Directors & Boards x VanishID Webinar: How to Be Seen But Not Found

VanishID CEO Matt Polak joined David Shaw of Directors & Boards on December 18, 2025 for a conversation about “The Visibility Paradox”. Your personal security measures mean nothing if your family is exposed. Matt Polak reveals why threat actors are... Read More

Family Business Magazine x VanishID Webinar: Digital Exposure, The Hidden Security Threat to Family Businesses

VanishID CEO Matt Polak joined Family Business Magazine in November 2025 to talk about how the line between work and home doesn’t exist anymore. Especially not for threat actors. Digital breadcrumbs lead to very real threats. As Matt explained: “They’re... Read More

Unicon 2025 Fall Edition: Virtual Fireside Chat: Stories from the Front Lines

VanishID CEO Matt Polak and Bugcrowd Founder Casey Ellis discuss real-world horror stories from cyber and physical security, and how human risk intelligence and attack surface management help organizations stay protected. As pioneers in digital footprint protection and executive security,... Read More

Podcast Interview – The Pulse on the CISO Community

Whether you are a cybersecurity professional, a product marketer, or a cybersecurity start-up founder, you will find this episode of Picnic Podcast Interviews very insightful. On this occasion, Matt Polak (Founder & CEO of Picnic) interviews Jason Cenamor, Founder & Chief... Read More

Podcast Interview – The Intersection Between Privacy, AI, and Cybersecurity

If you are a GRC professional or a Cybersecurity practitioner, you will find this episode of Picnic’s Podcast Interviews very timely and relevant. Matt Polak, CEO of Picnic, hosts a panel discussion with guests Tom Kemp and David Ross. Tom is the author of... Read More

Podcast Interview – Lt. General (ret.) Charles Moore, fmr. Deputy Commander, US Cyber Command

We are thrilled to share with you a podcast interview with Lt. General (ret.) Charles Moore, also known as “Tuna.” Tuna is a former F-16 Pilot (hence the callsign), Squadron Group Commander, Wing Commander, and former Deputy Commander of the US... Read More

Picnic Demo at UniCon24

Ben Andreas, VP of Managed Services at Picnic, offers a demo of the digital risk protection services (DRPS) platform to the attendees of UniCon24, a virtual day-long event hosted by Scythe and sponsored by Picnic. Read More

Uniting Pre and Post-Access Threat Defense

In this session, recorded on 02/05/2024, Picnic and Scythe joined forces to offer a perspective on prevention that spans the entire kill chain. Learn how attackers conduct target reconnaissance pre-access by leveraging OSINT and exploiting human vulnerabilities. Discover how emulating... Read More

Introduction to Picnic

If you want to learn about Picnic and how we protect the human attack surface with digital risk protection services, this is the webinar to watch. Matt Polak, CEO and founder of Picnic, explains the rationale behind Picnic’s approach to... Read More

Mitigating Credential Compromise and Preventing Credential Stuffing Attacks

Did you know credential compromise was the single largest source of breaches last year?* That’s why incorporating credential-stuffing security practices into your organization’s security strategy is more crucial than ever. In this webinar, we dive deep into the methods used by adversaries... Read More

Cybersecurity and the Human Element: Knowing your full attack surface to prevent employee compromise

Webinar with Scott Goodhart, CISO Emeritus We talk with Scott Goodhart, CISO Emeritus, on the importance of knowing your human attack surface and how to manage exposed employee data to mitigate social engineering and credential compromise risk. Read More

Preventing the Exploitation of Public Data: How Cybersecurity Teams Can Disrupt Attacker Reconnaissance

Webinar with Dr. Max Kilger We talk with Dr. Max Kilger, Director of the Data Analytics Program and Associate Professor of Practice at the University of Texas at San Antonio, about how cybercriminals harness big data to find pathways to... Read More

Social engineering: Challenges and solutions in enterprise cybersecurity

Webinar with Jim Routh In this webinar, we talk with Jim Routh, a former CSO and CISO, and current board member, advisor, and investor about the problem of social engineering for enterprises, traditional approaches and difficulties for security professionals in protecting against... Read More

Improving the SOC team’s posture against social engineering attacks

SANS Cyber Solutions Fest ’22 Webinar with Jim Somborovich, Cybersecurity Leader and Veteran (USMC) SOC teams have historically not had adequate visibility of the public data footprint of their organization and its people beyond the firewall. This lack of visibility,... Read More

Preemptive visualization and neutralization of social engineering pathways

SANS Blue Team Summit ’22 Webinar with Manit Sahib, Picnic Director of Global Threat Intelligence More than 90% of all cyberattacks start with social engineering campaigns which are specifically crafted from users’ OSINT. Security teams have historically not had adequate... Read More

Managing the human attack surface of critical infrastructure: Social engineering tactics and defense

Webinar with Robert M. Lee, Dragos Founder and CEO As traditional infrastructure has become sufficiently hardened, hackers have turned to human-hacking, or social engineering–the practice of manipulating people to get them to perform a desired action–in order to bypass security... Read More

SANS webinar: Know your attack surface from the outside in

SANS First Look Webcast with Matt Polak, Picnic Founder and CE0 An attacker needs very little other than open source intelligence (OSINT) to profile an organization or individual successfully. But OSINT can also be used to protect against social engineering. In this... Read More

Copyright © 2019 – 2026 Picnic Corporation (dba VanishID)