Setting up a New Phish Simulation Program - Part One

Published Jun 03 2021 03:00 PM 3,804 Views
Microsoft

Introduction

The modern enterprise, of any size, faces a complex and dangerous threat landscape. Compliance risk and security threats, both internal and external, have to be managed with a dizzying array of technologies, processes, and subject matter experts. The security industry and every major cloud service provider will tell you that end user phishing is the most common and most successful breach vector for any modern organization. Microsoft 365 Security, Compliance, Identity, and Management (M365 SCIM) provides an integrated, holistic solution to these existential risks, including phish prevention. In this blog, we want to share our best practices for creating an effective and actionable end user phishing training program.

 

Every organization should start with a robust technical solution to eliminate the vast majority of phishing attempts on your organization. Microsoft Defender for Office 365 is an excellent option. The organization should then focus on creating a robust and capable security operations and administration team that can react and respond to successful phishing attacks, which will inevitably happen. You should hire good security and compliance operators, and then equip them with the right tools and resources to manage those risks.

 

Finally, we believe every organization should have a data-driven phish training and behavior modification program in place to help their employees first understand how to correctly identify phishing attempts and to help them take the correct action when those threats are identified. Below, we lay out our recommendations for appropriate program goals, resources, simulation construction, training, and measuring success.

Goals of the Program 

Phish training programs should have at least two main program goals:

  • Measure and track the organization's susceptibility to phishing. This goal, while simple sounding, is quite complex to achieve. Most organizations use a click-through rate on phish simulation exercises across the organization to determine their overall susceptibility, and then  adopt target click-through rates on simulations over time. For example, an org might run a simulation against all users at the beginning of the fiscal year, and measure that 21% of their users clicked the link of the credential harvesting phish simulation payload, and 15% actually gave up their credentials. They would then set their baseline compromise rate at 15% with a target to reduce it to 12% by the end of the fiscal year. This captures the extent to which the organization thinks users will do a 'bad' behavior in a phishing attempt. Good programs will go even further to measure whether the end user will do a 'good' behavior by reporting the phish message to security operations.

There are several problems with only using static click through rates to measure susceptibility. Phish clicking susceptibility depends, profoundly, on the quality of the payload being used. Attackers are known to use very cheap, generic payloads targeted at any user and can achieve high success rates. Specially crafted, high-targeted payloads directed towards high-value individuals are very difficult to detect, and have scary-high success rates. The best phish simulation solutions will leverage real-world payloads for their simulations, but program administrators are sophisticated enough to make an educated guess at whether any given simulation payload will have a higher or lower click-through rate based on its 'complexity' or 'difficulty'. This means that payload quality is the primary driver of your click through metric, and not actual end-user susceptibility.

  1. Click-through rates likely don't take into account the impact of any given individual being compromised, and don't take into account the coverage of your simulation metric. You might establish a cross-organization metric at annual, or semi-annual simulations, but a much smaller number of employees, who are targeted at much higher rates because of their perceived value to attackers, might be getting 10x the number of attempts. Large-scale, infrequent simulations miss out on the nuances of high risk populations to your overall susceptibility.
  2. There are many different kinds of phishing attacks, and if your organization is only measuring the click-through rates of credential harvesting attacks, you might find very different compromise rates for different types of phishing attacks such as malware downloads, illicit app consent grants, or drive-by phishing. Like payloads, the type of attack being leveraged can have a huge impact on the baseline click through rate.
  3. Phish susceptibility is driven by externalities such as attacker focus, frequency, end user behaviors required for their job function. It is important to remember that while click-through rate is a direct measure of end user behavior, that behavior isn't the only component of the overall phishing risk. If you assume that any user will eventually get tricked by a phishing attempt (which is a very safe assumption), the contours of that compromise is driven mostly by how badly the attacker wants to compromise that specific user, or whether that user's job requires them to click on a lot of links from external parties, or to open a lot of attachments sent from third parties. Your overall susceptibility is a function of both of these components.

 

  • Educate users on how to identify and deal with phishing attempts. This goal is the more measurable and achievable one of the program. Phish simulations provide you with an opportunity to engage end users in two types of learning. First, the user is exposed to a very realistic execution of what a real-world phishing attack will look like from the end-user's perspective.  Second, the user is connected to a differentiated training experience that explains how an attack works, and why it is important to prevent phishing. Most organizations have annual required corporate training topics, and so the key here is to balance the time burden of another training topic against the regular day job of its users. More on what the training experience should be like for end users below. Organizations should start with a strategy to differentiate the training in a way that connects directly to the users' knowledge and experience. Tracking completion rates, frequency, and productivity impact is a straightforward measure from there.

Resources and Dependencies

Phish training programs are a key element of any organizational strategy to address behavioral risk, but since the core mechanism behind these programs is interacting with your users in the same way that real world attackers are going to try to engage them, you should be very transparent and intentional in the creation of these programs. There are four key resources and dependencies you will need to fulfill to get your program up and running.

  1. Executive sponsorship. Starting at the highest levels of the organization, your CISO, CTO, and CEO should all have a clear understanding of the purpose and implementation of your program. Strategically, they should be bought into the idea that the best way to teach and learn is through authentic experiences, and in the case of phishing, that means actually trying to phish your users with real-world payloads. It is not uncommon for Boards of Directors and other oversight functions to require phish simulation programs for organizational members.
  2. Program owner. There are enough moving parts in creating and operating an effective phish program that having an individual responsible for the program is very common in the industry. Smaller organizations may have security admins operate the program overlapping with other duties, but if your org is mid-size or larger, we very often see dedicated people own and operate the program. Given the centrality of education to the mission, we've seen phish sim program owners align themselves with the security and compliance organization or human resources in equal measure. This person will be selecting payloads, determining simulation timing, selecting target groups, tracking metrics and results, and ensuring the end user experience is as educationally impactful as possible. Larger organizations may even employ a team of people to fulfill this mission.
  3. Tooling. While it is theoretically possible to perform a phishing exercise without an actual tool, or using open-source platforms, you'll need significant technical expertise and a lot of manual work to stitch together the entire picture. Our recommendation is to license and use a commercial phish simulation tool, that includes end user training, robust metrics, and a library of authentic payloads. Microsoft Defender for Office 365 has an excellent, integrated, no-config solution called Attack Simulation Training. For most of the technical requirements we lay out below, we'll assume that you are using the M365 Attack Simulation Training product.
  4. Security and Compliance stakeholder alignment. Your phish simulation program is doing something that most risk professionals worry about every day: exposing end users to attacker behavior. Users that don’t understand the purpose or context for these exercises can wreak havoc on normal security and compliance operations. They can cause big spikes in help desk escalations, and are fearful about why the organization is trying to catch them out by measuring their potential failure. Aligning your program goals, and mostly importantly it's execution, with your security operations is crucial for keeping everyone on the same page. Many organizations actually have their security operators perform the actual simulation creation. Ensuring your ops aren't overwhelmed with reports and escalations will maximize your results in the long run.
 

2021-06-02_10-21-35.jpg

Once you have these four key resources and dependencies in place, you can now work through the actual execution and analysis of your program.

 

Stay tuned for Part 2 of this blog where we’ll cover Targeting, Frequency, Payloads, Training, Operationalization, and Measuring Success.

If you are interested in going deep to get strategies and insights about how to develop a successful security awareness training program, please join the discussion in this upcoming Security Awareness Virtual Summit on June 22nd, 2021, hosted by Terranova Security and sponsored by Microsoft. You can sign up to attend by clicking here.

.

%3CLINGO-SUB%20id%3D%22lingo-sub-2412854%22%20slang%3D%22en-US%22%3ESetting%20up%20a%20New%20Phish%20Simulation%20Program%20-%20Part%20One%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2412854%22%20slang%3D%22en-US%22%3E%3CH1%20id%3D%22toc-hId-1354867059%22%20id%3D%22toc-hId-1354923754%22%3EIntroduction%3C%2FH1%3E%0A%3CP%3EThe%20modern%20enterprise%2C%20of%20any%20size%2C%20faces%20a%20complex%20and%20dangerous%20threat%20landscape.%20Compliance%20risk%20and%20security%20threats%2C%20both%20internal%20and%20external%2C%20have%20to%20be%20managed%20with%20a%20dizzying%20array%20of%20technologies%2C%20processes%2C%20and%20subject%20matter%20experts.%20The%20security%20industry%20and%20every%20major%20cloud%20service%20provider%20will%20tell%20you%20that%20end%20user%20phishing%20is%20the%20most%20common%20and%20most%20successful%20breach%20vector%20for%20any%20modern%20organization.%20Microsoft%20365%20Security%2C%20Compliance%2C%20Identity%2C%20and%20Management%20(M365%20SCIM)%20provides%20an%20integrated%2C%20holistic%20solution%20to%20these%20existential%20risks%2C%20including%20phish%20prevention.%20In%20this%20blog%2C%20we%20want%20to%20share%20our%20best%20practices%20for%20creating%20an%20effective%20and%20actionable%20end%20user%20phishing%20training%20program.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEvery%20organization%20should%20start%20with%20a%20robust%20technical%20solution%20to%20eliminate%20the%20vast%20majority%20of%20phishing%20attempts%20on%20your%20organization.%20Microsoft%20Defender%20for%20Office%20365%20is%20an%20excellent%20option.%20The%20organization%20should%20then%20focus%20on%20creating%20a%20robust%20and%20capable%20security%20operations%20and%20administration%20team%20that%20can%20react%20and%20respond%20to%20successful%20phishing%20attacks%2C%20which%20will%20inevitably%20happen.%20You%20should%20hire%20good%20security%20and%20compliance%20operators%2C%20and%20then%20equip%20them%20with%20the%20right%20tools%20and%20resources%20to%20manage%20those%20risks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFinally%2C%20we%20believe%20every%20organization%20should%20have%20a%20data-driven%20phish%20training%20and%20behavior%20modification%20program%20in%20place%20to%20help%20their%20employees%20first%20understand%20how%20to%20correctly%20identify%20phishing%20attempts%20and%20to%20help%20them%20take%20the%20correct%20action%20when%20those%20threats%20are%20identified.%20Below%2C%20we%20lay%20out%20our%20recommendations%20for%20appropriate%20program%20goals%2C%20resources%2C%20simulation%20construction%2C%20training%2C%20and%20measuring%20success.%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--452587404%22%20id%3D%22toc-hId--452530709%22%3EGoals%20of%20the%20Program%26nbsp%3B%3C%2FH1%3E%0A%3CP%3EPhish%20training%20programs%20should%20have%20at%20least%20two%20main%20program%20goals%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EMeasure%20and%20track%20the%20organization's%20susceptibility%20to%20phishing%3C%2FSTRONG%3E.%20This%20goal%2C%20while%20simple%20sounding%2C%20is%20quite%20complex%20to%20achieve.%20Most%20organizations%20use%20a%20click-through%20rate%20on%20phish%20simulation%20exercises%20across%20the%20organization%20to%20determine%20their%20overall%20susceptibility%2C%20and%20then%26nbsp%3B%20adopt%20target%20click-through%20rates%20on%20simulations%20over%20time.%20For%20example%2C%20an%20org%20might%20run%20a%20simulation%20against%20all%20users%20at%20the%20beginning%20of%20the%20fiscal%20year%2C%20and%20measure%20that%2021%25%20of%20their%20users%20clicked%20the%20link%20of%20the%20credential%20harvesting%20phish%20simulation%20payload%2C%20and%2015%25%20actually%20gave%20up%20their%20credentials.%20They%20would%20then%20set%20their%20baseline%20compromise%20rate%20at%2015%25%20with%20a%20target%20to%20reduce%20it%20to%2012%25%20by%20the%20end%20of%20the%20fiscal%20year.%20This%20captures%20the%20extent%20to%20which%20the%20organization%20thinks%20users%20will%20do%20a%20'bad'%20behavior%20in%20a%20phishing%20attempt.%20Good%20programs%20will%20go%20even%20further%20to%20measure%20whether%20the%20end%20user%20will%20do%20a%20'good'%20behavior%20by%20reporting%20the%20phish%20message%20to%20security%20operations.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EThere%20are%20several%20problems%20with%20only%20using%20static%20click%20through%20rates%20to%20measure%20susceptibility.%20Phish%20clicking%20susceptibility%20depends%2C%20profoundly%2C%20on%20the%20quality%20of%20the%20payload%20being%20used.%20Attackers%20are%20known%20to%20use%20very%20cheap%2C%20generic%20payloads%20targeted%20at%20any%20user%20and%20can%20achieve%20high%20success%20rates.%20Specially%20crafted%2C%20high-targeted%20payloads%20directed%20towards%20high-value%20individuals%20are%20very%20difficult%20to%20detect%2C%20and%20have%20scary-high%20success%20rates.%20The%20best%20phish%20simulation%20solutions%20will%20leverage%20real-world%20payloads%20for%20their%20simulations%2C%20but%20program%20administrators%20are%20sophisticated%20enough%20to%20make%20an%20educated%20guess%20at%20whether%20any%20given%20simulation%20payload%20will%20have%20a%20higher%20or%20lower%20click-through%20rate%20based%20on%20its%20'complexity'%20or%20'difficulty'.%20This%20means%20that%20payload%20quality%20is%20the%20primary%20driver%20of%20your%20click%20through%20metric%2C%20and%20not%20actual%20end-user%20susceptibility.%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EClick-through%20rates%20likely%20don't%20take%20into%20account%20the%20impact%20of%20any%20given%20individual%20being%20compromised%2C%20and%20don't%20take%20into%20account%20the%20coverage%20of%20your%20simulation%20metric.%20You%20might%20establish%20a%20cross-organization%20metric%20at%20annual%2C%20or%20semi-annual%20simulations%2C%20but%20a%20much%20smaller%20number%20of%20employees%2C%20who%20are%20targeted%20at%20much%20higher%20rates%20because%20of%20their%20perceived%20value%20to%20attackers%2C%20might%20be%20getting%2010x%20the%20number%20of%20attempts.%20Large-scale%2C%20infrequent%20simulations%20miss%20out%20on%20the%20nuances%20of%20high%20risk%20populations%20to%20your%20overall%20susceptibility.%3C%2FLI%3E%0A%3CLI%3EThere%20are%20many%20different%20kinds%20of%20phishing%20attacks%2C%20and%20if%20your%20organization%20is%20only%20measuring%20the%20click-through%20rates%20of%20credential%20harvesting%20attacks%2C%20you%20might%20find%20very%20different%20compromise%20rates%20for%20different%20types%20of%20phishing%20attacks%20such%20as%20malware%20downloads%2C%20illicit%20app%20consent%20grants%2C%20or%20drive-by%20phishing.%20Like%20payloads%2C%20the%20type%20of%20attack%20being%20leveraged%20can%20have%20a%20huge%20impact%20on%20the%20baseline%20click%20through%20rate.%3C%2FLI%3E%0A%3CLI%3EPhish%20susceptibility%20is%20driven%20by%20externalities%20such%20as%20attacker%20focus%2C%20frequency%2C%20end%20user%20behaviors%20required%20for%20their%20job%20function.%20It%20is%20important%20to%20remember%20that%20while%20click-through%20rate%20is%20a%20direct%20measure%20of%20end%20user%20behavior%2C%20that%20behavior%20isn't%20the%20only%20component%20of%20the%20overall%20phishing%20risk.%20If%20you%20assume%20that%20%3CEM%3Eany%3C%2FEM%3E%20user%20will%20eventually%20get%20tricked%20by%20a%20phishing%20attempt%20(which%20is%20a%20very%20safe%20assumption)%2C%20the%20contours%20of%20that%20compromise%20is%20driven%20mostly%20by%20how%20badly%20the%20attacker%20wants%20to%20compromise%20that%20specific%20user%2C%20or%20whether%20that%20user's%20job%20requires%20them%20to%20click%20on%20a%20lot%20of%20links%20from%20external%20parties%2C%20or%20to%20open%20a%20lot%20of%20attachments%20sent%20from%20third%20parties.%20Your%20overall%20susceptibility%20is%20a%20function%20of%20both%20of%20these%20components.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EEducate%20users%20on%20how%20to%20identify%20and%20deal%20with%20phishing%20attempts%3C%2FSTRONG%3E.%20This%20goal%20is%20the%20more%20measurable%20and%20achievable%20one%20of%20the%20program.%20Phish%20simulations%20provide%20you%20with%20an%20opportunity%20to%20engage%20end%20users%20in%20two%20types%20of%20learning.%20First%2C%20the%20user%20is%20exposed%20to%20a%20very%20realistic%20execution%20of%20what%20a%20real-world%20phishing%20attack%20will%20look%20like%20from%20the%20end-user's%20perspective.%26nbsp%3B%20Second%2C%20the%20user%20is%20connected%20to%20a%20differentiated%20training%20experience%20that%20explains%20how%20an%20attack%20works%2C%20and%20why%20it%20is%20important%20to%20prevent%20phishing.%20Most%20organizations%20have%20annual%20required%20corporate%20training%20topics%2C%20and%20so%20the%20key%20here%20is%20to%20balance%20the%20time%20burden%20of%20another%20training%20topic%20against%20the%20regular%20day%20job%20of%20its%20users.%20More%20on%20what%20the%20training%20experience%20should%20be%20like%20for%20end%20users%20below.%20Organizations%20should%20start%20with%20a%20strategy%20to%20differentiate%20the%20training%20in%20a%20way%20that%20connects%20directly%20to%20the%20users'%20knowledge%20and%20experience.%20Tracking%20completion%20rates%2C%20frequency%2C%20and%20productivity%20impact%20is%20a%20straightforward%20measure%20from%20there.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH1%20id%3D%22toc-hId-2034925429%22%20id%3D%22toc-hId-2034982124%22%3EResources%20and%20Dependencies%3C%2FH1%3E%0A%3CP%3EPhish%20training%20programs%20are%20a%20key%20element%20of%20any%20organizational%20strategy%20to%20address%20behavioral%20risk%2C%20but%20since%20the%20core%20mechanism%20behind%20these%20programs%20is%20interacting%20with%20your%20users%20in%20the%20same%20way%20that%20real%20world%20attackers%20are%20going%20to%20try%20to%20engage%20them%2C%20you%20should%20be%20very%20transparent%20and%20intentional%20in%20the%20creation%20of%20these%20programs.%20There%20are%20four%20key%20resources%20and%20dependencies%20you%20will%20need%20to%20fulfill%20to%20get%20your%20program%20up%20and%20running.%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CSTRONG%3EExecutive%20sponsorship%3C%2FSTRONG%3E.%20Starting%20at%20the%20highest%20levels%20of%20the%20organization%2C%20your%20CISO%2C%20CTO%2C%20and%20CEO%20should%20all%20have%20a%20clear%20understanding%20of%20the%20purpose%20and%20implementation%20of%20your%20program.%20Strategically%2C%20they%20should%20be%20bought%20into%20the%20idea%20that%20the%20best%20way%20to%20teach%20and%20learn%20is%20through%20authentic%20experiences%2C%20and%20in%20the%20case%20of%20phishing%2C%20that%20means%20actually%20trying%20to%20phish%20your%20users%20with%20real-world%20payloads.%20It%20is%20not%20uncommon%20for%20Boards%20of%20Directors%20and%20other%20oversight%20functions%20to%20require%20phish%20simulation%20programs%20for%20organizational%20members.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EProgram%20owner%3C%2FSTRONG%3E.%20There%20are%20enough%20moving%20parts%20in%20creating%20and%20operating%20an%20effective%20phish%20program%20that%20having%20an%20individual%20responsible%20for%20the%20program%20is%20very%20common%20in%20the%20industry.%20Smaller%20organizations%20may%20have%20security%20admins%20operate%20the%20program%20overlapping%20with%20other%20duties%2C%20but%20if%20your%20org%20is%20mid-size%20or%20larger%2C%20we%20very%20often%20see%20dedicated%20people%20own%20and%20operate%20the%20program.%20Given%20the%20centrality%20of%20education%20to%20the%20mission%2C%20we've%20seen%20phish%20sim%20program%20owners%20align%20themselves%20with%20the%20security%20and%20compliance%20organization%20or%20human%20resources%20in%20equal%20measure.%20This%20person%20will%20be%20selecting%20payloads%2C%20determining%20simulation%20timing%2C%20selecting%20target%20groups%2C%20tracking%20metrics%20and%20results%2C%20and%20ensuring%20the%20end%20user%20experience%20is%20as%20educationally%20impactful%20as%20possible.%20Larger%20organizations%20may%20even%20employ%20a%20team%20of%20people%20to%20fulfill%20this%20mission.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ETooling%3C%2FSTRONG%3E.%20While%20it%20is%20theoretically%20possible%20to%20perform%20a%20phishing%20exercise%20without%20an%20actual%20tool%2C%20or%20using%20%3CA%20href%3D%22https%3A%2F%2Fresources.infosecinstitute.com%2Ftopic%2Ftop-9-free-phishing-simulators%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Eopen-source%20platforms%3C%2FA%3E%2C%20you'll%20need%20significant%20technical%20expertise%20and%20a%20lot%20of%20manual%20work%20to%20stitch%20together%20the%20entire%20picture.%20Our%20recommendation%20is%20to%20license%20and%20use%20a%20commercial%20phish%20simulation%20tool%2C%20that%20includes%20end%20user%20training%2C%20robust%20metrics%2C%20and%20a%20library%20of%20authentic%20payloads.%20Microsoft%20Defender%20for%20Office%20365%20has%20an%20excellent%2C%20integrated%2C%20no-config%20solution%20called%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Foffice-365-security%2Fattack-simulation-training-get-started%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAttack%20Simulation%20Training%3C%2FA%3E.%20For%20most%20of%20the%20technical%20requirements%20we%20lay%20out%20below%2C%20we'll%20assume%20that%20you%20are%20using%20the%20M365%20Attack%20Simulation%20Training%20product.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ESecurity%20and%20Compliance%20stakeholder%20alignment%3C%2FSTRONG%3E.%20Your%20phish%20simulation%20program%20is%20doing%20something%20that%20most%20risk%20professionals%20worry%20about%20every%20day%3A%20exposing%20end%20users%20to%20attacker%20behavior.%20Users%20that%20don%E2%80%99t%20understand%20the%20purpose%20or%20context%20for%20these%20exercises%20can%20wreak%20havoc%20on%20normal%20security%20and%20compliance%20operations.%20They%20can%20cause%20big%20spikes%20in%20help%20desk%20escalations%2C%20and%20are%20fearful%20about%20why%20the%20organization%20is%20trying%20to%20catch%20them%20out%20by%20measuring%20their%20potential%20failure.%20Aligning%20your%20program%20goals%2C%20and%20mostly%20importantly%20it's%20execution%2C%20with%20your%20security%20operations%20is%20crucial%20for%20keeping%20everyone%20on%20the%20same%20page.%20Many%20organizations%20actually%20have%20their%20security%20operators%20perform%20the%20actual%20simulation%20creation.%20Ensuring%20your%20ops%20aren't%20overwhelmed%20with%20reports%20and%20escalations%20will%20maximize%20your%20results%20in%20the%20long%20run.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CDIV%20id%3D%22tinyMceEditorBrandon%20Koeller_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%222021-06-02_10-21-35.jpg%22%20style%3D%22width%3A%20939px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F286044i2A3DFCDDDBCD442A%2Fimage-dimensions%2F939x528%3Fv%3Dv2%22%20width%3D%22939%22%20height%3D%22528%22%20role%3D%22button%22%20title%3D%222021-06-02_10-21-35.jpg%22%20alt%3D%222021-06-02_10-21-35.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%E2%80%83%3C%2FP%3E%0A%3CP%3EOnce%20you%20have%20these%20four%20key%20resources%20and%20dependencies%20in%20place%2C%20you%20can%20now%20work%20through%20the%20actual%20execution%20and%20analysis%20of%20your%20program.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EStay%20tuned%20for%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fsetting-up-a-new-phish-simulation-program-part-two%2Fba-p%2F2432167%22%20target%3D%22_self%22%3EPart%202%20of%20this%20blog%3C%2FA%3E%20where%20we%E2%80%99ll%20cover%20Targeting%2C%20Frequency%2C%20Payloads%2C%20Training%2C%20Operationalization%2C%20and%20Measuring%20Success.%3C%2FP%3E%0A%3CP%3EIf%20you%20are%20interested%20in%20going%20deep%20to%20get%20strategies%20and%20insights%20about%20how%20to%20develop%20a%20successful%20security%20awareness%20training%20program%2C%20please%20join%20the%20discussion%20in%20this%20upcoming%20Security%20Awareness%20Virtual%20Summit%20on%20June%2022%3CSUP%3En%3C%2FSUP%3E%3CSUP%3Ed%3C%2FSUP%3E%2C%202021%2C%20hosted%20by%20%3CA%20href%3D%22https%3A%2F%2Fterranovasecurity.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ETerranova%20Security%3C%2FA%3E%20and%20sponsored%20by%20Microsoft.%20You%20can%20sign%20up%20to%20attend%20by%20%3CA%20href%3D%22https%3A%2F%2Fterranovasecurity.com%2Fsecurity-awareness-virtual-summit-2021%2F%3Futm_campaign%3DEn_SAVS2023%26amp%3Butm_medium%3DMicrosoft%26amp%3Butm_source%3DPartner%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Eclicking%20here%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2412854%22%20slang%3D%22en-US%22%3E%3CP%3E%3CEM%3EThis%20blog%20is%20part%20one%20of%20a%20two-part%20series%20on%20developing%20a%20security%20awareness%20training%20program%20for%20your%20organization%3C%2FEM%3E%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2412854%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAttack%20Simulation%20Training%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Office%20365%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Sep 13 2021 11:23 AM
Updated by:
www.000webhost.com