homepage
Open menu
Go one level top
Train and Certify
Overview
Get Started in Cyber
Courses
GIAC Certifications
Training Roadmap
OnDemand
Live Training
Summits
Cyber Ranges
College Degrees & Certificates
Scholarship Academies
NICE Framework
Specials
Manage Your Team
Overview
Group Purchasing
Why Work with SANS
Build Your Team
Hire Cyber Talent
Team Development
Private Training
Security Awareness Training
Leadership Training
Industries
Resources
Overview
Internet Storm Center
White Papers
Webcasts
Tools
Newsletters
Blog
Podcasts
Posters & Cheat Sheets
Summit Presentations
Security Policy Project
Focus Areas
Cyber Defense
Cloud Security
Digital Forensics & Incident Response
Industrial Control Systems
Cyber Security Leadership
Offensive Operations
Get Involved
Overview
Join the Community
Work Study
Teach for SANS
CISO Network
Partnerships
Sponsorship Opportunities
About
About SANS
Our Founder
Instructors
Mission
Diversity
Awards
Contact
Frequently Asked Questions
Customer Reviews
Press
SANS Sites
GIAC Security Certifications
Internet Storm Center
SANS Technology Institute
Security Awareness Training
Search
Log In
Join
Account Dashboard
Log Out
Home
>
Presentations
>
Ambassador Programs
Ambassador Programs
Security Awareness Summit & Training 2018
By
Cassie Clark
,
Jessica Chang
August 8, 2018
Download
All presentations are copyrighted
. No re-posting of presentations is permitted
Related Content
Blog
Security Awareness
May 26, 2022
How to Use Phishing Benchmarks Effectively to Assess Your Program - Part 3
In part three of this mini-series on phishing benchmarks, we'll focus on internal benchmarking through comparison analysis.
Cheryl Conley
read more
Blog
Security Awareness, Security Management, Legal, and Audit
May 5, 2022
World Password Day – Readying Your Workforce for MFA
Today is the perfect opportunity to talk about strong passwords.
Lance Spitzner
read more
Blog
Security Awareness
March 8, 2022
How to Use Phishing Benchmarks Effectively to Assess Your Program - Part 2
In part two of this mini-series on benchmarks for assessing your phishing program, we cover tiering and introduce the SANS Tiering Model.
Cheryl Conley
read more
Share:
Twitter
LinkedIn
Facebook
Copy url
Url was copied to clipboard