Explore findings from a comprehensive, large-scale, and long-term study on phishing in organizations in this 23-minute IEEE conference talk. Delve into the methodology used, discover who is most susceptible to phishing attacks, and examine how vulnerability to such threats evolves over time. Learn about the effectiveness of embedded phishing training and the implementation of report phishing buttons. Gain valuable insights from the presenters' extensive research, and participate in a Q&A session to further understand the implications of this crucial cybersecurity topic.
Overview
Syllabus
Intro
Methodology
Who falls for phishing
How does phishing vulnerability change
Embedded phishing training
Report phishing button
Longterm study
Questions
Taught by
IEEE Symposium on Security and Privacy