National Cybersecurity Awareness Month...GONE VIRTUAL Package!
October is just around the corner -- what’s your plan to make your NCSAM program 100% virtual? We've got you covered.

Comprehensive Security Awareness Training Concepts

From Clean Desk to Social Engineering we ensure your employees are prepared to stay secure at work and at home.

The Living Security Awareness Training Concepts

Living Security metrics measure human risk with predictive utility to allow security awareness program owners to manage risky behavior and change security culture with non-punitive action steps. To do that, Living Security uses a proprietary methodology that tags each question on the platform with a Series, Topic, Category and Difficulty and zeroes in on 46 primary training concepts.


Training Topics


Privacy - 4 min.

    • Big Idea - Privacy


Passwords - 4 min.

    • Big Idea - Passwords
    • CIP - PW Reuse


PII - 4 min.

    • Big Idea - PII


Cybersecurity Fundamentals - 4 min.

    • Big Idea - Cybersecurity


Data Classification - 4 min.

    • Big Idea - Data Classification


Privileged User Permissions  - 4 min.

    • Big Idea - Priv. User Permissions


Vishing - 4 min.

    • Big Idea - Vishing


Mobile Security - 2min.

    • CIP Mobile


Physical Security - 2min.

    • CIP Physical


Safety Online - 2min.

    • CIP Safety Online


Travel Secure - 2min.

    • CIP Travel Secure


Ransomware - 2min.

    • CIP Ransomware



    • Phishing IRL - 9 min.
    • Big Idea - Phishing - 4 min.
    • Exercises
      • Phishing Skills 101 Part I & II
      • Phishing Skills 102
      • Phishing Skills (mobile)



    • Exercises
      • Security Trivia 101
      • Security Trivia 102
      • Security Policy Quiz


Role-specific Training (DITLs)

    • HR - 3min.
    • Finance- 3min.
    • Support Staff (e.g. helpdesk) - 3min.
    • Priv. user- 3min.
    • General- 3min.



    • Exercises
      • Culture Assessment I
      • Culture Assessment II


Risk Perception

    • Exercises
      • Am I Secure 101
      • Am I Secure 102
      • Threat Insight 101
      • Threat Insight 102



    • Avail. Upon request


Micro-modules (Q1, 2020)

  • Synthetic Identity Theft
    • 2.5min.
  • Cloud Security Threats
    • 2.5min.
  • Third-Party Phishing (VEC)
    • 2.5min.


Training Challenges

  • Hotspot
  • Classify
  • Vishing
  • Unscramble
  • The Social
  • Social Connection
  • Piktrhub (Eula)
  • Default Credentials
  • Craft A Phish
  • Call To Pass


Training Series

    • Simon Says - 20 min.
    • Thank Goodness Its Secure (TGIS) - 25 min.
    • True Eye - 20 min.


Measuring the effectiveness of security awareness programs

You can't manage what you don't measure, and you can't measure what you don't understand. So the first step in measuring the effectiveness of a security awareness program is pitting it against the company’s objectives, watching it’s progress and mapping it’s trajectory. Maps are metaphors. They express relationships between things that would otherwise be too complex or abstract. Living Security bases its’ human measurement solutions on the work of its’ advisor, Lance Hayden, Ph.D. Lance’s Competing Security Cultures Framework (CSCF) helps people visualize their enterprise security cultures across four basic security cultural types and identify which cultural traits are the strongest or weakest using the Security Culture Diagnostic Survey (SCDS). 


Examples of metrics in action:




Why Living Security

Living Security is the experience-first security awareness company. All of our products incorporate human-centered design and science-based applications like gamification and positive reinforcement to engage and inspire people to lead more secure lifestyles.


Get In Touch