National Cybersecurity Awareness Month...GONE VIRTUAL Package!
October is just around the corner -- what’s your plan to make your NCSAM program 100% virtual? We've got you covered.

Comprehensive Security Awareness Training Concepts

From Clean Desk to Social Engineering we ensure your employees are prepared to stay secure at work and at home.

The Living Security Awareness Training Concepts

Living Security metrics measure human risk with predictive utility to allow security awareness program owners to manage risky behavior and change security culture with non-punitive action steps. To do that, Living Security uses a proprietary methodology that tags each question on the platform with a Series, Topic, Category and Difficulty and zeroes in on 46 primary training concepts.

 

Training Topics

 

Privacy - 4 min.

    • Big Idea - Privacy

 

Passwords - 4 min.

    • Big Idea - Passwords
    • CIP - PW Reuse

 

PII - 4 min.

    • Big Idea - PII

 

Cybersecurity Fundamentals - 4 min.

    • Big Idea - Cybersecurity

 

Data Classification - 4 min.

    • Big Idea - Data Classification

 

Privileged User Permissions  - 4 min.

    • Big Idea - Priv. User Permissions

 

Vishing - 4 min.

    • Big Idea - Vishing

 

Mobile Security - 2min.

    • CIP Mobile

 

Physical Security - 2min.

    • CIP Physical

 

Safety Online - 2min.

    • CIP Safety Online

 

Travel Secure - 2min.

    • CIP Travel Secure

 

Ransomware - 2min.

    • CIP Ransomware

 

Phishing

    • Phishing IRL - 9 min.
    • Big Idea - Phishing - 4 min.
    • Exercises
      • Phishing Skills 101 Part I & II
      • Phishing Skills 102
      • Phishing Skills (mobile)

 

Policy

    • Exercises
      • Security Trivia 101
      • Security Trivia 102
      • Security Policy Quiz

 

Role-specific Training (DITLs)

    • HR - 3min.
    • Finance- 3min.
    • Support Staff (e.g. helpdesk) - 3min.
    • Priv. user- 3min.
    • General- 3min.

 

Culture

    • Exercises
      • Culture Assessment I
      • Culture Assessment II

 

Risk Perception

    • Exercises
      • Am I Secure 101
      • Am I Secure 102
      • Threat Insight 101
      • Threat Insight 102

 

Executives

    • Avail. Upon request

 

Micro-modules (Q1, 2020)

  • Synthetic Identity Theft
    • 2.5min.
  • Cloud Security Threats
    • 2.5min.
  • Third-Party Phishing (VEC)
    • 2.5min.

 

Training Challenges

  • Hotspot
  • Classify
  • Vishing
  • Unscramble
  • The Social
  • Social Connection
  • Piktrhub (Eula)
  • Default Credentials
  • Craft A Phish
  • Call To Pass

 

Training Series

    • Simon Says - 20 min.
    • Thank Goodness Its Secure (TGIS) - 25 min.
    • True Eye - 20 min.

 

Measuring the effectiveness of security awareness programs

You can't manage what you don't measure, and you can't measure what you don't understand. So the first step in measuring the effectiveness of a security awareness program is pitting it against the company’s objectives, watching it’s progress and mapping it’s trajectory. Maps are metaphors. They express relationships between things that would otherwise be too complex or abstract. Living Security bases its’ human measurement solutions on the work of its’ advisor, Lance Hayden, Ph.D. Lance’s Competing Security Cultures Framework (CSCF) helps people visualize their enterprise security cultures across four basic security cultural types and identify which cultural traits are the strongest or weakest using the Security Culture Diagnostic Survey (SCDS). 

 

Examples of metrics in action:

 

 

 

Why Living Security

Living Security is the experience-first security awareness company. All of our products incorporate human-centered design and science-based applications like gamification and positive reinforcement to engage and inspire people to lead more secure lifestyles.

 

Get In Touch