Download pdf
Phishing: everyone does it but not often with customized exercises and phishing risk modeling. Why not test like an attacker would and find the true protections of your technology while testing the full spectrum of phishing attacks? This session will show you how to apply a phishing risk model by calculating your risk by assets, defenses and susceptibility.

Learning Objectives:
1: Learn why the phishing model in most companies is broken.
2: Learn how phishing risk models can solve the problem of ineffective testing.
3: Learn how this can be done at your own organization.