How Lockheed Martin Phishes Its Own

An posting From Dark Reading about How Lockheed Martin Phishes Its Own: On several occasions over the past couple of years, employees at Lockheed Martin have flagged suspicious emails that turned out to be previously unknown targeted attack campaigns aimed at the defense contractor.

This additional pair of eyes in security is one of the bonuses of Lockheed Martin’s homegrown phishing training program, according to the defense contractor’s corporate information security officer.

“Employees each year report something to our CIRT [Computer Incident Response Team] because of our [phishing] training, and it’s been something new to us, and we were able to detect an intrusion that was coming at us,” says Chandra McMahon, CISO at Lockheed Martin.

 

To read more click here: 

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.