Главная
Study mode:
on
1
Introduction
2
Threat vectors
3
Fishing
4
Exploits
5
Breaches
6
Alarms
7
Costs
8
Quick justification
9
The total cost
10
Credential losses
11
Business email losses
12
Security awareness programs
13
Security software
14
Security doesnt matter
15
Shifting demographics
16
Generation X
17
Training from top to bottom
18
Sample questions
19
Reporting
20
Training Modules
21
Domains for the Fish
22
Statistics for the Fish
23
Repeat Offenders
24
Global Availability
25
Gartner Magic Quadrant
26
Your Network
27
Establish a Plan
28
Cyber Assessment
29
Training URL
30
Announcement URL
31
Cybersecurity Assessment Module
32
Whitelisting Your Domains
33
First Phishing Attack
34
Schema Fight
35
Results
36
Other Fishing Controls
37
Final Thoughts
Description:
Explore a comprehensive conference talk on the critical importance of implementing phishing simulations as part of an organization's security awareness program. Delve into facts, techniques, and a real-world case study that demonstrate why this practice is essential for modern security strategies. Learn about various threat vectors, the financial impact of breaches, and the evolving demographics of the workforce. Discover how to establish an effective phishing program, including setting up training modules, selecting phishing domains, analyzing statistics, and handling repeat offenders. Gain insights on conducting cyber assessments, whitelisting domains, and executing your first phishing attack. Examine the results of such programs and explore additional fishing controls to enhance your organization's overall security posture.

Phish Your Employees Now or Get Phished

RSA Conference
Add to list
0:00 / 0:00