Home

slider-bg.png

Welcome

Welcome to the Living Security Community! Make us your home for collaborating and learning with other cybersecurity awareness professionals. Bookmark the site and visit it often. There's always something new in store for you. 

slider-bg.png

 

Community Job Board

Are you hiring OR looking for a new challenge? Tell us all about it on the Job Board

Need help?

If you can't find the Living Security product solution you're looking for, fret not, there are a lot of ways to contact Support. 

Contact Our Support Team

Join the Discussion

Living Security developed this Community to support cybersecurity leaders just like you. We realize the challenges of your role, so let's help each other by sharing what's working best in your human risk management program! 

Let's Get Talking!

Job Board 

Are you looking for a new challenge, or do you have an opening with a great opportunity in the field of cybersecurity awareness? Let's network! 

See the Job Board

Have an idea?

Do you have a suggestion to improve a Living Security product or offering? Our engineers and content teams are working tirelessly behind the scenes to make your dreams come true. We'd love to hear from you.

Submit Your Idea


Living Security Blogs

  • Why Your Organization Needs Both, But For Different Reasons As organizations continue to invest in security solutions focused on human behavior, there's growing confusion between Insider Risk Management (IRM) and Human Risk Management (HRM). While both deal with human activities in security, they serve fundamentally different purposes and solve distinct challenges. Let's clear up the confusion and understand why many organizations need both solutions in their security stack.
  • In today's rapidly evolving threat landscape, the speed and efficiency of cybersecurity incident response can mean the difference between a minor security event and a major breach. As organizations face an increasing number of security alerts, traditional manual response processes are no longer sufficient to keep pace with the volume and sophistication of threats.
  • The vulnerability management lifecycle plays a crucial role in enhancing organizational security strategies. Understanding this lifecycle empowers organizations to manage vulnerabilities effectively, protecting valuable assets and maintaining a proactive defense against cyber threats. By mastering the six essential steps in the vulnerability management lifecycle, security professionals can significantly improve their ability to identify, assess, and mitigate potential threats. Integrating Human Risk Management (HRM) into this lifecycle elevates these efforts, addressing not only technical vulnerabilities but also human-driven risks, creating a comprehensive approach that adapts to evolving threats and helps ensure compliance with industry standards.


VIDEOS AND TRAILERS


Cybersecurity Quotables

“Education has always been a profit-enabler for individuals and the corporation. Education ... must evolve quickly and radically to keep pace with digital transition. Education is a part of the digital equation.”  ― Stephane Nappo

“If you spend more on coffee than on IT security, you will be hacked."  ― Richard Clarke

“As cyber security leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.” ― Britney Hommertzheim