The Human Element: Social Engineering in Offensive Security

Vulncon 2025

15 June 2025

Highlight the role of social engineering in offensive strategies. Discuss techniques like phishing, pretexting, and baiting, and how attackers exploit human psychology to gain unauthorized access. Share insights on training and awareness programs to bolster human defenses against such tactics.

Panel Discussion Video

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This CXO panel discussion at VULNCON 2025 explored “The Human Element: Social Engineering in Offensive Security.” Moderated by Divakar Prayaga, the panel featured Rex Pushparaj (Founder & CEO, Rex Cyber Solutions), Navdeep Aggarwal (Product Security Leader, GE Healthcare), and Anant Shrivastava (Founder & Chief Researcher, Cyfinoid Research).

Panelists

Key Themes

1. Real-World Social Engineering Attacks

2. Healthcare Industry Vulnerabilities

3. Evolving Attacker Techniques

4. Cultural Factors in Social Engineering

5. HR, Finance, and Sales as Primary Targets

6. CXO Targeting — The New Normal

7. Defensive Measures and Technology Solutions

8. Rewarding Good Security Behavior

9. Pretexting and Baiting Techniques

10. Red Teaming Ethics and Boundaries

11. Brand Monitoring vs. Offensive Security

12. Insider Threats and the CISO’s Role

Key Takeaways

  1. Social engineering remains unsolved by technology — technologists have collectively failed to provide a technical solution to this fundamentally human problem
  2. Modern attackers connect people and infrastructure — targeting both simultaneously in highly targeted, patient operations
  3. Cultural awareness is critical — trust-based cultures are more susceptible, and awareness programs must address this at a grassroots level
  4. Role-specific security training is essential — generic compliance-driven training is ineffective; HR, developers, sales, and CXOs each face unique attack vectors
  5. Reward good security behavior — transform phishing detection from a burden into an incentive-driven activity
  6. Supply chain attacks through development tools (GitHub, VS Code) represent a growing and underappreciated threat vector
  7. Start with fundamentals — get baselines, policies, and role-based access right before investing in advanced red teaming
  8. The eighth layer of the OSI model is the human — and it remains the weakest link in the security chain
  9. Every organization must clearly define who is responsible and who is accountable for security outcomes
  10. One alert defender can break an entire attack chain — invest in making the human element the strongest link, not just acknowledging it as the weakest