212 patents
Utility
Time based triggering of dynamic templates
16 Jan 24
Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user.
Greg Kras
Filed: 26 Sep 22
Utility
Systems and methods for using attribute data for system protection and security awareness training
19 Dec 23
The present disclosure describes a system for saving metadata on files and using attribute data files inside a computing system to enhance the ability to provide user interfaces based on actions associated with non-executable attachments like text and document files from untrusted emails, to block execution of potentially harmful executable object downloads and files based on geographic location, and to a create a prompt for users to decide whether to continue execution of potentially harmful executable object downloads and files.
Bret Lowry, Gauvin Repuspolo
Filed: 4 Apr 22
Utility
Systems and methods for adaptation of SCORM packages at runtime with an extended LMS
19 Dec 23
Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users.
Carl Kritzinger, Francisco Barreto, Mark William Patton
Filed: 6 Mar 23
Utility
Systems and Methods for Aida Based Exploit Selection
30 Nov 23
Systems and methods of embodiments are described of a campaign controller that establishes a model for using a plurality of types of exploits based on at least results of simulated phishing communications using those exploits, and uses the model to communicate a first simulated phishing communication to one or more devices of a user where the type of exploit used for the first simulated phishing communication is selected using the model.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 3 May 23
Utility
Systems and methods for artificial intelligence driven agent campaign controller
24 Oct 23
The present disclose describes systems and methods for creating a simulated phishing campaign for a user based on at least a history of the user with respect to simulated phishing campaigns.
Eric Sites
Filed: 26 Jan 21
Utility
Systems and methods for situational localization of AIDA
24 Oct 23
The present disclosure describes systems and methods for using for a simulated phishing campaign, information about one or more situations of a user determined from an electronic calendar of the user, A campaign controller may identify/an electronic calendar of a user for which to direct a simulated phishing campaign, determine one or more situations of the user from information stored in the electronic calendar and select either a template from a plurality of templates or a starting action from a plurality of starting actions for the simulated phishing campaign based at least on the one or more situations of the user.
Greg Kras
Filed: 16 Mar 22
Utility
Systems and methods for subscription management of specific classification groups based on user's actions
17 Oct 23
Embodiments of the disclosure describe systems and methods for selecting a first group of users, which is selected to receive simulated phishing emails as part of a simulated phishing campaign, and adding users to a second group of users based upon those selected users interacting with a simulated phishing email that is part of a simulated phishing campaign; tracking the completion of remediation training related to phishing emails by users in the second group of users and receiving one or more indications that the users in the second group of users have completed remedial training; and automatically adding users, who are members of the second user group, to the first user group, to a third user group, or to a predetermined user group responsive to the one or more indications that the users in the second group of users have completed remedial training.
Greg Kras, Alin Irimie
Filed: 31 Oct 22
Utility
Systems and methods for performing or creating simulated phishing attacks and phishing attack campaigns
3 Oct 23
A method for establishing a campaign for a simulated phishing attack includes receiving, via a campaign manager, specification of a plurality of parameters for a campaign including at least an identifier of a campaign and identification of users to which to send the campaign, establishing, via the campaign manager, a type of exploit for the campaign and one or more types of data to collect via the type of exploit, storing, by the campaign manager, the campaign comprising the plurality of parameters, and identifying, by a simulation server, the campaign stored in the database to create a simulated phishing email, to be sent to email accounts of the users, using the plurality of parameters of the campaign, wherein the simulated phishing email is to be created to have a link to a landing page comprising the type of exploit and configured to collect the one or more types of data.
Alin Irimie, Wendy Bartlett, David Austin
Filed: 30 Nov 20
Utility
Systems and methods for AIDA based exploit selection
3 Oct 23
Systems and methods of embodiments are described of a campaign controller that establishes a model for using a plurality of types of exploits based on at least results of simulated phishing communications using those exploits, and uses the model to communicate a first simulated phishing communication to one or more devices of a user where the type of exploit used for the first simulated phishing communication is selected using the model.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 1 Dec 17
Utility
Determining Template Difficulty Based on Security Maturity
28 Sep 23
Systems and methods are provided for determining template difficulty based on user security maturity.
Greg Kras
Filed: 23 Feb 23
Utility
Systems and methods for aida based A/B testing
22 Aug 23
Systems and methods are described by which a serving module of a campaign controller identifies a first version of a model which the campaign controller uses to communicate a first simulated phishing communication to a plurality of users.
Eric Sites
Filed: 15 Apr 21
Utility
Methods and Systems for Security Maturity Determination
17 Aug 23
Systems and methods are described for security maturity determination.
Greg Kras, Perry Carpenter
Filed: 10 Feb 23
Utility
System and methods of cybersecurity attack simulation for incident response training and awareness
15 Aug 23
Systems and methods are disclosed that are useful for minimizing organization risk in the case of a cybersecurity attack, through computer-based simulation of cybersecurity attacks, incident response tracking and incident response training provided responsive to the simulation outcome.
Greg Kras, Alin Irimie
Filed: 8 Apr 21
Utility
Systems and methods for effective delivery of simulated phishing campaigns
15 Aug 23
Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users.
Mark William Patton, Daniel Cormier, Greg Kras
Filed: 9 Jan 23
Utility
Systems and methods for use of address fields in a simulated phishing attack
15 Aug 23
Systems and methods are disclosed for creating simulated phishing attack messages that have characteristics which make them appear genuine, while also having characteristics that a user should recognize as being false.
Jasmine Rodriguez, Daniel Cormier
Filed: 30 Aug 21
Utility
Systems and Methods for Reporting Based Simulated Phishing Campaign
3 Aug 23
Systems and methods are described for leveraging the knowledge and security awareness of well-informed users in an organization to protect other users and train them to identify new phishing attacks.
Greg Kras, Alin Irimie
Filed: 22 Mar 23
Utility
System and Methods for Minimizing Organization Risk from Users Associated with a Password Breach
27 Jul 23
System and methods are disclosed for organizations to run a test against an active directory list to see if any user-provided passwords have been part of an existing data breach.
Greg Kras
Filed: 30 Mar 23
Utility
Systems and Methods for Creating and Commissioning a Security Awareness Program
13 Jul 23
Methods, systems and apparatus for implementing a security awareness program are provided which allow a device of a security awareness system to receive attributes of an implementation of a security awareness program from an entity, such as a company.
Greg Kras, Alin Irimie, Perry Carpenter, Suzanne Gorman
Filed: 2 Mar 23
Utility
Systems and Methods for an Artificial Intelligence Driven Smart Template
13 Jul 23
The present disclosure describes systems and methods for using a template for a simulated phishing campaign, A database includes a plurality of templates for simulated phishing campaigns, each template of the plurality of templates identifying a list of a plurality of types of simulated phishing communications and at least a portion of content for the simulated phishing communications.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 23 Mar 23
Utility
Systems and Methods for Performing Simulated Phishing Attacks Using Social Engineering Indicators
13 Jul 23
Systems and methods are provided for performing simulated phishing attacks using social engineering indicators.
Alin Irimie, Greg Kras, David Austin, Benjamin Dalton
Filed: 6 Mar 23