CASE FILE // PC-2026-04
Status: Open


Filing 05.00.00Field 27 APR 2026Classification PublicStatus Open

Mitigation Cost & ROI

Vendor-neutral pricing for phishing controls. Per-user, per-month figures from public list price and analyst pricing surveys. Effectiveness claims sourced to primary research, not vendor marketing.

Exhibit A

"$1 spent, $40 saved" requires the $1 actually be spent on the right thing

ROI MEMO

40x
Reported ROI per dollar of phishing simulation spend
[Proofpoint State of the Phish 2025]
$2.5M
Average breach cost reduction with employee training in place
[IBM 2025]
<5%
Resulting click rate after 12 months of monthly simulation, from a ~30% baseline
[SANS Institute]

The 40x figure is well-cited but assumes a particular spend mix. Buying more email-gateway licences gets you very little additional reduction past a baseline. Buying a behaviour-change platform with monthly simulation, role-based content, and reporter telemetry returns the published ROI. Treat the multiplier as the upper bound of a layered, sustained programme, not a guaranteed outcome of an annual click-through training module.

Exhibit B

Security awareness platforms (price card)

VENDOR-NEUTRAL

VendorList price bandFloor / sizingFocus
KnowBe4$1.30 to $3.25 / user / monthVolume floor 50 usersLargest content library; gamified
Proofpoint Security Awareness$1.00 to $2.00 / user / monthBundled with email securityTightly integrated with Proofpoint email defence
Cofense PhishMe$1.50 to $3.00 / user / monthReporter add-on quotedPhishMe Reporter button + intel feed
Hoxhunt$3.00 to $5.00 / user / month100-user floorContinuous adaptive training (per-user difficulty)
Arctic Wolf Managed AwarenessBundled with MDR retainerManaged-service modelQuarterly content, MDR alignment
Mimecast Awareness Training$1.00 to $2.00 / user / monthBundled with email securityRisk score per-user, integrated with email gateway

Pricing bands compiled from public list price, RFP responses, and Gartner pricing notes 2024 to 2026. Negotiated pricing typically lands 20 to 35 percent below list at scale. We treat all of these as categories, not endorsements.[Gartner pricing notes, vendor public RFP responses]

Exhibit C

Phishing controls and cost-per-prevented-incident

LAYERED

CodeControlIndicative costEffect
C-01Phishing-resistant MFA (FIDO2 / passkeys)$3 to $8 / user / month99.9% of credential-stuffing blocked, plus prompt-bomb resistance
[Microsoft, CISA guidance]
C-02Security awareness training + simulated phish$25 to $40 / user / yearClick rate ~30% → <5% in 12 months
[SANS, Proofpoint State of the Phish 2025]
C-03DMARC enforcement (p=reject)$100 to $500 / month for monitoringDomain-spoofing eliminated for compliant receivers
[M3AAWG, dmarc.org]
C-04Email security gateway$12 to $25 / user / year70 to 90% of bulk phishing filtered
[Gartner Magic Quadrant 2025]
C-05AI-augmented email defence (ICES)$3 to $7 / user / monthCatches AI-generated lures missed by signature filtering
[Forrester 2025]
C-06Helpdesk identity verificationProcess change, ~$0Closes the MGM/Caesars vishing path
[Internal control]
C-07Out-of-band wire approval (callback to known number)Process change, ~$0Cuts BEC-driven wire-fraud loss; FBI IC3 recommendation
[FBI IC3]
Exhibit D

The defensive sequence we recommend

ORDER OF OPS

  1. Phishing-resistant MFA across staff and admin accounts. Highest dollar-for-dollar return.
  2. DMARC at p=reject for every owned domain. Closes BEC vendor-impersonation against compliant receivers.
  3. Out-of-band wire approval and helpdesk identity verification. Process changes, near-zero cost.
  4. Monthly simulated phishing campaigns with role-tuned content and a reporter button.
  5. Email gateway with attachment sandboxing. Necessary but not sufficient.
  6. AI-augmented email defence (ICES) once the above are in place and tuned.
  7. Tabletop exercises against the BEC and vishing scenarios. Quarterly cadence.

The order matters. Buying ICES before MFA is a commonly-observed overspend in the industry. Most successful phishing incidents in our case files would have failed at step 1.

Updated 2026-04-27