for both live and virtual events for over 15 years. The team at All American Entertainment represents and listens to the needs of organizations and corporations seeking to hire keynote speakers, celebrities or entertainers for speaking engagements, personal appearances, product endorsements, or corporate entertainment. Fill out a booking request form for Christina Lekati, or call our office at 1.800.698.2536 to discuss your upcoming event. One of our experienced agents will be happy to help you get pricing information and check availability for Christina Lekati or any other celebrity of your choice.
  • How much does it cost to book Christina Lekati?

    Booking fees for Christina Lekati, or any other speakers and celebrities, are determined based on a number of factors and may change without notice. Pricing often varies between live and virtual events. Other factors that can affect speaker fees include the talent's schedule, market conditions, length of presentation, and the location of the event. The live and virtual event speaking fees listed on this website are intended to serve as a guideline only. In some cases, the actual quote may be above or below the stated range. For the most current fee to hire Christina Lekati, please fill out the booking request form or call our office at 1.800.698.2536 to speak with an experienced booking agent.
  • Who is the agent for Christina Lekati?

    All American Entertainment has successfully secured celebrity talent like Christina Lekati for clients worldwide for more than 15 years. As a full-service talent booking agency, we have access to virtually any speaker or celebrity in the world. Our agents are happy and able to submit an offer to the speaker or celebrity of your choice, letting you benefit from our reputation and long-standing relationships in the industry. Fill out the booking request form or call our office at 1.800.698.2536, and one of our agents will assist you to book Christina Lekati for your next private or corporate function.
  • What is a full-service talent booking agency?

    All American Speakers is a "buyers agent" and exclusively represents talent buyers, meeting planners and event professionals, who are looking to secure celebrities and speakers for personal appearances, speaking engagements, corporate entertainment, public relations campaigns, commercials, or endorsements. We do not exclusively represent Christina Lekati or claim ourselves as the exclusive booking agency, business manager, publicist, speakers bureau or management for Christina Lekati or any other speaker or celebrity on this website. For more information on how we work and what makes us unique, please read the AAE Advantage.

Christina Lekati is a keynote speaker and industry expert who speaks on a wide range of topics such as Information Security Is Up Against Weaponized Psychology, How Cyber Attackers Profile & Target Key People Through Social Media, The Behavioral Science Influencing Your Cybersecurity Culture and When Your Biggest Threat is on Your Payroll: Drivers & Enablers of Insider Threats. The estimated speaking fee range to book Christina Lekati for your event is $10,000 - $20,000. Christina Lekati generally travels from Germany and can be booked for (private) corporate events, personal appearances, keynote speeches, or other performances. Similar motivational celebrity speakers are Mark Burnette, Michael Davis, Rachel Wilson, Gary Miliefsky and Avi Rubin. Contact All American Speakers for ratings, reviews, videos and information on scheduling Christina Lekati for an upcoming live or virtual event.

Christina Lekati Speaking Topics

  • Information Security Is Up Against Weaponized Psychology

    Social Engineering has become one of the most effective and efficient attack methods used to initiate and enable cyber attacks. We read in the news about large-scale security violations, where investigators are not able to understand the phase of initiation. Most often, a social engineering attack is involved. By design, this is the type of attack that moves in the shadows, delivered by criminals and state-sponsored agents that are able to blend in multiple environments and often leave no trace, making it very difficult to identify the point of initial compromise. Similar to warfare operations, these threat actors strive to create an asymmetrical advantage based on a carefully planned strategy.

    Cybersecurity today is not only a technical challenge.

    It is also a behavioural challenge. As long as executives, managers and employees can provide access to critical assets, systems, and data, attackers will be targeting them through social engineering schemes in order to acquire this access. Those who have access to technology and organizational assets have also become responsible for protecting those assets. Do you or your colleagues make the perfect target?

    Weaponized psychology has started becoming a tool employed to infiltrate organizations in the public and private sectors, steal sensitive information, recruit insiders, and help attackers breach organizational security.

    This talk provides insights on the mechanisms and the methodology of today’s elaborate social engineering attacks and explains the increasingly growing threat of weaponized psychology. It will also discuss how attackers elicit information that assists them in initiating or delivering an attack. The talk will include case studies and lessons learned on the use of weaponized psychology from the fields of business and human intelligence operations (HUMINT) in social engineering and in recruiting insider threats, as well as what makes some targets more attractive than others.

  • How Cyber Attackers Profile & Target Key People Through Social Media

    While to the rest of the world social media are friendly platforms of communication and sharing, for cyber attackers & malicious social engineers, they are targeting and information harvesting platforms. Even though social media do not always demonstrate our true personalities, they do demonstrate the way we want to be viewed and treated by others. This can be a lot more useful for attackers and social engineers who tailor their approach to their targets and lure them in through their victims’ personal wants and needs. In our social media profiles, we "leak" behavioral tendencies and characteristics that provide significant intelligence for any type of operation targeting humans.

    The talk covers the topic of information gathering through social media intelligence (SOCMINT), and explains how even seemingly innocent information can be used to manipulate or influence targets. Case studies will be provided.

    It also discusses the art & science of profiling, along with its limitations for social engineering. A two-part demonstration is included on how a profiler’s mind works when harvesting information on social media:

    The first part includes real examples of posts that expose vulnerabilities, attract attackers and ultimately can be exploited and lead to a security breach.

    The second part dives deeper and demonstrates how the information found on a social media profile (from the pictures to the words used by an individual in their captions) are gathered, categorized into a profiling matrix and then analyzed, bringing into the surface a personality profile. The target's profile can then provide actionable intelligence that increases the success of attacks, or attack simulations.

    Real life case examples will be provided.

  • The Behavioral Science Influencing Your Cybersecurity Culture

    What does it take from a cybersecurity professional to be heard in their organization and spread their message about the importance of cybersecurity to both the leadership and the other employees? And if that wasn’t already hard enough, what does it take to lead behavior change and build a cybersecurity culture? It has become clear that technical cybersecurity measures need to operate in harmony with, and to be applied from people. Today’s employees need to practice good cyber security habits to protect the assets they handle and their organization. However convenience, productivity requirements, and other organizational realities are often competing in people’s heads; and it makes them conclude that cybersecurity is simply an “inconvenience” that they soon decide to ignore. On the other hand, security professionals -who were originally focused on securing technology alone, are now tasked with a vastly different requirement: to lead behavioral change within their organization. This topic discusses the psychological elements & behavioral science involved in shifting the user’s perspectives towards cybersecurity and driving behavior change. It discusses what drives motivation, people’s perception of risk & reward, the psychology of willful compliance, and more.

    Ultimately, this topic helps security managers & executives to more effectively communicate & implement the necessary cybersecurity requirements that employees need to practice within their organization.

  • When Your Biggest Threat is on Your Payroll: Drivers & Enablers of Insider Threats

    It is an irony in organizational security: Although so much capital is invested in the protection of the organizational assets against external threats, some of the largest compromises have occurred as a result of insider threats, sometimes resulting in irrecoverable damage, reputation risk, and liability. This type of threat is more important for organizations that are part of the critical infrastructure and industries where intellectual property and the protection of sensitive information are critical elements for their operations. Employees in security-focused environments learn to treat outsiders with suspicion and to maintain trust boundaries. However, it is often the case that once an “outsider” enters the payroll of an organization they are given a "carte blanche" in terms of trust and disclosure of information. They are now treated as the "insiders" that they are• members of the same tribe, fighting and working towards the same goals and using their skills to benefit their organization. Employees do not always realize that some “colleagues” consider the exploitation of organizational weaknesses a high-reward activity that serves their personal interests better than loyalty to the employer.

    This presentation aims to shed light on the challenging topic of insider threats. It will discuss the motives that lead employees to unauthorized disclosure of sensitive information, process corruption, electronic sabotage, and/or the facilitation of third-party access to organizational assets. Research has repeatedly found a clear link between insider activity taking place and exploitable weaknesses in an organization’s security and management processes. Therefore, this talk will go on discussing the organizational factors enabling insider threat operations as well as countermeasures against them, by combining the lessons learned on insider activity prevention from the fields of counterintelligence, psychology, and cyber-security.

Christina Lekati Speaker Videos

  • Keynote Presentation SecIT by Heise - Christina Lekati

Tell us about your event!

During normal business hours, we respond to most inquiries within 4 hours.

  • Customized Service

    Our agents find the right fit for your event

  • Unparalleled Database

    Full access to all speakers & celebrities

  • One Stop Shopping

    A reliable and unbiased point of contact

  • Logistics Management

    Your personal Logistics Manager who takes care of all event details

Speakers Similar to Christina Lekati

This website is a resource for event professionals and strives to provide the most comprehensive catalog of thought leaders and industry experts to consider for speaking engagements. A listing or profile on this website does not imply an agency affiliation or endorsement by the talent.

All American Entertainment (AAE) exclusively represents the interests of talent buyers, and does not claim to be the agency or management for any speaker or artist on this site. AAE is a talent booking agency for paid events only. We do not handle requests for donation of time or media requests for interviews, and cannot provide celebrity contact information.

If you are the talent, and wish to request removal from this catalog or report an issue with your profile, please click here.

TOP

The 2022 Speaking Industry Benchmark Report