CyberWire Daily - Rachel Tobac: Find a way to laugh. [CEO] [Career Notes]
Episode Date: February 19, 2023Rachel Tobac, CEO from SocialProof Security sits down to share her amazing story on becoming what's known in the industry as an ethical hacker and CEO of a company. Rachel shares how she was always fa...scinated with spy movies and as she grew older that fascination turned into a real desire. Finding out she liked learning how the human brain works, she decided to start off in neuroscience. Wanting a change and with the help of her husband she was able to start getting more into hacking, finding she loved the fact that she was pretending to be someone to hack into a company and finding the weak spots. She shares how as a leader now she likes to beĀ authentic with her team. She says "I think in the security world sometimes we take ourselves pretty seriously and a lot of times it's because we're dealing with really serious topics, and so in the moment we have to be extremely serious, but when you get a five minute break in between your crisis meetings, find a way to laugh if you can." We thank Rachel for sharing her story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyber Wire Network, powered by N2K. and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks
and a $75 million record payout in 2024. These traditional security tools expand your attack
surface with public-facing IPs that are exploited by bad actors more easily than ever with AI tools.
It's time to rethink your security. Thank you. Learn more at zscaler.com slash security. My favorite movie growing up was Harriet the Spy, which is probably not a super big surprise.
I carried around a little notebook and wrote observations about my life and hoped that I could use that.
For what, I don't know. I was only a child.
But I think that really kind of helped me predict how I would use my skills later in life.
I have a very non-traditional path to InfoSec.
I went to school for neuroscience and behavioral psychology.
I worked in a rat lab.
I was a teacher.
I led a UX research team.
Now I'm a hacker and CEO.
So it's pretty different than people might expect. I was always interested in the human brain and how people make decisions,
how they are persuaded. So I knew that I wanted to go into neuroscience right after I took AP Psych.
into neuroscience right after I took AP Psych. And I went through all of that pre-med stuff,
which was grueling. And I was trying to figure out what it is that I could do in my career. And I didn't want to work in the basement in a rat lab anymore. I wanted to go out and be in
the sunlight with people because I like the human element of everything. So I was like,
you know what? I'm going to use my skills and I'm going to be a teacher. So I was a teacher for children with disabilities
and I absolutely loved that job.
I moved from the Pittsburgh, Pennsylvania area
to the San Francisco Bay Area.
And I'm like, you know what?
I think it's time for a change.
Maybe I want to try something else.
And my friend living in Silicon Valley goes,
well, you know, you're really close to Silicon Valley.
You could work in tech. And I, no joke, go, what's that? Like, did not know what Silicon
Valley was. And she was like, are you serious? You live like 10 minutes away from where Facebook,
Twitter, Instagram, like all that stuff where all that stuff was built. I was like, oh, okay,
let me look into that. Like, that's how much of a tech noob I was.
into that. That's how much of a tech noob I was. I applied to 100 tech-based roles.
And I ended up getting about 15 interviews from that, five final interviews and three offers.
That was the path. And I ended up taking a job at an ed tech company, which felt like a really fitting position because of course I just came from education. So worked in the ed tech role, started as a community manager,
worked my way up to a senior community manager. Then I started the UX research function at the
company and became a UX research lead, which really just married a lot of my interest in
all the studies that I did in college. So I was able to
lead that function there. And while I was at that company, my husband was like, hey, you should come
to this cool conference in Vegas. It's called DEF CON. And I'm like, nah, I'm okay. I'm good.
And he's like, no, I really, really think you would like it. So I was like, all right, I'll go.
I ended up seeing a few calls and was like, oh, absolutely. I want to do that. So I ended up competing at DEF CON, applied, made a really weird
Twin Peaks style application video and ended up getting in and competing and getting second into InfoSec. It was pretty organic, actually. So from DEF CON, people started reaching out and
saying, hey, I saw you live competing at DEF CON. Will you come to my company and talk about how you
hack and how we can avoid falling for your tricks? So I started doing that and had a bunch of the big names in Silicon Valley as my clients.
And I was like, I should probably LLC to protect myself.
So I created my LLC.
It was first things like keynotes, and then social engineering prevention training,
then security awareness training, protocol update workshops to change the way that you verify identity
through customer support flows, one of my main ways of attacking,
and then from there, penetration testing.
The majority of my week are virtual live programming and events.
So companies will ask me to come in and do a live hacking demonstration
and walk through with their executives or their all-hands style team or their finance team about how specifically they would get hacked and how they can avoid falling for those tricks and what technical tools to implement so that they don't have to just rely on the human element of security.
And then other calls throughout the day that pop up are usually random media requests.
Other weeks, it's different. Other
weeks, it's things like I have a pen test and I've pretty much blocked off the rest of my week so
that I can actually hack the company. It's kind of silly, but it's like a little bit like method
acting where you kind of have to stay within your role. Like if I'm doing that, I try not to mix and
match and have to be myself and also my pretext. I try to just be as authentic as I can possibly be. I feel like
a lot of people, when they get into a position of leadership, they can get a little stuffy and a little, I don't know, like corporate speak. I try to stay
professional while at the same time maintaining my personality because I don't know. I like to
laugh. I think it's fun. And like having fun, witty banter with people doesn't make you any
less of a leader. I think sometimes people get confused about that. The way that I deal with adversity is through humor, usually. I find I
get a lot of perspective when I can take a step back and laugh at something, whether it's like
a meme on TikTok or an SNL sketch or just going and watching live improv or just laughing at whatever's going on
in my life in general. I think in the security world, sometimes we take ourselves pretty
seriously. And a lot of times it's because we're dealing with really serious topics. And so in the
moment, we have to be extremely serious. But when you get a five-minute break in between your
crisis meetings, find a way to laugh if you can. Otherwise, you might drive yourself wild.
I hope that people look back at the work that I've done and they think, man, it's really annoying to try to hack into companies now.
I hope scammers, cyber criminals and even pen testers think, oh, Rachel was here.
I can tell because I just tried to call their customer support team or their finance team
or I texted their exec team
and I tried to get them to go to this link
or install this remote access software
or send a check to this different bank
and they wouldn't do it.
They have a second method of communication
and they have a password manager
and they have all these MFA tools that they use
and it's just annoying.
I hope people see that and they think, wow, Rachel was here.
Cyber threats are evolving every second, and staying ahead is more than just a challenge. Thank you. to give you total control, stopping unauthorized applications, securing sensitive data, and
ensuring your organization runs smoothly and securely.
Visit ThreatLocker.com today to see how a default-deny approach can keep your company
safe and compliant.