displayName
Phishing Simulation Exercise
workflowKind
security
triggerType
scheduled
typicalCadence
quarterly
complexity
cross-team
description
Plans and executes simulated phishing campaigns against the organization --
selecting attack vectors (credential harvesting, malware attachment, business
email compromise), distributing test payloads, measuring click and
credential-submission rates, analyzing response times of reporting
mechanisms, debriefing results with leadership, and triggering targeted
security awareness training for high-risk cohorts. Excludes real-world
incident response.