CybHER Conversation - From Black Badge to Red Team: Alethe Denis on Social Engineering and Offensive Security
- Date:
- June 13, 2025
- Location:
- CybHER Youtube Channel

Session Summary
In this CybHER Conversation from June 2025, Alethe Denis, a Senior Security Consultant on the Red Team at Bishop Fox, shares her journey and expertise in cybersecurity. As a social engineering expert and DEF CON Black Badge Hall of Fame inductee (2019), Alethe provides valuable insights into the world of offensive security, particularly focusing on red team operations and social engineering.
The conversation covers Alethe's non-traditional path into cybersecurity, her current role simulating attacks to test organizational defenses, and the critical relationship between red teams (attackers) and blue teams (defenders) in maintaining robust security postures. Throughout the discussion, she emphasizes the importance of ethical considerations, human psychology, and professional communication skills in cybersecurity work.
Key Takeaways
- Understanding Cybersecurity Fundamentals
- Industry Structure: Cybersecurity fundamentally involves two complementary teams: defenders (blue team) who protect data and systems, and attackers (red team) who validate that security controls work properly.
- Mission Critical: The primary goal is protecting people and their data within organizations as information is shared across networks and with external parties.
- Collaborative Process: Red teams and blue teams work together, with red teams helping to identify vulnerabilities and blue teams implementing fixes to strengthen security posture.
- Red Team Operations & Methodology
- Simulated Attacks: Red teams conduct authorized attacks against organizations to test security defenses and identify vulnerabilities before real attackers can exploit them.
- Trophy Objectives: Red team engagements often involve a specific goal or "trophy" that the team must reach by finding the most efficient path through security controls.
- Comprehensive Reporting: After testing, red teams provide detailed reports documenting vulnerabilities, attack paths, and specific recommendations for improving security.
- Anonymous Reporting: Alethe emphasizes the importance of anonymizing findings to focus on systemic issues rather than individual mistakes.
- Social Engineering Expertise
- Human Vulnerability: Social engineering exploits human psychology rather than technical vulnerabilities, making it particularly effective and difficult to defend against.
- Ethical Boundaries: Alethe maintains strict ethical boundaries in her work, avoiding fear-based or highly manipulative tactics even when they might be effective.
- Bias Exploitation: Unconscious biases often create security vulnerabilities that can be exploited, such as assumptions about what a "typical hacker" looks like.
- Advanced Techniques: Modern social engineering now incorporates technologies like deep fakes, which Alethe uses in her work to simulate increasingly sophisticated attacks.
- Career Path in Cybersecurity
- Non-Traditional Route: Alethe's path into cybersecurity was unconventional, coming from various industries and leveraging transferable skills from different professional experiences.
- Entry Points: Multiple pathways exist into the field, including military service, traditional education, certifications, and internships/apprenticeships.
- Continuous Learning: The field requires ongoing education as threats and technologies constantly evolve—standing still means falling behind.
- Networking Importance: Building and maintaining professional relationships is crucial for career growth and finding opportunities in the industry.
- Professional Development & Skills
- Technical Foundation: Problem-solving skills, critical thinking, and technology aptitude form the foundation of cybersecurity work.
- Communication Excellence: Strong written and verbal communication skills are essential for conveying technical findings to non-technical stakeholders.
- Presentation Skills: Public speaking abilities help practitioners share knowledge and build credibility in the industry.
- Adaptive Mindset: Being open to emerging roles is vital as the cybersecurity landscape continues to evolve rapidly.
- Advanced Security Testing
- Tabletop Exercises: Alethe created a tabletop exercise service at Bishop Fox that helps organizations practice incident response without experiencing actual breaches.
- Physical Penetration Testing: Beyond digital security, Alethe conducts physical penetration tests to identify vulnerabilities in physical security controls.
- Proactive Planning: The goal is to prepare organizations before incidents occur—"you don't want to be reading the fire extinguisher instructions while the building's on fire."
- Cross-Team Coordination: Effective security requires coordination between technical and non-technical teams during incident response.
Who Should Watch
- Security professionals seeking to improve social engineering defenses will benefit from Alethe's expertise on human psychology and vulnerability testing
- Organizations considering red team assessments will better understand the process, benefits, and ethical considerations involved
- Blue team defenders looking to understand how attackers think and operate to strengthen defensive controls
- Women interested in cybersecurity who want to see representation and practical advice from a recognized female leader in the field
- Public speakers in technical fields will appreciate Alethe's candid discussion about overcoming speaking anxiety and developing presentation skills
- Students exploring cybersecurity careers will gain valuable insights into non-traditional entry paths and the diverse skills needed in the field