This document summarizes a presentation about company phishing trips. It discusses how phishing kits work and how they are often deployed through unpatched systems or content management systems like WordPress. It also describes ways to detect phishing kits, such as monitoring TLS certificates for domain names similar to your company, and using tools like Certstream to track new certificates. The presentation recommends responding to phishing threats by deploying "honeycreds" - fake credentials placed to observe which ones are tested by attackers. Statistics on hundreds of fake credentials placed showed most were tested within hours or days.