Phishing simulation
exercises
Michael Jenkins,
Brunel University
EMAIL IS THE No 1 THREAT VECTOR
225B e mails per day
90% THREATS START BY E MAIL
99% OF HACKERS RELY ON USERS TO RUN
MALICIOUS CODE
IMPACTS:
MALWARE INFECTION / COMPROMISED ACCOUNTS / LOSS
OF DATA
Threats
using social
engineering
Human Click Enabled v Technical Threats
Human Click Rates
Levels of authenticity
Executive Assistants
Head of Legal Affairs
HR Director
COO
CFO
Finance Staff
IT Staff
Threats by Individuals
Spoofing E mail
addresses
The tools necessary to spoof email addresses are surprisingly easy to get. All you need is a working
SMTP server (aka, a server that can send email), and the right mailing software.
Which tools are used to train users?
Who measures an organisations susceptibility?
2015 2016 2017
63% 66% 75%
Average click rates:
Healthcare 15%
Public Sector 14%
HEI’s ?
All 11%
People are targets
must let them know they are targets
must let them know criminal TTP’s
people make defence work
Video of the threat……..
Tactics, Techniques, and Procedures…..(TTP’s)
Youtube Video:
An Anatomy of an Attack
WE ARE A TARGET
Cyber Attacks – The Adversary
Not Just Security – It’s Defence
TransNational
Crime
The Kill
Chain
Phishing simulation exercises, by Michael Jenkins
Phishing simulation exercises, by Michael Jenkins
Staff Phish
Student
Phish
Phishing simulation exercises, by Michael Jenkins
Phish Last
Week Staff
Students
9%
10%
Any
questions?
Phishing simulation exercises, by Michael Jenkins

More Related Content

PPTX
The Board and Cyber Security
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
PPTX
CRI Cyber Board Briefing
PPTX
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
PDF
7 cyber security questions for boards
PDF
The Cost of Inactivity: Malware Infographic
PDF
ISACA State of Cyber Security 2017
PDF
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
The Board and Cyber Security
Proatively Engaged: Questions Executives Should Ask Their Security Teams
CRI Cyber Board Briefing
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
7 cyber security questions for boards
The Cost of Inactivity: Malware Infographic
ISACA State of Cyber Security 2017
Five Reasons to Look Beyond Math-based Next-Gen Antivirus

What's hot (20)

PDF
Security Incident Response Readiness Survey
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPTX
Valuing Data in the Age of Ransomware
PDF
M-Trends® 2013: Attack the Security Gap
PPT
Key Strategies to Address Rising Application Risk in Your Enterprise
PPTX
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
PDF
Level Up Your Security with Threat Intelligence
PPTX
Rise of Ransomware
PDF
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
PDF
IBM X-Force Threat Intelligence Quarterly Q4 2015
PPTX
Cisco Web and Email Security Overview
PDF
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
PPTX
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
PPTX
Netpluz - Managed Firewall & Endpoint Protection
PPTX
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
PPTX
Empowering Application Security Protection in the World of DevOps
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
PPTX
The State Of Information and Cyber Security in 2016
PDF
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
Security Incident Response Readiness Survey
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Valuing Data in the Age of Ransomware
M-Trends® 2013: Attack the Security Gap
Key Strategies to Address Rising Application Risk in Your Enterprise
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
Level Up Your Security with Threat Intelligence
Rise of Ransomware
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
IBM X-Force Threat Intelligence Quarterly Q4 2015
Cisco Web and Email Security Overview
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Netpluz - Managed Firewall & Endpoint Protection
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Empowering Application Security Protection in the World of DevOps
Mobile Security: Perceptions vs Device-harvested Reality
The State Of Information and Cyber Security in 2016
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
Ad

Similar to Phishing simulation exercises, by Michael Jenkins (20)

PPTX
Phishing simulation exercises
PDF
Phishing.pdf
PPTX
The Emotional Lure of Social Engineering
PDF
Social Engineering
PDF
Uk computer emergency response team (cert) introduction to social engineering
PDF
Uk computer emergency response team (cert) introduction to social engineering
PPTX
Email phishing and countermeasures
PPTX
Paper ID 43 Widia Febriyani ppt conference.pptx
PPTX
phishing-awareness-powerpoint.pptx
PDF
Ce hv8 module 09 social engineering
DOCX
2 phishing
PPTX
Art of Social Engineering Presented by Accellis Technology Group
PDF
phishing facts be aware and do not take the bait
PPTX
Amir bouker
PDF
Safe Email Practices
PPT
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
PDF
OWASP ATL - Social Engineering Technical Controls Presentation
PDF
Phishing mails: Bonnes pratiques
Phishing simulation exercises
Phishing.pdf
The Emotional Lure of Social Engineering
Social Engineering
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineering
Email phishing and countermeasures
Paper ID 43 Widia Febriyani ppt conference.pptx
phishing-awareness-powerpoint.pptx
Ce hv8 module 09 social engineering
2 phishing
Art of Social Engineering Presented by Accellis Technology Group
phishing facts be aware and do not take the bait
Amir bouker
Safe Email Practices
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
OWASP ATL - Social Engineering Technical Controls Presentation
Phishing mails: Bonnes pratiques
Ad

More from Jisc (20)

PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
Andrew-Brown-JUSP-showcase-20240730.pptx
PPTX
JUSP Showcase - Rebuilding Data presentation
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
FE Accessibility training matrix partnership - information session
PPTX
Procuring a research management system: why is it so hard?
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
How libraries can support authors with open access requirements for UKRI fund...
PPTX
Supporting (UKRI) OA monographs at Salford.pptx
PPTX
The approach at University of Liverpool.pptx
PPTX
Jisc's value to HE: the University of Sheffield
PPTX
Towards a code of practice for AI in AT.pptx
PPTX
Jamworks pilot and AI at Jisc (20/03/2024)
PPTX
Wellbeing inclusion and digital dystopias.pptx
PPTX
Accessible Digital Futures project (20/03/2024)
PPTX
Procuring digital preservation CAN be quick and painless with our new dynamic...
PPTX
International students’ digital experience: understanding and mitigating the ...
PPTX
Digital Storytelling Community Launch!.pptx
PPTX
Open Access book publishing understanding your options (1).pptx
PPTX
Scottish Universities Press supporting authors with requirements for open acc...
Strengthening open access through collaboration: building connections with OP...
Andrew-Brown-JUSP-showcase-20240730.pptx
JUSP Showcase - Rebuilding Data presentation
Adobe Express Engagement Webinar (Delegate).pptx
FE Accessibility training matrix partnership - information session
Procuring a research management system: why is it so hard?
Adobe Express Engagement Webinar (Delegate).pptx
How libraries can support authors with open access requirements for UKRI fund...
Supporting (UKRI) OA monographs at Salford.pptx
The approach at University of Liverpool.pptx
Jisc's value to HE: the University of Sheffield
Towards a code of practice for AI in AT.pptx
Jamworks pilot and AI at Jisc (20/03/2024)
Wellbeing inclusion and digital dystopias.pptx
Accessible Digital Futures project (20/03/2024)
Procuring digital preservation CAN be quick and painless with our new dynamic...
International students’ digital experience: understanding and mitigating the ...
Digital Storytelling Community Launch!.pptx
Open Access book publishing understanding your options (1).pptx
Scottish Universities Press supporting authors with requirements for open acc...

Recently uploaded (20)

PPT
What is a Computer? Input Devices /output devices
PDF
Flame analysis and combustion estimation using large language and vision assi...
DOCX
search engine optimization ppt fir known well about this
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
STKI Israel Market Study 2025 version august
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Architecture types and enterprise applications.pdf
What is a Computer? Input Devices /output devices
Flame analysis and combustion estimation using large language and vision assi...
search engine optimization ppt fir known well about this
Taming the Chaos: How to Turn Unstructured Data into Decisions
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Final SEM Unit 1 for mit wpu at pune .pptx
CloudStack 4.21: First Look Webinar slides
Chapter 5: Probability Theory and Statistics
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Zenith AI: Advanced Artificial Intelligence
STKI Israel Market Study 2025 version august
Comparative analysis of machine learning models for fake news detection in so...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Credit Without Borders: AI and Financial Inclusion in Bangladesh
sustainability-14-14877-v2.pddhzftheheeeee
Consumable AI The What, Why & How for Small Teams.pdf
OpenACC and Open Hackathons Monthly Highlights July 2025
1 - Historical Antecedents, Social Consideration.pdf
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Architecture types and enterprise applications.pdf

Phishing simulation exercises, by Michael Jenkins