Overview
Syllabus
Introduction
Threat vectors
Fishing
Exploits
Breaches
Alarms
Costs
Quick justification
The total cost
Credential losses
Business email losses
Security awareness programs
Security software
Security doesnt matter
Shifting demographics
Generation X
Training from top to bottom
Sample questions
Reporting
Training Modules
Domains for the Fish
Statistics for the Fish
Repeat Offenders
Global Availability
Gartner Magic Quadrant
Your Network
Establish a Plan
Cyber Assessment
Training URL
Announcement URL
Cybersecurity Assessment Module
Whitelisting Your Domains
First Phishing Attack
Schema Fight
Results
Other Fishing Controls
Final Thoughts
Taught by
RSA Conference