Security awareness
View Profile
On-Demand Webinar: SecurityIQ’s Event-Activated Learning Demo
August 24, 2018 by
Camille Dupuis
Share:
Event-Activated Learning integrates with your endpoint protection solution to deliver awareness training to employees based on their involvement in security-related events.
View the webinar to see InfoSec Institute’s CEO Jack Koziol and Security Engineer Scott Frasier demonstrate Event-Activated Learning and share how it can link end-user awareness training to actual security events in real time.
In the demo, the team will:
- Infect a virtual machine with malware
- Trigger an endpoint protection notification
- Show how SecurityIQ immediately serves training to learners following the event
- Answer questions from guests
Posted: August 24, 2018
Share:
Articles Author
Camille Dupuis
In this Series
- On-Demand Webinar: SecurityIQ’s Event-Activated Learning Demo
- Ask us anything about Security awareness, behavior & culture (session #2)
- Influencing security mindsets to build a culture of cybersecurity
- Gamification — Cybersecurity’s turn to play
- Unpatched address bar spoofing vulnerability impacts major mobile browsers
- Fake online shopping websites: 6 ways to identify a fraudulent shopping website
- All About Carding (For Noobs Only) [Updated 2021]
- Security Awareness Behavior & Culture: Ask Us Anything
- Password Security: Complexity vs. Length [Updated 2021]
- NSA report: Indicators of compromise on personal networks
- What senior citizens need to know about security awareness
- Back up your backups: How this school outsmarted a ransomware attack
- Securing the home office: Printer security risks (and mitigations)
- Top 6 ransomware strains to watch out for in 2020
- 55 federal and state regulations that require employee security awareness and training
- Business email compromise (BEC) scams level up: How to spot the most sophisticated BEC attacks
- Brand impersonation attacks targeting SMB organizations
- How to avoid getting locked out of your own account with multi-factor authentication
- How to find weak passwords in your organization’s Active Directory
- How hackers use CAPTCHA to evade automated detection
- The State of Ransomware 2020: Key findings from Sophos & Malwarebytes
- Monitoring business communication tools like Slack for data infiltration risks
- Breached passwords: The most frequently used and compromised passwords of the year
- Tech companies, privacy and vulnerabilities: How much transparency is enough?
- Top 10 Security Awareness Training Topics for Your Employees [Updated 2020]
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- 21 free training resources for Cybersecurity Awareness Month (NCSAM 2020)
- Time to update your cybersecurity policy?
- Android app security: Over 12,000 popular Android apps contain undocumented backdoors
- Ultimate guide to international data protection and privacy laws
- 4 types of phishing domains you should blacklist right now
- When and how to report a breach: Data breach reporting best practices
- The OneLogin State of Remote Work Survey Report
- 10 election security predictions for the 2020 US presidential election
- How to spot a survey scam
- Top 20 Security Awareness Posters with messages that STICK
- After the breach: Change your password, quickly
- How your home network can be hacked and how to prevent it
- SIM swapping security risks: What they are and how to protect yourself
- Top 8 world crises exploited by cybercriminals and lessons learned
- 4 reasons why you should include current events in your phishing simulation program
- Work-from-home network traffic spikes: Are your employees vulnerable?
- Are apps stealing company secrets? Smart device privacy concerns for businesses
- Top 9 free security training tools
- Cookies: An overview of associated privacy and security risks
- Vishing spikes as workforces go remote: 6 vishing prevention tips anyone can follow
- Can 2FA prevent breaches? Lessons learned from the SFO airport watering hole attack
- Dark web fraud: How-to guides make cybercrime too easy
- How to stay cyber-secure at home with a secure home network
- Security awareness training and cyber insurance: Prevention, treatment or both?
- How to scan email headers for phishing and malicious content
Related Bootcamps
Related Articles
Security awareness
Influencing security mindsets to build a culture of cybersecurity
January 19, 2021
Christine McKenzie
Security awareness
Gamification — Cybersecurity’s turn to play

January 18, 2021
Tyler Schultz
Security awareness
Unpatched address bar spoofing vulnerability impacts major mobile browsers
January 18, 2021
Daniel Brecht