Phishing simulations

Here are some references I use to support my negative view of Phishing Simulation [1]:

Perspectives:

Research:

[1] Instead, roll out webauthn/Yubikeys