This document discusses social engineering and how it enables unauthorized access. It begins by providing background on Edward Snowden's theft of classified NSA documents, which was enabled by social engineering tactics. It then explores the implications of social engineering attacks, why information security programs often fail to prevent them, and common types of social engineering attacks both from insiders and outsiders. Key social engineering tactics like exploiting human tendencies towards liking, authority, and scarcity are also examined. The document suggests training should focus on increasing social intelligence and empowering critical thinking to help inhibit social engineering attacks.