Skip to content
View the Security Operations Center (SOC) Findings Report from RSAC™ 2025 Conference (PDF)
  • Offensive Security Services
    • Penetration Testing
    • Vulnerability Assessment
  • Compliance
    • Policy & Compliance
    • Security Architecture
  • Strategic Support
    • Threat Intelligence & Detection
    • Incident Response & Recovery
    • Education & Training
  • About
    • Meet the Leadership
  • News
    • Events
  • Contact Us
  • Offensive Security Services
    • Penetration Testing
    • Vulnerability Assessment
  • Compliance
    • Policy & Compliance
    • Security Architecture
  • Strategic Support
    • Threat Intelligence & Detection
    • Incident Response & Recovery
    • Education & Training
  • About
    • Meet the Leadership
  • News
    • Events
  • Contact Us
  • (918) 888-YETI

Day: January 31, 2024

No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger

Jayson Street, the dynamic chief adversarial officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “world-class hacker” on National Geographic’s “Breakthrough” series episode “Cyber Terror,” but he prefers the simpler title of “hacker, helper, and human.”

Social Engineer Reveals Effective Tricks For Real-World Intrusions

In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods for gathering target information.

Secure Yeti, a GSA-certified small business, was founded with one simple goal in mind—to make the world a more secure and safer place. With a focus on excellence and a dedication to safeguarding digital environments, Secure Yeti stands as a trusted partner in fortifying defenses against the ever-evolving landscape of cyber threats.

  • (918) 986-7060
  • (918) 321-0306
  • info@secureyeti.com
  • 427 S. Boston Ave. Suite 306 | Tulsa, Oklahoma 74103

Consulting Services

  • Education & Training
  • Policy & Compliance
  • Security Architecture
  • Vulnerability Assessment
  • Education & Training
  • Policy & Compliance
  • Security Architecture
  • Vulnerability Assessment

Managed Services

  • Incident Response & Recovery
  • Threat Intel & Detection
  • Incident Response & Recovery
  • Threat Intel & Detection
Facebook-f Twitter Linkedin
2026 © All Rights Reserved - Secure Yeti LLC. | Privacy Policy
  • Offensive Security Services
    • Penetration Testing
    • Vulnerability Assessment
  • Compliance
    • Policy & Compliance
    • Security Architecture
  • Strategic Support
    • Threat Intelligence & Detection
    • Incident Response & Recovery
    • Education & Training
  • About
    • Meet the Leadership
  • News
    • Events
  • Contact Us
  • Offensive Security Services
    • Penetration Testing
    • Vulnerability Assessment
  • Compliance
    • Policy & Compliance
    • Security Architecture
  • Strategic Support
    • Threat Intelligence & Detection
    • Incident Response & Recovery
    • Education & Training
  • About
    • Meet the Leadership
  • News
    • Events
  • Contact Us