As additional background, read the following articles: https://www.ijcsi.org/papers/IJCSI-13-6-129-135.pdf
https://www.knowbe4.com/hubfs/2020PhishingByIndustryBenchmarkingReport.pdf
In your analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on a Saudi organization. Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation.