Red Phish, Blue Phish: A New Approach to Phishing Simulations

Posted on in Presentations

Phishing: everyone does it but not often with customized exercises and phishing risk modeling. Why not test like an attacker would and find the true protections of your technology while testing the full spectrum of phishing attacks? This session will show you how to apply a phishing risk model by calculating your risk by assets, defenses and susceptibility.

Learning Objectives:
1: Learn why the phishing model in most companies is broken.
2: Learn how phishing risk models can solve the problem of ineffective testing.
3: Learn how this can be done at your own organization.

Samantha Davison


Security Engineering Manager – Offensive and Behavioral, Lyft

Mike Mackintosh


Security Engineer, Snap Inc.

risk management security awareness social engineering risk & vulnerability assessment hackers & threats


Share With Your Community