Comprehensive Training Concepts

From Clean Desk to Social Engineering we ensure your employees are prepared to stay secure at work and at home.

The Living Security Training Concepts

Living Security metrics measure human risk with predictive utility to allow
security awareness program owners to manage risky behavior and change security
culture with non-punitive action steps. To do that, Living Security uses a
proprietary methodology that tags each question on the platform with a Series,
Topic, Category and Difficulty and zeroes in on 46 primary training concepts.

Training Topics

  • Privacy - 4 min.
    • Big Idea - Privacy
  • Passwords - 4 min.
    • Big Idea - Passwords
    • CIP - PW Reuse
  • PII - 4 min.
    • Big Idea - PII
  • Cybersecurity Fundamentals - 4 min.
    • Big Idea - Cybersecurity
  • Data Classification - 4 min.
    • Big Idea - Data Classification
  • Privileged User Permissions  - 4 min.
    • Big Idea - Priv. User Permissions
  • Vishing - 4 min.
    • Big Idea - Vishing
  • Mobile Security - 2min.
    • CIP Mobile
  • Physical Security - 2min.
    • CIP Physical
  • Safety Online - 2min.
    • CIP Safety Online
  • Travel Secure - 2min.
    • CIP Travel Secure
  • Ransomware - 2min.
    • CIP Ransomware
  • Phishing
    • Phishing IRL - 9 min.
    • Big Idea - Phishing - 4 min.
    • Exercises
      • Phishing Skills 101 Part I & II
      • Phishing Skills 102
      • Phishing Skills (mobile)
  • Policy
    • Exercises
      • Security Trivia 101
      • Security Trivia 102
      • Security Policy Quiz
  • Role-specific Training (DITLs)
    • HR - 3min.
    • Finance- 3min.
    • Support Staff (e.g. helpdesk) - 3min.
    • Priv. user- 3min.
    • General- 3min.
  • Culture
    • Exercises
      • Culture Assessment I
      • Culture Assessment II
  • Risk Perception
    • Exercises
      • Am I Secure 101
      • Am I Secure 102
      • Threat Insight 101
      • Threat Insight 102
  • Executives
    • Avail. Upon request

 

Micro-modules (Q1, 2020)

  • Synthetic Identity Theft
    • 2.5min.
  • Cloud Security Threats
    • 2.5min.
  • Third-Party Phishing (VEC)
    • 2.5min.

Training Challenges

  • Hotspot
  • Classify
  • Vishing
  • Unscramble
  • The Social
  • Social Connection
  • Piktrhub (Eula)
  • Default Credentials
  • Craft A Phish
  • Call To Pass

Training Series

    • Simon Says - 20 min.
    • Thank Goodness Its Secure (TGIS) - 25 min.
    • True Eye - 20 min.

Measuring the effectiveness of security awareness programs</h3 >

You can't manage what you don't measure, and you can't measure what you don't
understand. So the first step in measuring the effectiveness of a security
awareness program is pitting it against the company’s objectives, watching
it’s progress and mapping it’s trajectory. Maps are metaphors. They express
relationships between things that would otherwise be too complex or abstract.
Living Security bases its’ human measurement solutions on the work of its’
advisor, Lance Hayden, Ph.D. Lance’s Competing Security Cultures Framework
(CSCF) helps people visualize their enterprise security cultures across four
basic security cultural types and identify which cultural traits are the
strongest or weakest using the Security Culture Diagnostic Survey (SCDS).
Examples of metrics in action:</span >

Why Living Security

Living Security is the experience-first security awareness company. All of
our products incorporate human-centered design and science-based applications
like gamification and positive reinforcement to engage and inspire people to
lead more secure lifestyles.

 

Get In Touch</a >