Explore the dark side of influence and social engineering in this 54-minute conference talk from Converge 2015. Delve into topics such as the identity paradox, risk management, and how to stop hackers. Learn about the concept of "unfluence" and the Office of No. Examine ideas from Bruce Schneier on randomness and access intent knowledge. Understand buffer overflow attacks, both technical and human. Discover the power of embedding stories and observation techniques. Study risk assessment methodologies, including Jack Jones' risk equation and risk management steps. Gain insights into pretext creation, rapport building, and effective communication strategies for security professionals. Analyze the impact of social media platforms like Twitter on influence and security. Conclude with a discussion on trading programs and their relevance to information security.