Acknowledgments vii
Introduction 1
1 How Social Engineering Evolved 23
2 What Makes Social Engineering Possible 41
3 How CISOs Are Dealing with Social Engineering 65
4 Why Do People Fall for Social Engineering? 89
5 The Key Symptom 117
6 Performing an Accurate Diagnosis 135
7 Conducting a User Cyber Risk Assessment 159
8 From Cyber Risk to Cyber Hygiene 179
9 A Tale of Five Implementations 203
10 Reversing the Social Engineer's Advantages 225
Notes 247