212 patents
Page 2 of 11
Utility
Systems and Methods for Adaptation of Scorm Packages at Runtime with an Extended LMS
6 Jul 23
Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users.
Carl Kritzinger, Francisco Barreto, Mark William Patton
Filed: 6 Mar 23
Utility
Systems and Methods for an Artificial Intelligence Driven Smart Template
6 Jul 23
The present disclosure describes systems and methods for determining a subsequent action of a simulated phishing campaign.
Stu Sjouwerman
Filed: 15 Mar 23
Utility
Systems and Methods for Human Resources Applications of Security Awareness Testing
29 Jun 23
Systems and methods are described for facilitating assessment of security awareness of a candidate prior to a decision on whether or not to hire the candidate.
Alin Irimie, Drew Graef, Nicole McBride, Isida Drake, Daniel Lorch
Filed: 23 Feb 23
Utility
Systems and Methods for Effective Delivery of Simulated Phishing Campaigns
25 May 23
Systems and methods are described for improving assessment of security risk based on a user's personal information.
Mark William Patton, Daniel Cormier, Greg Kras
Filed: 9 Jan 23
Utility
Systems and Methods for Effective Delivery of Simulated Phishing Campaigns
25 May 23
Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users.
Mark William Patton, Daniel Cormier, Greg Kras
Filed: 9 Jan 23
Utility
Systems and Methods for Artificial Model Building Techniques
25 May 23
Embodiments disclosed describe a security awareness system may adaptively learn the best design of a simulated phishing campaign to get a user to perform the requested actions, such as clicking a hyperlink or opening a file.
Eric Sites
Filed: 9 Jan 23
Utility
Systems and Methods for Using Artificial Intelligence Driven Agent to Automate Assessment of Organizational Vulnerabilities
4 May 23
The present disclosure describes systems and method for performing a vulnerabilities assessment of an organization.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 7 Nov 22
Utility
System and methods for minimizing organization risk from users associated with a password breach
2 May 23
System and methods are disclosed for organizations to run a test against an active directory list to see if any user-provided passwords have been part of an existing data breach.
Greg Kras
Filed: 14 Jun 21
Utility
Systems and methods for reporting based simulated phishing campaign
2 May 23
Systems and methods are described for leveraging the knowledge and security awareness of well-informed users in an organization to protect other users and train them to identify new phishing attacks.
Greg Kras, Alin Irimie
Filed: 16 Apr 21
Utility
Systems and methods for an artificial intelligence driven smart template
18 Apr 23
The present disclosure describes systems and methods for using a template for a simulated phishing campaign, A database includes a plurality of templates for simulated phishing campaigns, each template of the plurality of templates identifying a list of a plurality of types of simulated phishing communications and at least a portion of content for the simulated phishing communications.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 27 Aug 20
Utility
Systems and methods for human resources applications of security awareness testing
11 Apr 23
Systems and methods are described for facilitating assessment of security awareness of a candidate prior to a decision on whether or not to hire the candidate.
Alin Irimie, Drew Graef, Nicole McBride, Isida Drake, Daniel Lorch
Filed: 29 Mar 21
Utility
Systems and methods for AIDA based grouping
11 Apr 23
The present disclosure describes systems and methods for dynamically creating groups of users based on attributes for simulated phishing campaign.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 17 Dec 21
Utility
Systems and methods for an artificial intelligence driven smart template
28 Mar 23
The present disclosure describes systems and methods for determining a subsequent action of a simulated phishing campaign.
Stu Sjouwerman
Filed: 22 Dec 20
Utility
Systems and Methods for Determination of Level of Security to Apply to a Group Before Display of User Data
23 Mar 23
Systems and methods are described for using secured groups for simulated phishing campaigns to obfuscate data for levels of privacy based on protected criteria classes.
Greg Kras, Chris Cline
Filed: 14 Nov 22
Utility
Systems and Methods for Enrichment of Breach Data for Security Awareness Training
16 Mar 23
Systems and methods are described for enrichment of breach data for security awareness training.
Colin Murphy
Filed: 31 Aug 22
Utility
Systems and Methods for Security Awareness Using Ad-based Simulated Phishing Attacks
9 Mar 23
Systems and methods are described for modifying one or more advertisements of a webpage or a social media feed to create a simulated cybersecurity attack.
Greg Kras, Chris Cline
Filed: 7 Nov 22
Utility
Systems and Methods for Providing Configurable Responses to Threat Identification
9 Mar 23
Systems and methods are described for providing customized message content to be displayed to a user of an email client, responsive to the user selecting, via a plug-in or agent of the email client, to report an email as a potential phishing email.
Greg Kras, Adam Alessandrini
Filed: 14 Nov 22
Utility
Systems and methods for performing simulated phishing attacks using social engineering indicators
7 Mar 23
Systems and methods are provided for performing simulated phishing attacks using social engineering indicators.
Alin Irimie, Greg Kras, David Austin, Benjamin Dalton
Filed: 19 Jul 21
Utility
Systems and methods for adaptation of SCORM packages at runtime with an extended LMS
7 Mar 23
Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users.
Carl Kritzinger, Francisco Barreto, Mark William Patton
Filed: 23 Feb 21
Utility
Systems and methods for creating and commissioning a security awareness program
7 Mar 23
Methods, systems and apparatus for implementing a security awareness program are provided which allow a device of a security awareness system to receive attributes of an implementation of a security awareness program from an entity, such as a company.
Greg Kras, Alin Irimie, Perry Carpenter, Suzanne Gorman
Filed: 20 Jun 18