Security awareness
View Profile
On-Demand Webinar: SecurityIQ’s Event-Activated Learning Demo
August 24, 2018 by
Camille Raymond
Share:
Event-Activated Learning integrates with your endpoint protection solution to deliver awareness training to employees based on their involvement in security-related events.
View the webinar to see InfoSec Institute’s CEO Jack Koziol and Security Engineer Scott Frasier demonstrate Event-Activated Learning and share how it can link end-user awareness training to actual security events in real time.
In the demo, the team will:
- Infect a virtual machine with malware
- Trigger an endpoint protection notification
- Show how SecurityIQ immediately serves training to learners following the event
- Answer questions from guests
Posted: August 24, 2018
Share:
Camille Raymond
In this Series
- On-Demand Webinar: SecurityIQ’s Event-Activated Learning Demo
- 5 ways to prevent APT ransomware attacks
- Celebrate Data Privacy Week: Free privacy and security awareness resources
- 4 mistakes every higher ed IT leader should avoid when building a cybersecurity awareness program
- ISO 27001 security awareness training: How to achieve compliance
- Run your security awareness program like a marketer with these campaign kits
- Deepfake phishing: Can you trust that call from the CEO?
- Fake shopping stores: A real and dangerous threat
- 10 best security awareness training vendors in 2022
- How to hack two-factor authentication: Which type is most secure?
- Malicious push notifications: Is that a real or fake Windows Defender update?
- Get your ‘I’ve got this’ on – it’s Data Privacy Day!
- Free Cybersecurity and Infrastructure Security Agency (CISA) ransomware resources to help reduce your risk
- How IIE moved mountains to build a culture of cybersecurity
- At Johnson County Government, success starts with engaging employees
- How to transform compliance training into a catalyst for behavior change
- Specialty Steel Works turns cyber skills into life skills
- The other sextortion: Data breach extortion and how to spot it
- Texas HB 3834: Security awareness training requirements for state employees
- SOCs spend nearly a quarter of their time on email security
- Security awareness manager: Is it the career for you?
- 3 sales best practices used in ransomware (and what we can learn from them)
- Risks of preinstalled smartphone malware in a BYOD environment
- The ROI of security awareness training
- 5 reasons to implement a self-doxxing program at your organization
- What is a security champion? Definition, necessity and employee empowerment [Updated 2021]
- Excel 4.0 malicious macro exploits: What you need to know
- Worst passwords of the decade: A historical analysis
- ID for Facebook, Twitter and other sites? Not so fast, says security expert
- 3 surprising ways your password could be hacked
- Malicious SEO campaigns: Mitigating risk with zero-trust approach
- Fake online shopping websites: 6 ways to identify a fraudulent shopping website
- All about carding (for noobs only) [updated 2021]
- Password security: Complexity vs. length [updated 2021]
- What senior citizens need to know about security awareness
- Back up your backups: How this school outsmarted a ransomware attack
- 55 federal and state regulations that require employee security awareness and training
- Brand impersonation attacks targeting SMB organizations
- How to avoid getting locked out of your own account with multi-factor authentication
- Breached passwords: The most frequently used and compromised passwords of the year
- Top 10 security awareness training topics for your employees
- Top 5 ways ransomware is delivered and deployed
- 21 free training resources for Cybersecurity Awareness Month (NCSAM 2020)
- How to spot a malicious browser extension
- The OneLogin State of Remote Work Survey Report
- How to spot a survey scam
- Top 20 security awareness posters with messages that STICK
- After the breach: Change your password, quickly
- SIM swapping security risks: What they are and how to protect yourself
- Top 8 world crises exploited by cybercriminals and lessons learned
- The most common social engineering attacks [updated 2020]
Related Bootcamps