The State of the Phish and Response is a look into many of the prevalent phishing campaigns that leverage ransomware, fileless malware, and tactics that bypass technology. Contrary to what some may still believe, attackers don’t rely on executables and other extensions typically restricted. What are attackers doing and what works in their campaigns? Additionally, what can security teams do knowing that attackers will iterate their tactics to bypass technical controls? Lastly, with so much attention focused on cybersecurity staffing; what can security leaders do to help remove mundane phishing incident response tasks and retain their team? This session is a combination of understanding the phishing threat landscape and steps organizations can take to prepare their employees and security teams.