Home

slider-bg.png

Welcome

Welcome to the Living Security Community! Make us your home for collaborating and learning with other cybersecurity awareness professionals. Bookmark the site and visit it often. There's always something new in store for you. 

slider-bg.png

 

Community Job Board

Are you hiring OR looking for a new challenge? Tell us all about it on the Job Board

Need help?

If you can't find the Living Security product solution you're looking for, fret not, there are a lot of ways to contact Support. 

Contact Our Support Team

Join the Discussion

Living Security developed this Community to support cybersecurity leaders just like you. We realize the challenges of your role, so let's help each other by sharing what's working best in your human risk management program! 

Let's Get Talking!

Job Board 

Are you looking for a new challenge, or do you have an opening with a great opportunity in the field of cybersecurity awareness? Let's network! 

See the Job Board

Have an idea?

Do you have a suggestion to improve a Living Security product or offering? Our engineers and content teams are working tirelessly behind the scenes to make your dreams come true. We'd love to hear from you.

Submit Your Idea

Living Security Blogs

  • Incident Response Plan: Frameworks & Steps In today’s digitally driven world, cybersecurity threats like ransomware, malware, and other malicious activities are not just possibilities—they're inevitabilities. Recognizing this, the development and implementation of a robust Incident Response Plan (IRP) becomes paramount for organizations aiming to safeguard their digital assets and maintain operational resilience. An effective IRP is not just about reactive measures; it's a comprehensive strategy that involves specific steps and adherence to proven frameworks such as those provided by NIST (National Institute of Standards and Technology) and SANS (SysAdmin, Audit, Network, and Security) Institute. These frameworks guide organizations across the maze of cyber threats, ensuring effective containment and recovery while minimizing damage and costs. By following a structured approach, businesses can not only handle incidents more efficiently but also fortify their defenses against future incidents, making an Incident Response Plan an indispensable part of any cybersecurity strategy. An incident response plan empowers organizations to respond swiftly and decisively, significantly reducing the potential impact of cyber incidents. This proactive stance is essential in today’s landscape where the question is not if an attack will happen, but when.
  • Leveraging Human Risk Management for your Career Advancement Securing a promotion in any professional field requires strategic planning, consistent effort, and effective communication of accomplishments. As someone leading Security Awareness and Training, understanding how Human Risk Management (HRM) can aid in this progression is pivotal. There is a great article published by Ruchi Sinha, PhD, Associate Professor of Organizational Behavior at the University of South Australia Business School, featured in the Harvard Business Review, where she creates a roadmap for earning a promotion in various roles. In this instance we have tailored these insights to focus on the domain of Security Awareness and Training. Read a summary below of the key steps you can take. Or for an in-depth look, download the full white paper here.
  • Empower Security Teams with HRM Orchestration As a global leader in Human Risk Management (HRM), we proudly announce the broadening of our Unify HRM platform with orchestrated response capabilities. This new feature establishes a proactive security loop and lets security teams automatically trigger targeted interventions based on changes in human-related risk. The new workflow automation and orchestration capabilities in the Unify HRM platform empower security teams to respond proactively to evolve human risks at the enterprise scale. The platform uses data from your existing IT security tools for a holistic view of the cyber risks you and your workforce face, focusing on protecting your riskiest employees through personalized training.


VIDEOS AND TRAILERS


Cybersecurity Quotables

“Education has always been a profit-enabler for individuals and the corporation. Education ... must evolve quickly and radically to keep pace with digital transition. Education is a part of the digital equation.”  ― Stephane Nappo

“If you spend more on coffee than on IT security, you will be hacked."  ― Richard Clarke

“As cyber security leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.” ― Britney Hommertzheim