Authentic tales from my time as a social engineer + lessons I’ve learnt as a email security professional.

James Linton Hacker

After social engineering my way into the inboxes of White House staff and Banking CEOs I then went to work in email security — it was very much the fairy tail ending.

For 3 years I manipulated BEC (Business Email Compromise) cyber-criminals into revealing specific intelligence which was then passed on to global financial institutions and law enforcement agencies.

Over the years I have delivered my authentic mix of spear phishing experiences and email threat intelligence to audiences in the US, UK, Europe and Australia. I am not a polished and slick presenter. But that’s half the charm. My enthusiasm and authenticity is what connects with the audience as I take them on a journey through the parts of security that I find fascinating.

If you want to deliver a security awareness message in a unique and engaging way, one with an authentic and thought-provoking story, then lets chat: hello@james-linton.com

Popular topics

  • Social Engineering. Why was I successful against Wall Street CEOs, The Bank of England, and the White House.
  • BEC – Business Email Compromise
  • Modern BEC cyber criminals: their tactics, techniques, and mindset
  • The EMAIL PRANKSTER™ days. A great way to show how social engineering works in the world of email, and how anyone — even Heads of Homeland Security (and other social engineers) can, and do, get caught out. Sets the scene perfectly for a dive into how destructive these tactics are when the intent is malicious.