Plan. Comprehensive Planning

Size: px
Start display at page:

Download "Plan. Comprehensive Planning"

Transcription

1 Go Beyond

2 Plan The PhishLine team will help you get started at a pace that is consistent with your Information Security objectives and provide expert level, first person support throughout. Comprehensive Planning We take a progressive approach and develop a customized plan using our Information Security Awareness Operational Planning (ISA-OP ) process that will help you align your human layer initiatives with the entirety of your risk-based security program. LEVEL TYPE PHASES THEME SCOPE APPROACH VELOCITY

3 Train PhishLine provides a robust library of training content in various formats, which includes: professional videos, slideshows, and quizzes for reinforcement. All training content can be customized to fit your organization and culture with ease. Integrate Your Own Training We can link to your training and integrate training records to update our reputation management system. PLAN TRAIN TEST MEASURE TAKE ACTION Use targeted Education and Awareness to improve your security posture.

4 Test Gain valuable insights into the vulnerabilities of the People, Process, and Technology protecting your critical information assets. Real-World Social Engineering Simulations PhishLine provides real-world testing capabilities for , smart attachments, portable media, SMS, and automated voice phishing. Risk-Based Surveys PhishLine s risk-based surveys provide unique insights into your security culture. Mac OS 32% N/A 0% Android 5% Windows XP 4% Windows 8 0% Windows 7 59% Detected Software Analysis Based on Outbound Number of Unique Software Versions Detected: Number of Outbound s with Software Detected: Number of Times the Software Instances were Detected in Outbound s:

5 Measure PhishLine provides an industry leading level of reporting and metrics. Prepare to be impressed with over 150 charts and graphs that profile social engineering threats from the attacker perspective. Robust, One-Click Metrics PhishLine s reporting and metrics capabilities are available with one click. N/A 0% Mac OS 32% Android 5% Windows XP 4% Windows 8 0% Custom Analytics We can quickly develop custom reporting that meets the needs of your organization. Windows 7 59% Detected Software Analysis Based on Outbound Number of Unique Software Versions Detected: Number of Outbound s with Software Detected: Number of Times the Software Instances were Detected in Outbound s:

6 Take Action PhishLine puts you in a position to take informed, decisive action against social engineering and phishing threats. Our case studies and customer feedback provide insight into the power of PhishLine. Establish Baseline Metrics Just getting started is often the first and most important step. We ll help you keep it simple and provide the level of support you need to get up and running with ease. Take Decisive Action Our team is here to provide suggestions that can help. Our customers receive an immediate ROI from our recommendations.

7 Risk-Based Surveys PhishLine s advanced risk-based surveys allow you to measure and manage the gap between awareness and actions. Advanced risk-based surveys provide unique insights into your user level security posture. Conduct risk-based assessments that will help you gain a complete perspective of user level risk. Validate that user level actions and their perspective of information security principles are consistent with your organizational objectives.

8 Training Fully integrated training designed for professional level audiences. PhishLine s customizable training content has been designed to meet the needs of a professional level audience. Our library of educational content covers pertinent information security topics that include: mobile device security, phishing, PCI compliance, and much more. Detailed training reports allow you to easily integrate your training and testing objectives to confirm progress.

9 Gain the Attacker Perspective Go beyond security awareness by leveraging decisive Risk-Based Metrics. PhishLine delivers an industry leading level of depth in metrics and reporting that encompasses the people, process, and technology layers of information security. Leverage visibility into the entirety of the social engineering threat landscape and go beyond security awareness with difference making discoveries and concrete actions that impact change.

10