The Living Security Training Concepts
Living Security metrics measure human risk with predictive utility to allow
security awareness program owners to manage risky behavior and change security
culture with non-punitive action steps. To do that, Living Security uses a
proprietary methodology that tags each question on the platform with a Series,
Topic, Category and Difficulty and zeroes in on 46 primary training concepts.
- Privacy - 4 min.
- Big Idea - Privacy
- Passwords - 4 min.
- Big Idea - Passwords
- CIP - PW Reuse
- PII - 4 min.
- Big Idea - PII
- Cybersecurity Fundamentals - 4 min.
- Big Idea - Cybersecurity
- Data Classification - 4 min.
- Big Idea - Data Classification
- Privileged User Permissions - 4 min.
- Big Idea - Priv. User Permissions
- Vishing - 4 min.
- Big Idea - Vishing
- Mobile Security - 2min.
- CIP Mobile
- Physical Security - 2min.
- CIP Physical
- Safety Online - 2min.
- CIP Safety Online
- Travel Secure - 2min.
- CIP Travel Secure
- Ransomware - 2min.
- CIP Ransomware
- Phishing IRL - 9 min.
- Big Idea - Phishing - 4 min.
- Phishing Skills 101 Part I & II
- Phishing Skills 102
- Phishing Skills (mobile)
- Security Trivia 101
- Security Trivia 102
- Security Policy Quiz
- Role-specific Training (DITLs)
- HR - 3min.
- Finance- 3min.
- Support Staff (e.g. helpdesk) - 3min.
- Priv. user- 3min.
- General- 3min.
- Culture Assessment I
- Culture Assessment II
- Risk Perception
- Am I Secure 101
- Am I Secure 102
- Threat Insight 101
- Threat Insight 102
- Avail. Upon request
Micro-modules (Q1, 2020)
- Synthetic Identity Theft
- Cloud Security Threats
- Third-Party Phishing (VEC)
- The Social
- Social Connection
- Piktrhub (Eula)
- Default Credentials
- Craft A Phish
- Call To Pass
- Simon Says - 20 min.
- Thank Goodness Its Secure (TGIS) - 25 min.
- True Eye - 20 min.
Measuring the effectiveness of security awareness programs</h3 >
You can't manage what you don't measure, and you can't measure what you don't
understand. So the first step in measuring the effectiveness of a security
awareness program is pitting it against the company’s objectives, watching
it’s progress and mapping it’s trajectory. Maps are metaphors. They express
relationships between things that would otherwise be too complex or abstract.
Living Security bases its’ human measurement solutions on the work of its’
advisor, Lance Hayden, Ph.D. Lance’s Competing Security Cultures Framework
(CSCF) helps people visualize their enterprise security cultures across four
basic security cultural types and identify which cultural traits are the
strongest or weakest using the Security Culture Diagnostic Survey (SCDS).
Examples of metrics in action:</span >
Why Living Security
Living Security is the experience-first security awareness company. All of
our products incorporate human-centered design and science-based applications
like gamification and positive reinforcement to engage and inspire people to
lead more secure lifestyles.