SlideShare a Scribd company logo
The right knowledge.
Right now.
Essentials Webinar
Meet your
speakers
Emma Waite
Implementation Specialist
Hunter Reed
Moderator
Agenda
1. Overview of Infosec IQ
2. Navigating the Dashboard
3. Managing Learners
4. PhishSim Campaigns
5. AwareEd Campaigns
6. Reporting
7. Other Tools
Overview of Infosec IQ
Infosec IQ provides Security Awareness training through simulated phishing messages,
interactive training videos, and quizzes.
PhishSim: Includes 1,000s of phishing templates in a variety of attack types and
difficulty levels. New templates are added each week, helping your organization stay
ahead of the latest threats.
AwareEd: Our massive library of industry- and role-based training resources is
updated weekly, helping you deliver fresh, relevant training to every member of your
organization no matter the style and tone you need
Navigating the Dashboard
• Core Behavior Compliance Infosec IQ’s training
modules are linked to one of the Core Behaviors
outlined by National Institute of Standards and
Technology (NIST)
• Click Rate This chart shows an overall percentage
of learners who fell for the different email attack
types in all PhishSim campaigns
• What’s New Provides you with updates to features
or new functionality in the platform.
• Subscription Settings Allows you to view your
renewal date, learner seat utilization, and current
plan.
• Join the Community! TechExams Community is a
space for IT professionals to share problems and
find solutions.
Managing Learners
Adding learners to the platform
• Active Directory Sync
• CSV File Import
• Manual
Groups
• Static
• Dynamic
Learner’s Profile
• Letter Grade
• Timeline Events
PhishSim Campaigns
How to configure and deploy PhishSim
campaigns
Simulated Phished Email Templates
Navigating the email template page
Email Template Tabs
• All: This includes all available email templates under each tab
• Personal: These are all the templates that you have cloned or built from scratch
• Contributed: These are templates that other Infosec IQ customers have shared
• System: These are templates that the Infosec IQ Content Team have pre-built
Previewing an email template An admin can preview an email template right in the platform or
or email a preview to themselves.
Cloning an email template This will give the admin the ability to make changes to an existing
template in the platform. Once saved, the email template can be found in the Personal tab.
Customizing Email Templates
From Email: You can change the
from email by selecting the
settings gear
Attack Type: This is where you
can change the attack type of
that specific email
Education: This is where you can
change the education that a
learner views after they get
phished
Tools: This will allow you to
edit/add source code (HTML) to
the email template.
Preview in Browser: This will
allow you to preview as a learner,
as well as send an email preview
to yourself
Email Attack Types
Drive-by: This is where a learner clicks on any link
in the PhishSim email that they receive
Attachment: This will add an attachment to the
PhishSim Email that will track if a learner enables
macros on that document
Data Entry: After a learner clicks on a link in the PhishSim
email, they will be brought to a login page. SecurityIQ
doesn’t track the credentials being entered, as those are
blank key strokes
Business Email Compromise: These templates are requesting
specific information for that learner and tracking to see if the
responded back with sensitive information
To view a complete list of Data
Entry Login Sites, please navigate
to the Data Entry Template
section in SecurityIQ
PhishSim Education
• To view all of the different types of education available for a PhishSim campaign, locate the
Education section under the PhishSim menu. On this page you will notice:
– Five interactive AwareEd training video options
– Pre-built static education pages
• You can build custom education pages by selecting “New Education” in the top right corner.
There are two other education options that you can assign learners to outside of Interactive and
Static education pages
Phishing Indicators
When a leaner gets phished, they will be taken to a
webpage that has a screen shot of the email that they
were just phished on. Included on that screen will be
specific call-outs to what the learner should have
noticed prior to clicking on the link.
External Links
After a learner gets phished, they will be redirected to
an external link. To get this set-up, you will select
“New Education” and insert the external URL that
you will want to bring learners to.
PhishSim Batteries
A Battery is a way to group specific email
templates to point at a campaign. Some
Infosec IQ customers group emails based
on certain commonalities such as method,
education, etc. The Infosec IQ platform
has pre-built batteries that an admin can
use or clone to customize.
PhishSim Campaigns
• After you have your Battery built, you are ready to schedule your campaign. To create and schedule a
PhishSim campaign, navigate to Campaigns under PhishSim. On this page select “New Campaign”:
– Campaign Name: This isn’t visible to the learners
– Branding: Your default brand should be automatically selected. If you have multiple branding options, you can
select the specific brand you want shown
– Learners: This is where you can choose if you would want the campaign to go to…
• All Learners
– A Specific Learner Group
– Individual Learners
• Content: In this section you can select a specific template, battery, or category that you would like to send
emails from simply by typing in the name.
• Battery Options: By default, the learner will receive all the templates that are selected. You can also
choose how many templates each learner receives out of the battery by selecting “Send Random Phishing
Templates”. This option is recommended especially if using Categories, as some of our categories have
20+ templates
PhishSim Campaigns Continued
• Phished Actions
– Notification: This is a follow up email that gets sent to a phished learner that you can customize. You can also turn this
follow up email off down in “Schedule”
– Group: Prior to building your campaign, you can create a group that you would like phished learners to be added to
• Learner Replies:
– Used for Business Email Compromise attacks.
– Tracks total number of replies as well as which emails your learners responded to.
– Advance options allow for viewing the reply and for matching strings or patterns in responses.
• Schedule
– Send Phishing Attacks Over Time: This is where you can schedule out the email templates to be delivered to the learners
over a period of time. For example: if you run a campaign for 30 days and you have three email templates going to each
learner – the learner will receive those three email templates at random over the next 30 days
– Send Phishing Attacks at One Time: This option will allow you to send out all the templates at once. This option is great if
you want to quickly test the email templates to see how they look – prior to deploying the campaign to all learners. To
out a quick test campaign, all you will need to do is select any time in the past. Once you schedule the campaign, the
emails will get sent out as soon as our servers queue them up.
AwareEd Campaigns
How to configure and deploy AwareEd
Campaigns
AwareEd Campaigns
What is an AwareEd Campaign? An
AwareEd campaign consists of
interactive training modules and/or
assessments that you can enroll
learners in for a certain period.
In this section, we will cover:
– How to navigate the Content Library
– Build Courses
– Create a Campaign
Navigating the Content Library
This Module is available for SCORM
as a Service Download
Indicates what languages that
module/assessment have been
translated in
Allows you to preview the
module/assessment
Adds module/assessment to Course
Builder
Assessment
Assets: This counts the total number of modules, assessments,
program resources that we have. If the asset is available in
multiple languages, those are counted as individual assets.
Search: Allows you to search for a specific content
Filter: You can filter on different areas to help you select content
Course Builder: This appears on the left-hand side of the screen
when you add a module/assessment to a course (see slide 17)
Course Builder
• The Course Builder will appear in the Content Library
once you have selected the “+” symbol on any of our
modules and assessments.
• Course Name: This is visible to the learner
• Module Order: As you add content, it will be added in the
module order section. You can rearrange the order of the
content by dragging and dropping. You can also remove
any content by clicking the “x” icon.
• Course Statistics: This will give you an overview of the
number of modules in the course, total length, and the
number of exercises included. Please note that the total
length is the total length of the video + how long it takes
the average learner to complete the exercises; it does not
take in to account how long it takes learners to complete
assessments.
• Once you select “Save Course”, you can view and edit
your course by navigating to AwareEd > Courses
Campaign Creation
Once you have your course built with the selected modules and/or assessments, you are now ready to create your campaign. To accomplish this,
please navigate to AwareEd and select “campaigns”. Once on the campaigns page, click “new campaign”.
Campaign Name: This isn’t visible to the learner, but will help you remember what content you deployed
Branding: The branding option you select will be visible in the beginning of an AwareEd Module, on a learner’s course page, and in the
notification emails that they receive
Learners: In this section you can select whether you want the campaign to be pushed out to:
– All Learners
– Learner Groups
– Individual Learners
Courses: In this section, you can locate the course that you would like to use by clicking on the dropdown menu. You can also select a default
language from the dropdown. Please note that all of our modules are not available in every language, as well as the learner has the opportunity
to select their preferred language on their course page
– Begin Modules upon Page Upload: This will automatically start the videos
– Require learners to retake failed assessments: If you have included an assessment, this will give the learner the opportunity to retake an
assessment
– Restrict access after campaign run completion: By default, learner will still have access to the training after the campaign run is
complete. Select this option if you would like to restrict the learner from taking the training after the campaign has finished
AwareEd Campaign Creation Continued
Notifications: These are emails that get sent out to the learner during the lifespan of the campaign. All of these notifications can be
customized by navigating to the “Notifications” section under AwareEd
– Enrollment Notification: Once you enroll the learners in a campaign, they will all receive an enrollment email. In this email, this will
contain their unique training link that will bring them to the course page. Please note that no username or password is required for
learners to access the training
– Start and Finish Reminders: These emails will get sent out after the number of allotted days have passed
– Completion Notification: A learner will receive this once they have completed their training
o Completion Certificate: This will appear on the learner’s course page once they have completed all of the training. This
certificate cannot be customized at this time
Schedule: In this section you can select what specific date you would like your campaign to start on, and how many days you would like it
to run for.
– Repeat: If you would like to repeat your campaign for additional runs, you can do so here. For example, if you initially scheduled
the campaign for 30 days and had the repeat set to “1” – it would repeat the campaign for one additional 30 day run
Reset Enrollment: This is only applicable if you have set up an EPP Integration
Reset Learner Progress: If you have multiple runs in a campaign, the learners progress will reset once the new campaign run starts. If
you would like to include only those learners who did not complete the training in the first box, you will need make sure the box isn’t
checked.
Reporting
How to utilize the different reporting tools
in Infosec IQ
Campaign Results Report
After you have launched the campaign, you can get real-time campaign information by:
– Hovering over the campaign name and select “Details”
– Then Select the bar graph on the right-hand side
– This page will give you a detailed breakdown of each learner in the campaign and their results
This will generate a
csv report that
contains the
information on this
page
Infosec IQAuto-Reports
Once a campaign is launched, Infosec IQ automatically creates a report
that is specific to that campaign. You can access the auto-report by either
clicking on the status:
Or, navigating to the Reports dropdown menu and select Auto-Reports
Other Tools
Overview of the advance tools and features
in the Infosec IQ platform
Phishing Indicators
Phishing Indicators is a type of education available in a PhishSim campaign. When a
learner is phished, a new webpage will open up that has a screen shot of the email they
were just phished with. On that screen shot, there will be call-outs as to what the
learner should have noticed prior to click on the link.
PhishNotify
PhishNotify is a tool that allows employees to report potentially malicious emails, as
well as simulated phishing messages sent through an Infosec IQ campaign. For more
information, navigate to the PhishSim dropdown menu and select PhishNotify
SCORMas a Service
Infosec IQ allows you to add training modules to your Learning Management System
(LMS) for commonly used training modules by providing downloadable SCORM
packages for a non-interactive version of those modules. To view all of the modules
available for download, navigate to the Content Library and select SCORM as a Service
from the filter menu
Publishing Assistant
Converts any PDF into a training module with professional-grade voice-over
narration. Using Publishing Assistant, you can select from dozens of narrator
voices and languages. To access Publish Assistant, navigate to the AwareEd
drop-down menu and select Publishing Assistant.
Single Sign On(SSO)
SSO for Learner Authentication works by connecting your Infosec IQ
account to any Identity Provider that supports the SAML 2.0 standard. To
begin, Go to Settings (gear icon) and select Learner Authentication from the
menu.
API
Infosec IQ’s REST API allows you to Integrate important security awareness
training metrics into your existing business intelligence systems and
endpoint protection solutions.
Support
If you would like some one-on-one support with any of these tools, or with the platform, please
contact our Support Team:
Phone: 608.620.8838
Email: customer-support@infosecinstitute.com
They will get you in contact with one of our Implementation and Support Specialists to assist you
further.
ACTIONABLE
EDUCATION
INSPIRING
IDEAS
INSIDER
SNEAK PEEKS
PLENTY OF
NETWORKING
LEARN MORE events.infosecinstitute.com/Inspire19
Questions?

More Related Content

What's hot

Emergency Evacuation Planning Jim Burtles
Emergency Evacuation Planning Jim BurtlesEmergency Evacuation Planning Jim Burtles
Emergency Evacuation Planning Jim Burtles
bcilondonforum
 
Risk management
Risk managementRisk management
Risk management
Harold Malamion
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
Prof. Akram Hassan PhD,MBA,PMP,OPM3
 
Crisis management final
Crisis management finalCrisis management final
Crisis management finalGeeg geeh
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation Slides
SlideTeam
 
Risk Management
Risk ManagementRisk Management
Risk Management
Stefan Csosz
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
Indeevari Ramanayake
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Faheem Ul Hasan
 
Risk management
Risk managementRisk management
Risk management
Babasab Patil
 
Operations Risk Management
Operations Risk ManagementOperations Risk Management
Operations Risk Management
Medlin Rozario
 
Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
Raffael Marty
 
Improving Health, Safety and Environment Performance Analysis | Mark Weitner,...
Improving Health, Safety and Environment Performance Analysis | Mark Weitner,...Improving Health, Safety and Environment Performance Analysis | Mark Weitner,...
Improving Health, Safety and Environment Performance Analysis | Mark Weitner,...
Cairn India Limited
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
Achmad Solichin
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
SlideTeam
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
Maganathin Veeraragaloo
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Project risk management
Project risk managementProject risk management
Project risk management
Er Swati Nagal
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
PECB
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
sedukull
 
SWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptxSWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptx
MdMofijulHaque
 

What's hot (20)

Emergency Evacuation Planning Jim Burtles
Emergency Evacuation Planning Jim BurtlesEmergency Evacuation Planning Jim Burtles
Emergency Evacuation Planning Jim Burtles
 
Risk management
Risk managementRisk management
Risk management
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Crisis management final
Crisis management finalCrisis management final
Crisis management final
 
Risk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation SlidesRisk Management module PowerPoint Presentation Slides
Risk Management module PowerPoint Presentation Slides
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Risk management
Risk managementRisk management
Risk management
 
Operations Risk Management
Operations Risk ManagementOperations Risk Management
Operations Risk Management
 
Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
 
Improving Health, Safety and Environment Performance Analysis | Mark Weitner,...
Improving Health, Safety and Environment Performance Analysis | Mark Weitner,...Improving Health, Safety and Environment Performance Analysis | Mark Weitner,...
Improving Health, Safety and Environment Performance Analysis | Mark Weitner,...
 
Lecture 03 Software Risk Management
Lecture 03 Software Risk ManagementLecture 03 Software Risk Management
Lecture 03 Software Risk Management
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Project risk management
Project risk managementProject risk management
Project risk management
 
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
Implementation of Enterprise Risk Management with ISO 31000 Risk Management S...
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 
SWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptxSWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptx
 

Similar to Infosec IQ Essentials

Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec IQ MSP Implementation Webinar - 2019.10.08Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec
 
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
daniatrappit
 
Talent_lms introduction
Talent_lms introductionTalent_lms introduction
Talent_lms introduction
Anjan Kumar
 
Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure - eMail Marketing (Mailchimp)Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure
 
Visionslive - How to Create your First Focus Group
Visionslive - How to Create your First Focus GroupVisionslive - How to Create your First Focus Group
Visionslive - How to Create your First Focus Group
VisionsLive
 
How to use LinkedIn Learning
How to use LinkedIn LearningHow to use LinkedIn Learning
How to use LinkedIn Learning
Rebecca Ferriday
 
Brightspace Business Student Guide v3
Brightspace Business Student Guide v3 Brightspace Business Student Guide v3
Brightspace Business Student Guide v3
Mark Kor
 
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdfThe Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
Vinay Londhe
 
Creatingcontent
CreatingcontentCreatingcontent
Creatingcontent
Sat Án
 
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
RobertThorson2
 
Learning oxygen
Learning oxygenLearning oxygen
Learning oxygen
Gopal Swaminathan
 
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI DesignWhat Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
EI Design
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
Infosec
 
7 Step Guide to Developing Online Product Training
7 Step Guide to Developing Online Product Training7 Step Guide to Developing Online Product Training
7 Step Guide to Developing Online Product Training
CommLab India – Rapid eLearning Solutions
 
e learning management software - Witzscope
e learning management software - Witzscope e learning management software - Witzscope
e learning management software - Witzscope
Sethuraman Anandanatarajan
 
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Human Capital Media
 
Bridge Learning Solutions
Bridge Learning SolutionsBridge Learning Solutions
Bridge Learning SolutionsGlenn Chiles
 
E learning business roadmap
E learning business roadmapE learning business roadmap
E learning business roadmap
PP R
 
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
dytajym
 
Shelterland Services V2.1
Shelterland Services V2.1Shelterland Services V2.1
Shelterland Services V2.1Boesit
 

Similar to Infosec IQ Essentials (20)

Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec IQ MSP Implementation Webinar - 2019.10.08Infosec IQ MSP Implementation Webinar - 2019.10.08
Infosec IQ MSP Implementation Webinar - 2019.10.08
 
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
Running Head ADDIE Worksheet- HRMN 4061ADDIE Worksheet- HRMN 4
 
Talent_lms introduction
Talent_lms introductionTalent_lms introduction
Talent_lms introduction
 
Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure - eMail Marketing (Mailchimp)Edu4Sure - eMail Marketing (Mailchimp)
Edu4Sure - eMail Marketing (Mailchimp)
 
Visionslive - How to Create your First Focus Group
Visionslive - How to Create your First Focus GroupVisionslive - How to Create your First Focus Group
Visionslive - How to Create your First Focus Group
 
How to use LinkedIn Learning
How to use LinkedIn LearningHow to use LinkedIn Learning
How to use LinkedIn Learning
 
Brightspace Business Student Guide v3
Brightspace Business Student Guide v3 Brightspace Business Student Guide v3
Brightspace Business Student Guide v3
 
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdfThe Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
The Ultimate 6 Steps Guide to Right Customer Training Strategy.pdf
 
Creatingcontent
CreatingcontentCreatingcontent
Creatingcontent
 
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
top-features-to-include-in-employee-training-and-onboarding-software-for-saas...
 
Learning oxygen
Learning oxygenLearning oxygen
Learning oxygen
 
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI DesignWhat Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
What Is Bespoke eLearning? Featuring 6 Killer Examples - EI Design
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 
7 Step Guide to Developing Online Product Training
7 Step Guide to Developing Online Product Training7 Step Guide to Developing Online Product Training
7 Step Guide to Developing Online Product Training
 
e learning management software - Witzscope
e learning management software - Witzscope e learning management software - Witzscope
e learning management software - Witzscope
 
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
Modernize for Engagement: The 5 Steps to Breathing Life Back into Stale Content!
 
Bridge Learning Solutions
Bridge Learning SolutionsBridge Learning Solutions
Bridge Learning Solutions
 
E learning business roadmap
E learning business roadmapE learning business roadmap
E learning business roadmap
 
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
Organizational Behavior A Practical Problem Solving Approach 2nd Edition Kini...
 
Shelterland Services V2.1
Shelterland Services V2.1Shelterland Services V2.1
Shelterland Services V2.1
 

More from Infosec

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
Infosec
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
Infosec
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
Infosec
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
Infosec
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
Infosec
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
Infosec
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
Infosec
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
Infosec
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
Infosec
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
Infosec
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
Infosec
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
Infosec
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
Infosec
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
Infosec
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
Infosec
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
Infosec
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
Infosec
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
Infosec
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
Infosec
 

More from Infosec (20)

AWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certifiedAWS Certified DevOps Engineer: What it is and how to get certified
AWS Certified DevOps Engineer: What it is and how to get certified
 
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certifiedAWS Cloud Operations Administrator: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptxAWS Certified Solutions Architect Webinar.pptx
AWS Certified Solutions Architect Webinar.pptx
 
Infosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec and AWS - A new way to train for your AWS certification (1).pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...Skills training value: How to differentiate your staff and your organization ...
Skills training value: How to differentiate your staff and your organization ...
 
Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...Learning ≠ Education: How people really learn and what it means for security ...
Learning ≠ Education: How people really learn and what it means for security ...
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
How to do application security right
How to do application security rightHow to do application security right
How to do application security right
 
A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...A public discussion about privacy careers: Training, certification and experi...
A public discussion about privacy careers: Training, certification and experi...
 
Learn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident responseLearn intrusion detection: Using Zeek and Elastic for incident response
Learn intrusion detection: Using Zeek and Elastic for incident response
 
Get started in cybersecurity in 2022
Get started in cybersecurity in 2022Get started in cybersecurity in 2022
Get started in cybersecurity in 2022
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Infosec IQ Essentials

  • 1. The right knowledge. Right now. Essentials Webinar
  • 2. Meet your speakers Emma Waite Implementation Specialist Hunter Reed Moderator
  • 3. Agenda 1. Overview of Infosec IQ 2. Navigating the Dashboard 3. Managing Learners 4. PhishSim Campaigns 5. AwareEd Campaigns 6. Reporting 7. Other Tools
  • 4. Overview of Infosec IQ Infosec IQ provides Security Awareness training through simulated phishing messages, interactive training videos, and quizzes. PhishSim: Includes 1,000s of phishing templates in a variety of attack types and difficulty levels. New templates are added each week, helping your organization stay ahead of the latest threats. AwareEd: Our massive library of industry- and role-based training resources is updated weekly, helping you deliver fresh, relevant training to every member of your organization no matter the style and tone you need
  • 5. Navigating the Dashboard • Core Behavior Compliance Infosec IQ’s training modules are linked to one of the Core Behaviors outlined by National Institute of Standards and Technology (NIST) • Click Rate This chart shows an overall percentage of learners who fell for the different email attack types in all PhishSim campaigns • What’s New Provides you with updates to features or new functionality in the platform. • Subscription Settings Allows you to view your renewal date, learner seat utilization, and current plan. • Join the Community! TechExams Community is a space for IT professionals to share problems and find solutions.
  • 6. Managing Learners Adding learners to the platform • Active Directory Sync • CSV File Import • Manual Groups • Static • Dynamic Learner’s Profile • Letter Grade • Timeline Events
  • 7. PhishSim Campaigns How to configure and deploy PhishSim campaigns
  • 8. Simulated Phished Email Templates Navigating the email template page Email Template Tabs • All: This includes all available email templates under each tab • Personal: These are all the templates that you have cloned or built from scratch • Contributed: These are templates that other Infosec IQ customers have shared • System: These are templates that the Infosec IQ Content Team have pre-built Previewing an email template An admin can preview an email template right in the platform or or email a preview to themselves. Cloning an email template This will give the admin the ability to make changes to an existing template in the platform. Once saved, the email template can be found in the Personal tab.
  • 9. Customizing Email Templates From Email: You can change the from email by selecting the settings gear Attack Type: This is where you can change the attack type of that specific email Education: This is where you can change the education that a learner views after they get phished Tools: This will allow you to edit/add source code (HTML) to the email template. Preview in Browser: This will allow you to preview as a learner, as well as send an email preview to yourself
  • 10. Email Attack Types Drive-by: This is where a learner clicks on any link in the PhishSim email that they receive Attachment: This will add an attachment to the PhishSim Email that will track if a learner enables macros on that document Data Entry: After a learner clicks on a link in the PhishSim email, they will be brought to a login page. SecurityIQ doesn’t track the credentials being entered, as those are blank key strokes Business Email Compromise: These templates are requesting specific information for that learner and tracking to see if the responded back with sensitive information To view a complete list of Data Entry Login Sites, please navigate to the Data Entry Template section in SecurityIQ
  • 11. PhishSim Education • To view all of the different types of education available for a PhishSim campaign, locate the Education section under the PhishSim menu. On this page you will notice: – Five interactive AwareEd training video options – Pre-built static education pages • You can build custom education pages by selecting “New Education” in the top right corner. There are two other education options that you can assign learners to outside of Interactive and Static education pages Phishing Indicators When a leaner gets phished, they will be taken to a webpage that has a screen shot of the email that they were just phished on. Included on that screen will be specific call-outs to what the learner should have noticed prior to clicking on the link. External Links After a learner gets phished, they will be redirected to an external link. To get this set-up, you will select “New Education” and insert the external URL that you will want to bring learners to.
  • 12. PhishSim Batteries A Battery is a way to group specific email templates to point at a campaign. Some Infosec IQ customers group emails based on certain commonalities such as method, education, etc. The Infosec IQ platform has pre-built batteries that an admin can use or clone to customize.
  • 13. PhishSim Campaigns • After you have your Battery built, you are ready to schedule your campaign. To create and schedule a PhishSim campaign, navigate to Campaigns under PhishSim. On this page select “New Campaign”: – Campaign Name: This isn’t visible to the learners – Branding: Your default brand should be automatically selected. If you have multiple branding options, you can select the specific brand you want shown – Learners: This is where you can choose if you would want the campaign to go to… • All Learners – A Specific Learner Group – Individual Learners • Content: In this section you can select a specific template, battery, or category that you would like to send emails from simply by typing in the name. • Battery Options: By default, the learner will receive all the templates that are selected. You can also choose how many templates each learner receives out of the battery by selecting “Send Random Phishing Templates”. This option is recommended especially if using Categories, as some of our categories have 20+ templates
  • 14. PhishSim Campaigns Continued • Phished Actions – Notification: This is a follow up email that gets sent to a phished learner that you can customize. You can also turn this follow up email off down in “Schedule” – Group: Prior to building your campaign, you can create a group that you would like phished learners to be added to • Learner Replies: – Used for Business Email Compromise attacks. – Tracks total number of replies as well as which emails your learners responded to. – Advance options allow for viewing the reply and for matching strings or patterns in responses. • Schedule – Send Phishing Attacks Over Time: This is where you can schedule out the email templates to be delivered to the learners over a period of time. For example: if you run a campaign for 30 days and you have three email templates going to each learner – the learner will receive those three email templates at random over the next 30 days – Send Phishing Attacks at One Time: This option will allow you to send out all the templates at once. This option is great if you want to quickly test the email templates to see how they look – prior to deploying the campaign to all learners. To out a quick test campaign, all you will need to do is select any time in the past. Once you schedule the campaign, the emails will get sent out as soon as our servers queue them up.
  • 15. AwareEd Campaigns How to configure and deploy AwareEd Campaigns
  • 16. AwareEd Campaigns What is an AwareEd Campaign? An AwareEd campaign consists of interactive training modules and/or assessments that you can enroll learners in for a certain period. In this section, we will cover: – How to navigate the Content Library – Build Courses – Create a Campaign
  • 17. Navigating the Content Library This Module is available for SCORM as a Service Download Indicates what languages that module/assessment have been translated in Allows you to preview the module/assessment Adds module/assessment to Course Builder Assessment Assets: This counts the total number of modules, assessments, program resources that we have. If the asset is available in multiple languages, those are counted as individual assets. Search: Allows you to search for a specific content Filter: You can filter on different areas to help you select content Course Builder: This appears on the left-hand side of the screen when you add a module/assessment to a course (see slide 17)
  • 18. Course Builder • The Course Builder will appear in the Content Library once you have selected the “+” symbol on any of our modules and assessments. • Course Name: This is visible to the learner • Module Order: As you add content, it will be added in the module order section. You can rearrange the order of the content by dragging and dropping. You can also remove any content by clicking the “x” icon. • Course Statistics: This will give you an overview of the number of modules in the course, total length, and the number of exercises included. Please note that the total length is the total length of the video + how long it takes the average learner to complete the exercises; it does not take in to account how long it takes learners to complete assessments. • Once you select “Save Course”, you can view and edit your course by navigating to AwareEd > Courses
  • 19. Campaign Creation Once you have your course built with the selected modules and/or assessments, you are now ready to create your campaign. To accomplish this, please navigate to AwareEd and select “campaigns”. Once on the campaigns page, click “new campaign”. Campaign Name: This isn’t visible to the learner, but will help you remember what content you deployed Branding: The branding option you select will be visible in the beginning of an AwareEd Module, on a learner’s course page, and in the notification emails that they receive Learners: In this section you can select whether you want the campaign to be pushed out to: – All Learners – Learner Groups – Individual Learners Courses: In this section, you can locate the course that you would like to use by clicking on the dropdown menu. You can also select a default language from the dropdown. Please note that all of our modules are not available in every language, as well as the learner has the opportunity to select their preferred language on their course page – Begin Modules upon Page Upload: This will automatically start the videos – Require learners to retake failed assessments: If you have included an assessment, this will give the learner the opportunity to retake an assessment – Restrict access after campaign run completion: By default, learner will still have access to the training after the campaign run is complete. Select this option if you would like to restrict the learner from taking the training after the campaign has finished
  • 20. AwareEd Campaign Creation Continued Notifications: These are emails that get sent out to the learner during the lifespan of the campaign. All of these notifications can be customized by navigating to the “Notifications” section under AwareEd – Enrollment Notification: Once you enroll the learners in a campaign, they will all receive an enrollment email. In this email, this will contain their unique training link that will bring them to the course page. Please note that no username or password is required for learners to access the training – Start and Finish Reminders: These emails will get sent out after the number of allotted days have passed – Completion Notification: A learner will receive this once they have completed their training o Completion Certificate: This will appear on the learner’s course page once they have completed all of the training. This certificate cannot be customized at this time Schedule: In this section you can select what specific date you would like your campaign to start on, and how many days you would like it to run for. – Repeat: If you would like to repeat your campaign for additional runs, you can do so here. For example, if you initially scheduled the campaign for 30 days and had the repeat set to “1” – it would repeat the campaign for one additional 30 day run Reset Enrollment: This is only applicable if you have set up an EPP Integration Reset Learner Progress: If you have multiple runs in a campaign, the learners progress will reset once the new campaign run starts. If you would like to include only those learners who did not complete the training in the first box, you will need make sure the box isn’t checked.
  • 21. Reporting How to utilize the different reporting tools in Infosec IQ
  • 22. Campaign Results Report After you have launched the campaign, you can get real-time campaign information by: – Hovering over the campaign name and select “Details” – Then Select the bar graph on the right-hand side – This page will give you a detailed breakdown of each learner in the campaign and their results This will generate a csv report that contains the information on this page
  • 23. Infosec IQAuto-Reports Once a campaign is launched, Infosec IQ automatically creates a report that is specific to that campaign. You can access the auto-report by either clicking on the status: Or, navigating to the Reports dropdown menu and select Auto-Reports
  • 24. Other Tools Overview of the advance tools and features in the Infosec IQ platform
  • 25. Phishing Indicators Phishing Indicators is a type of education available in a PhishSim campaign. When a learner is phished, a new webpage will open up that has a screen shot of the email they were just phished with. On that screen shot, there will be call-outs as to what the learner should have noticed prior to click on the link. PhishNotify PhishNotify is a tool that allows employees to report potentially malicious emails, as well as simulated phishing messages sent through an Infosec IQ campaign. For more information, navigate to the PhishSim dropdown menu and select PhishNotify SCORMas a Service Infosec IQ allows you to add training modules to your Learning Management System (LMS) for commonly used training modules by providing downloadable SCORM packages for a non-interactive version of those modules. To view all of the modules available for download, navigate to the Content Library and select SCORM as a Service from the filter menu
  • 26. Publishing Assistant Converts any PDF into a training module with professional-grade voice-over narration. Using Publishing Assistant, you can select from dozens of narrator voices and languages. To access Publish Assistant, navigate to the AwareEd drop-down menu and select Publishing Assistant. Single Sign On(SSO) SSO for Learner Authentication works by connecting your Infosec IQ account to any Identity Provider that supports the SAML 2.0 standard. To begin, Go to Settings (gear icon) and select Learner Authentication from the menu. API Infosec IQ’s REST API allows you to Integrate important security awareness training metrics into your existing business intelligence systems and endpoint protection solutions.
  • 27. Support If you would like some one-on-one support with any of these tools, or with the platform, please contact our Support Team: Phone: 608.620.8838 Email: customer-support@infosecinstitute.com They will get you in contact with one of our Implementation and Support Specialists to assist you further.