212 patents
Page 3 of 11
Utility
Auto Smart Groups Trend Analytics
2 Mar 23
The systems and methods disclose creating variations of criteria for a query-based group of users.
Jasmine Rodriguez, Andy Reed, Mark Ezell
Filed: 17 Aug 22
Utility
Systems and Methods for Subscription Management of Specific Classification Groups Based on User’s Actions
16 Feb 23
Embodiments of the disclosure describe systems and methods for selecting a first group of users, which is selected to receive simulated phishing emails as part of a simulated phishing campaign, and adding users to a second group of users based upon those selected users interacting with a simulated phishing email that is part of a simulated phishing campaign; tracking the completion of remediation training related to phishing emails by users in the second group of users and receiving one or more indications that the users in the second group of users have completed remedial training; and automatically adding users, who are members of the second user group, to the first user group, to a third user group, or to a predetermined user group responsive to the one or more indications that the users in the second group of users have completed remedial training.
Greg Kras, Alin Irimie
Filed: 31 Oct 22
Utility
Systems and Methods for Analysis of User Behavior to Improve Security Awareness
9 Feb 23
Systems and methods are disclosed for analysis of user behavior data to improve security awareness.
Mark William Patton
Filed: 28 Jul 22
Utility
Automated effective template generation
24 Jan 23
The systems and methods disclose an automated effective template generation and recommendation for selection.
Jasmine Rodriguez
Filed: 30 Aug 22
Utility
Time Based Triggering of Dynamic Templates
19 Jan 23
Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user.
Greg Kras
Filed: 26 Sep 22
Utility
Systems and Methods for Simulated Phishing Attacks Involving Message Threads
12 Jan 23
Systems and methods are disclosed for simulating a phishing attack involving an email thread.
Greg Kras
Filed: 15 Aug 22
Utility
Systems and methods for effective delivery of simulated phishing campaigns
10 Jan 23
Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users.
Mark William Patton, Daniel Cormier, Greg Kras
Filed: 24 Aug 20
Utility
Systems and methods for improving assessment of security risk based on personal internet account data
10 Jan 23
Systems and methods are described for improving assessment of security risk based on a user's personal information.
Greg Kras
Filed: 9 Dec 21
Utility
Systems and methods for performing a simulated phishing attack
10 Jan 23
Systems and methods for performing a simulated phishing attack are provided.
Alin Irimie, Stu Sjouwerman, Brian Jack
Filed: 27 Aug 20
Utility
Systems and methods for artificial model building techniques
10 Jan 23
Embodiments disclosed describe a security awareness system may adaptively learn the best design of a simulated phishing campaign to get a user to perform the requested actions, such as clicking a hyperlink or opening a file.
Eric Sites
Filed: 13 Jan 21
Utility
Systems and Methods for an Artificial Intelligence Driven Agent
29 Dec 22
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 28 Aug 22
Utility
System and Methods to Incentivize Engagement In Security Awareness Training
24 Nov 22
Systems and methods to incentivize engagement in security awareness training are disclosed.
Greg Kras
Filed: 16 May 22
Utility
Systems and methods for providing configurable responses to threat identification
15 Nov 22
Systems and methods are described for providing customized message content to be displayed to a user of an email client, responsive to the user selecting, via a plug-in or agent of the email client, to report an email as a potential phishing email.
Greg Kras, Adam Alessandrini
Filed: 24 Feb 22
Utility
Systems and methods for determining individual and group risk scores
15 Nov 22
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 25 Mar 22
Utility
Systems and methods for determination of level of security to apply to a group before display of user data
15 Nov 22
Systems and methods are described for using secured groups for simulated phishing campaigns to obfuscate data for levels of privacy based on protected criteria classes.
Greg Kras, Chris Cline
Filed: 17 Mar 22
Utility
Systems and methods for security awareness using ad-based simulated phishing attacks
8 Nov 22
Systems and methods are described for modifying one or more advertisements of a webpage or a social media feed to create a simulated cybersecurity attack.
Greg Kras, Chris Cline
Filed: 29 Jul 21
Utility
Systems and methods for using artificial intelligence driven agent to automate assessment of organizational vulnerabilities
8 Nov 22
The present disclosure describes systems and method for performing a vulnerabilities assessment of an organization.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 6 May 20
Utility
Systems and Methods for Determination of Indicators of Malicious Elements Within Messages
3 Nov 22
Systems and methods are described for determination of indicators of malicious elements within messages.
Stu Sjouwerman, Greg Kras
Filed: 26 Apr 22
Utility
Systems and methods for subscription management of specific classification groups based on user's actions
1 Nov 22
Embodiments of the disclosure describe systems and methods for selecting a first group of users, which is selected to receive simulated phishing emails as part of a simulated phishing campaign, and adding users to a second group of users based upon those selected users interacting with a simulated phishing email that is part of a simulated phishing campaign; tracking the completion of remediation training related to phishing emails by users in the second group of users and receiving one or more indications that the users in the second group of users have completed remedial training; and automatically adding users, who are members of the second user group, to the first user group, to a third user group, or to a predetermined user group responsive to the one or more indications that the users in the second group of users have completed remedial training.
Greg Kras, Alin Irimie
Filed: 18 Jun 20
Utility
Prioritization of Reported Messages
27 Oct 22
Systems and methods for prioritization of reported messages and rewarding reporting users are disclosed.
Greg Kras
Filed: 15 Apr 22