Welcome to the Living Security Community! Make us your home for collaborating and learning with other cybersecurity awareness professionals. Bookmark the site and visit it often. There's always something new in store for you. 



Community Job Board

Are you hiring OR looking for a new challenge? Tell us all about it on the Job Board

Need help?

If you can't find the Living Security product solution you're looking for, fret not, there are a lot of ways to contact Support. 

Contact Our Support Team

Join the Discussion

Living Security developed this Community to support cybersecurity leaders just like you. We realize the challenges of your role, so let's help each other by sharing what's working best in your human risk management program! 

Let's Get Talking!

Job Board 

Are you looking for a new challenge, or do you have an opening with a great opportunity in the field of cybersecurity awareness? Let's network! 

See the Job Board

Have an idea?

Do you have a suggestion to improve a Living Security product or offering? Our engineers and content teams are working tirelessly behind the scenes to make your dreams come true. We'd love to hear from you.

Submit Your Idea

Living Security Blogs

  • The Types of Data Breaches Workplaces Face Data breaches have become an increasingly prevalent threat to organizations across all industries. As technology continues to advance and more sensitive information is stored digitally, the risk of data breaches grows exponentially. It is crucial for workplaces to understand the different types of cyber security breaches they face to better protect their valuable assets, reputation, and bottom line. The consequences of a data breach can be severe, ranging from financial losses due to theft or regulatory fines, to reputational damage that erodes customer trust and loyalty. Moreover, data breaches can lead to legal implications, such as lawsuits and investigations. By gaining a comprehensive understanding of the various forms of data breaches, organizations can take proactive measures to safeguard their confidential information and mitigate potential risks.
  • Incident Response Plan: Frameworks & Steps In today’s digitally driven world, cybersecurity threats like ransomware, malware, and other malicious activities are not just possibilities—they're inevitabilities. Recognizing this, the development and implementation of a robust Incident Response Plan (IRP) becomes paramount for organizations aiming to safeguard their digital assets and maintain operational resilience. An effective IRP is not just about reactive measures; it's a comprehensive strategy that involves specific steps and adherence to proven frameworks such as those provided by NIST (National Institute of Standards and Technology) and SANS (SysAdmin, Audit, Network, and Security) Institute. These frameworks guide organizations across the maze of cyber threats, ensuring effective containment and recovery while minimizing damage and costs. By following a structured approach, businesses can not only handle incidents more efficiently but also fortify their defenses against future incidents, making an Incident Response Plan an indispensable part of any cybersecurity strategy. An incident response plan empowers organizations to respond swiftly and decisively, significantly reducing the potential impact of cyber incidents. This proactive stance is essential in today’s landscape where the question is not if an attack will happen, but when.
  • Leveraging Human Risk Management for your Career Advancement Securing a promotion in any professional field requires strategic planning, consistent effort, and effective communication of accomplishments. As someone leading Security Awareness and Training, understanding how Human Risk Management (HRM) can aid in this progression is pivotal. There is a great article published by Ruchi Sinha, PhD, Associate Professor of Organizational Behavior at the University of South Australia Business School, featured in the Harvard Business Review, where she creates a roadmap for earning a promotion in various roles. In this instance we have tailored these insights to focus on the domain of Security Awareness and Training. Read a summary below of the key steps you can take. Or for an in-depth look, download the full white paper here.


Cybersecurity Quotables

“Education has always been a profit-enabler for individuals and the corporation. Education ... must evolve quickly and radically to keep pace with digital transition. Education is a part of the digital equation.”  ― Stephane Nappo

“If you spend more on coffee than on IT security, you will be hacked."  ― Richard Clarke

“As cyber security leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.” ― Britney Hommertzheim