C
CIOPages
Back to Glossary

Security & Risk

Social Engineering

Social Engineering encompasses the psychological manipulation techniques used by attackers to deceive individuals into divulging confidential information, granting unauthorized access, or performing actions that compromise security—exploiting human trust, authority, urgency, and helpfulness rather than technical vulnerabilities.

Context for Technology Leaders

For CIOs, social engineering exploits the most difficult vulnerability to patch: human behavior. Attackers use techniques ranging from simple pretexting (impersonating IT support) to sophisticated multi-stage campaigns that build trust over weeks before making a malicious request. Enterprise architects must design security controls that account for human fallibility—assuming that social engineering will occasionally succeed and building verification requirements, access controls, and detection mechanisms that limit the damage. The rise of AI-generated deepfake voice and video adds a new dimension to social engineering threats.

Key Principles

  • 1Psychological Exploitation: Social engineering leverages cognitive biases—authority (impersonating executives), urgency (immediate action required), reciprocity (doing a favor), and social proof (everyone else has done this).
  • 2Trust Manipulation: Attackers build trust through legitimate-appearing interactions, using accurate information about the target and organization to establish credibility before making malicious requests.
  • 3Defense in Depth: No single control prevents social engineering; effective defense combines awareness training, verification procedures, technical controls, and organizational culture.
  • 4Culture of Verification: Organizations must foster a culture where employees feel empowered to verify unusual requests—even from apparent executives—without fear of repercussion.

Strategic Implications for CIOs

CIOs should invest in building a security culture where verification is expected and rewarded, not penalized. Enterprise architects should design systems and processes that require multi-factor verification for sensitive actions, reducing reliance on any single person's judgment. Regular social engineering testing—phone pretexting, physical security tests, and phishing simulations—identifies vulnerabilities and reinforces training. The emergence of AI-powered deepfakes will escalate social engineering threats, requiring organizations to establish strong out-of-band verification procedures.

Common Misconception

A common misconception is that social engineering only targets junior employees. In reality, executives are prime targets (whaling/CEO fraud) because they have authority, access, and are often too busy to verify unusual requests carefully. Security awareness programs must include tailored training for all organizational levels.

Related Terms

PhishingSpear PhishingPretextingSecurity Awareness TrainingInsider Threat