The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex and North Texas Region. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software, and communications security, and the PUBLIC. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, the development of leadership and professional skills, and the advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.

The High Performance Fuel Powering Social Engineering

Chapter April 24, 2026 meeting event

Every day, millions of data points about YOU, regardless of your intent or awareness and whether public, leaked, scraped, or sold, are quietly feeding into an ecosystem (largely legal) of personal information.  This is not simply a personal privacy problem, it’s a lot more than that: It presents cyber risk and human attack surface to your organization. Threat actors such as Scattered Spider and Lapsus$ have effectively used this type of information to launch high profile and crippling attacks. Additionally, threat actors, now often trivially, use AI tools to weaponize that personal information at scale against both individuals and their organizations. What once required a non-trivial skillset in OSINT and social engineering can now be executed by anyone with a prompt and a profile or scraped data set – or worse, a team of AI agents.

This talk explores how exposed personal information is harvested, cross-referenced, and amplified by AI to create highly convincing phishing attacks, impersonations, extortion campaigns, deep fake scams, and automated fraud that bypass your security controls. Through real-world examples, live demonstrations, and hopefully some humor, we’ll break down how your digital footprint becomes an additional attack surface that has historically gone unmanaged.  We’ll also talk about practical steps individuals and organizations can take to detect, reduce, and defend against information leakage and the resulting AI-driven targeting. Attendees will leave with a clear understanding of the risks, the emerging threat landscape, and the actionable privacy practices that will increasingly matter.

Glen Sorensen is a Recovering CISO/vCISO-Type and is presently a Solutions Engineer with DeleteMe. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership, including leading the security program for a credit union and for smaller organizations in a fractional role. He currently focuses on how exposed information and OSINT are weaponized in conjunction with AI toward social engineering attacks, and how that factors into greater enterprise cyber risk.

Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 20+ years, depending on how much misspent youth you count.  He is a privacy geek and a sucker for a good tabletop exercise, and also serves as an Incident Master for HackBack Gaming, which puts his countless hours of roleplaying game experience to work teaching people about cybersecurity and incident response.

2026April_Webinar Registration
How Did You Hear About The Webinar *

About Us

Our chapter provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques.