CSO's Ultimate Guide to Social Engineering

Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.

So how do you secure people against these tactics? Storytelling, education, processes, and other methods all come into play. CSO's Ultimate Guide to Social Engineering, gathered from CSO's popular interviews with social engineering experts, provides a complete look at common techniques in both attack and defense.

This 13-page pdf is available for download by registered CSO Insiders only.

What's in the Ultimate Guide:

Social engineering defined

How social engineers work and the psychology they rely on

Awareness and prevention techniques

Lots of examples of social engineering in action

To become a CSO Insider, follow the instructions below. When you have registered (or signed in), you will be returned to this page with directions on downloading the Ultimate Guide. You will also have access to all CSO Insider material including other Ultimate Guides and much more.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.

Show Comments