Red Phish, Blue Phish: A New Approach to Phishing Simulations


Posted on in Presentations

Phishing: everyone does it but not often with customized exercises and phishing risk modeling. Why not test like an attacker would and find the true protections of your technology while testing the full spectrum of phishing attacks? This session will show you how to apply a phishing risk model by calculating your risk by assets, defenses and susceptibility.

Learning Objectives:
1: Learn why the phishing model in most companies is broken.
2: Learn how phishing risk models can solve the problem of ineffective testing.
3: Learn how this can be done at your own organization.


Participants
Samantha Davison

Participant

Security Engineering Manager – Offensive and Behavioral, Lyft

Mike Mackintosh

Participant

Security Engineer, Snap Inc.

risk management security awareness social engineering risk & vulnerability assessment hackers & threats


Subtopic


Share With Your Community