Foreword
I can still remember the first time I even heard about Sharon Conheady from a friend in the UK. He said, “Hey do you know Sharon, she does what you do, but she is much smaller and waaaayyyyyy cuter than you.”
Of course I had to know who this person was. A short time later, Sharon and I started a conversation online and before long she was on my podcast and was one of the only women I knew actively doing social engineering. We interviewed her about being a social engineer in the UK and how different the laws are there than here in the United States.
The crew and I at www.social-engineer.org run a contest every year at DEF CON in Las Vegas and one year we invited Sharon to give a speech on what it’s like to work as a woman in this field. ...

Get Social Engineering in IT Security: Tools, Tactics, and Techniques now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.