New Blog Post | Setting up a New Phish Simulation Program - Part Two

%3CLINGO-SUB%20id%3D%22lingo-sub-2436970%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Setting%20up%20a%20New%20Phish%20Simulation%20Program%20-%20Part%20Two%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2436970%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1623357809491.jpeg%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F287932i4FDB8BF8E9C08556%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1623357809491.jpeg%22%20alt%3D%22JasonCohen1892_0-1623357809491.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fsetting-up-a-new-phish-simulation-program-part-two%2Fba-p%2F2432167%22%20target%3D%22_blank%22%3ESetting%20up%20a%20New%20Phish%20Simulation%20Program%20-%20Part%20Two%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EIn%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fsetting-up-a-new-phish-simulation-program-part-one%2Fba-p%2F2412854%22%20target%3D%22_blank%22%3Efirst%20part%20of%20this%20blog%3C%2FA%3E%2C%20we%20covered%20how%20to%20determine%20your%20Program%20Goals%20and%20what%20Resources%20and%20Dependencies%20you%20would%20need%20for%20a%20successful%20program.%20In%20this%20part%2C%20we%E2%80%99ll%20be%20covering%20the%20other%20critical%20questions%20you%E2%80%99ll%20need%20to%20answer%20to%20fully%20land%20your%20program%20for%20maximum%20success.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20are%20interested%20in%20going%20deep%20to%20get%20strategies%20and%20insights%20about%20how%20to%20develop%20a%20successful%20security%20awareness%20training%20program%2C%20please%20join%20the%20discussion%20in%20this%20upcoming%20Security%20Awareness%20Virtual%20Summit%20on%20June%2022%3CSUP%3End%3C%2FSUP%3E%2C%202021%2C%20hosted%20by%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fterranovasecurity.com%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ETerranova%20Security%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eand%20sponsored%20by%20Microsoft.%20You%20can%20sign%20up%20to%20attend%20by%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fterranovasecurity.com%2Fsecurity-awareness-virtual-summit-2021%2F%3Futm_campaign%3DEn_SAVS2023%26amp%3Butm_medium%3DMicrosoft%26amp%3Butm_source%3DPartner%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Eclicking%20here%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2436970%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1623357809491.jpeg

Setting up a New Phish Simulation Program - Part Two - Microsoft Tech Community

In the first part of this blog, we covered how to determine your Program Goals and what Resources and Dependencies you would need for a successful program. In this part, we’ll be covering the other critical questions you’ll need to answer to fully land your program for maximum success.

 

If you are interested in going deep to get strategies and insights about how to develop a successful security awareness training program, please join the discussion in this upcoming Security Awareness Virtual Summit on June 22nd, 2021, hosted by Terranova Security and sponsored by Microsoft. You can sign up to attend by clicking here.

 

0 Replies
www.000webhost.com