David Sherry
Chief Information Security Officer,
Princeton University
OUTCOMES: Learn how to leverage the presented model to create a basic "phishing central" and its supporting procedures to manage phishing * Learn how to plan an awareness campaign to empower and engage your users in helping thwart phishing attacks