This document provides an overview and agenda for a presentation on phishing attacks. It begins with definitions of phishing, examples of phishing emails and websites, and current phishing attack profiles based on industry reports. Subsequent sections discuss common attack strategies and technologies used in phishing, such as cousin URL attacks, URL obfuscation, and visual spoofing. The document also outlines defense strategies against phishing including education, prevention, detection, and legal approaches.