Jon Trout, company executive and avid fly fisherman, is gone fishin'... Problem is, he's left his badge out for anybody to access his office while he's away. Let's just say you don't mind his gesture of kindness. In fact, its about time you went phishin', too.
Audience: General User
Details: Customized for your organization's culture and compliance requirements.
Time: 20, 30 and 60 minute room options.
Marketing Kits: Make use of our included graphics, ﬂiers and emails to excite your users and drive participation.
This storyline is an intermediate-concept training that centers on real-life social engineering tactics used by cybercriminals to infiltrate a given environment. This introduces the brick and mortar security concepts – like phishing and impersonation – and builds upon them to introduce intermediate concepts like oversharing on social media and the vulnerabilities in online accounts.
- Password Hygiene
- Phishing Awareness
- Securing Sensitive Data
- Physical Security
- Device Security
- Sensitive Data Disposal
- Badge Security
- Public Oversharing
Setup/Breakdown: Setup-60 Minutes, Reset-5 Minutes. Breakdown-30 Minutes
Conference Room: Minimum Size-10'x10', with 6 chairs, Maximum Size-None Requirements-Power