Most successful data breaches are initiated by human hacking. Threat actors carefully select, assess, and manipulate key employees within a target organization who, in turn, become the “insider threat.” Advanced social engineering techniques are employed to effectively circumvent the policies, procedures, and technological controls put in place to safeguard proprietary information, client data, and sensitive personnel records. For over 20 years of his career with the Central Intelligence Agency, Peter developed expertise in the identification, assessment, and manipulation of insiders to breach the security of target organizations in pursuit of high-value foreign intelligence. He now shares his insight to help protect organizations and employees against external threats.