C · 05 / Security Awareness & Human-Layer

The human layer is the one
attackers count on winning.

Firewalls, endpoints, and identity stacks have matured. The click has not. Every serious breach report for the last decade has put social engineering in the top-three initial-access vectors, and the Verizon DBIR still pegs the untrained industry-average phish-prone rate at roughly thirty-two percent. Our program drives that number under five percent — and hands you the quarterly evidence to prove it to your board, your carrier, and your auditor.

Baseline phish-prone~32% DBIR untrained avg
Target post-program< 5% 12–18 mo cadence
Cadence optionsQtr / Mo / Cont. scope-selected
Vectors coveredPhish / Smish / Vish rotated
PlatformsKnowBe4 · Proofpoint or custom
32%
Untrained click-rate
Verizon DBIR industry-average phish-prone rate before any formal program — about one employee in three falls for a realistic lure.
<5%
Mature-program target
Achievable within twelve to eighteen months under monthly or continuous cadence with role-based content and a working report button.
15min
Day-one onboarding module
Phishing recognition, the report button, the password policy, and a short quiz — delivered inside the client's existing HRIS.
4 KPIs
Quarterly dashboard
Phish-prone %, report-rate %, completion % by track, and rolling ninety-day repeat-offender cohort — board-ready, carrier-ready.
01 / What We Train

Six deliverables
under one program.

Awareness is not a course — it is an operating system. We run six parallel workstreams; your scope determines which run on which cadence, and the dashboard aggregates them into one story for the board.

01 · Phishing simulationMonthly

Realistic, branded lures

Authored against your vendor list, your brand voice, and current attacker playbooks — never generic template traffic. Click, credential-capture, and attachment variants tracked separately. Every click triggers in-the-moment thirty-second micro-training before the employee moves on.

Click-rate · report-rate · repeat-offender
02 · Smishing + vishingQuarterly

Beyond the inbox

SMS lures mimicking MFA prompts, shipping notices, and payroll alerts. Voice drills covering help-desk impersonation and executive-assistant impersonation — including voice-cloned variants on request. Alternated with email simulations so employees learn the pattern, not just the medium.

Separate dashboards by channel
03 · Awareness videoAnnual + role

Required video curriculum

Annual all-hands module — under twenty minutes, with a tracked quiz — plus role-based tracks for finance, executives and assistants, IT administrators, and new hires. Content is refreshed each year so the annual module is never the same module your people tuned out last cycle.

Role-tagged · completion-tracked
04 · Tabletop exercisesAnnual

Executive & IT TTX

Half-day facilitated exercises with scenario injects, timed decisions, and a written hotwash. IT tabletops drill the blue-team playbook. Executive tabletops drill ransom posture, disclosure, regulator notification, and board communication. Our combined physical-plus-cyber TTX is the unique differentiator.

Facilitator · injects · after-action
05 · Policy draftingOn request

Written, board-adoptable

Acceptable Use, BYOD, Incident Response Plan, Password and credential, Data Classification and handling, Onboarding-Offboarding checklist. Drafted in board-adoptable language, structured with defined terms, scope, enforcement, and revision history — built to survive your counsel's redline.

Six core · custom on request
06 · Onboarding securityDay one

Week-one to week-six

Fifteen-minute day-one module inside the client's HRIS. Role-track content layered across weeks two through six so training competes with — not on top of — other onboarding load. Simulation begins at week four, never in week one; we have seen first-week baiting erode trust and skew baseline numbers.

HRIS-delivered · role-staged
02 / Cadence Ladder

Quarterly,
monthly, or continuous.

Cadence is the single largest driver of phish-prone rate improvement. Below the quarterly floor the data does not move; above the monthly tier it moves fast. Choose the tier that matches your risk posture and carrier warranty.

Tier 01 · QuarterlyProgram floor

Compliance baseline

Four phishing campaigns per year, annual required video training, published policies, and a quarterly dashboard. Satisfies most audit frameworks and the minimum we will sign our name to.

  • 4 phishing simulations / year
  • Annual required video module
  • Two role-based tracks (all-hands + IT admin)
  • Quarterly metrics brief
Entry tierAuditor-ready
Tier 02 · MonthlyRecommended

Standard program

Twelve phishing campaigns per year plus rotated smishing and vishing drills. Four role-based tracks with refreshed annual video. Annual IT tabletop plus an every-other-year executive TTX.

  • 12 phishing + 4 smish/vish / year
  • Annual refresh · four role tracks
  • Annual IT tabletop · exec TTX alt-year
  • Quarterly board-ready dashboard
Most clientsCarrier-ready
Tier 03 · ContinuousHigh-assurance

Mature program

Light simulation every two to three weeks — the cadence that produces the fastest drop in phish-prone rate and holds it there. Combined physical-plus-cyber tabletop every eighteen months. Repeat-offender coaching loop.

  • ~26 touches / year across vectors
  • All role tracks · annual refresh + ad-hoc
  • Combined P+C tabletop every 18 mo
  • Named instructor for repeat-offender loop
Regulated / post-incidentTop tier
03 / What We Measure

Evidence, not
vibes — the dashboard.

A program you cannot measure is a program that quietly decays. Every quarter we deliver the same four numbers in the same format, so trend is readable at a glance — and the output is built to be dropped directly into a board packet or a carrier renewal submission without reformatting.

Quarterly KPI Dashboard · Sample Output
Board-ready · Carrier-ready
KPI 01 · Click
4.6%
Phish-prone rate — percentage of simulated-lure recipients who clicked, credential-filled, or opened an attachment this quarter. Trended against the prior four quarters on every delivery.
KPI 02 · Report
41%
Report-rate — percentage of lure recipients who used the report button rather than ignoring the email. A healthy program pushes this above the click-rate within the first twelve months.
KPI 03 · Completion
97%
Completion rate on required video training, broken down by role track — all-hands, finance, executive, IT administrator, and new-hire. Escalation triggers on any track under ninety percent.
KPI 04 · Repeat
2.1%
Rolling ninety-day repeat-offender cohort — percentage of the workforce with two or more clicks in the last quarter. Reported as a count, never by name, and handled through a coaching loop.
Reported quarterly · narrative commentary per KPI ● Board-ready · ● Carrier-ready · ● Audit-exportable
04 / Tabletop Exercises

The one with
physical and cyber.

Most cyber tabletops assume the attacker is remote and the physical environment is irrelevant. Real incidents do not respect that line. Because our leadership team owns both sides of the house, we facilitate the combined exercise without handing off between vendors — the only one of our engagements that genuinely has no competitor in our two-state footprint.

TTX 01 · IT
Half-day · blue-team
Audience · SecOps, IT, Help-desk, vendor leads

Blue-team playbook

Detection, containment, evidence handling, vendor escalation. Five to seven scenario injects — ransomware detonation, credential-stuffing on a public tenant, a stolen service-account token, a misconfigured S3 bucket, and a reportable-deadline notification.

  • Scenario authored to your stack
  • Facilitator + timer + injects
  • Hotwash + written after-action
Annual · baselineIT-scoped
TTX 02 · Executive
Half-day · decision layer
Audience · CEO, CFO, COO, GC, Head of HR, Communications

Decision-layer drill

Ransom posture, disclosure obligations, regulator notification, board communication, media response, customer notification, employee messaging. The first time your executives see an incident should not be the day of an incident.

  • Counsel-friendly scenario design
  • Press / social / regulator injects
  • Decision log + written debrief
Annual / alt-yearExecutive-scoped
TTX 03 · Physical + Cyber
Full-day · combined
Audience · Security, IT, Facilities, Executive sponsor, Legal

The combined exercise

A tailgated access-control bypass leading to a malicious device drop. A stolen executive laptop during a business-travel stop. An insider with badge access exfiltrating before termination. A vendor technician inserting a rogue device during an after-hours service call. Our single most-requested engagement.

  • Authored across both domains
  • Cross-team handoff tested explicitly
  • Unique to our dual-expertise footprint
Every 18–24 mo● Our differentiator
05 / Policy Drafting

The written
layer underneath.

Training without policy is a talking point without a handle. We draft the documents your program has to stand on, in board-adoptable language, structured to survive your counsel's redline. Six core policies are standard; custom drafting is available on request.

Acceptable UseAUP
What employees can and cannot do with company devices, networks, and credentials — covering personal use, prohibited activity, monitoring, and the clear-warning language most breach-response frameworks require.
Standard · 8–12 pg
BYODBring-your-own-device
Mobile device enrollment, MDM minimums, on-device data handling, remote-wipe consent, stipend language, and offboarding device scrub — with carve-outs for contractor and executive-sensitive scenarios.
Standard · 6–10 pg
Incident ResponseIR Plan
Named roles, escalation matrix, severity definitions, vendor-call playbook, regulator-notification checklist, evidence-preservation language, and an exercise schedule. Paired with the tabletop program, not standalone.
Standard · 16–24 pg
PasswordCredential policy
Minimums mapped to current NIST guidance — passphrase length over mandatory rotation, MFA requirements by system class, shared-account prohibitions, and secure-vault requirements. Does not include the rotation-theatre rules insurers no longer accept.
Standard · 4–6 pg
Data ClassificationHandling rules
Four-tier classification — public, internal, confidential, restricted — with clear handling, storage, transmission, and retention rules per tier. Mapped to the overlays most TN and MS clients face: HIPAA, GLBA, CMMC, PCI-DSS.
Standard · 10–14 pg
Onboarding & OffboardingChecklist
Two checklists, not one. Day-zero enrollment, system-access provisioning, and training assignment on one side. Timely deprovisioning, device recovery, credential revocation, and exit interview on the other — the one most organizations skip.
Standard · 6–8 pg
06 / Annual Plans

Annual engagement,
scope-priced per workforce.

Awareness is an annual program, not a one-off. Pricing signals below reflect typical engagements scoped to workforce size, cadence tier, and tabletop inclusion. Final scope comes out of the intake call — not a checkbox list on this page.

Plan A · Awareness Baseline

Auditor-ready floor

$$Annual · per workforce

Satisfies the frameworks your auditor reviews; not always enough for the carrier warranty your CFO signed. Appropriate for sub-regulated workforces under a hundred and fifty users with no active incident exposure.

  • Phishing · QuarterlyFour simulated campaigns per year, authored with attention to your brand and vendor list.
  • Video training · AnnualRequired all-hands module under twenty minutes plus a short IT-admin track.
  • Policies · PublishedSix core policies drafted or reviewed, hosted in your existing repository.
  • Dashboard · QuarterlyFour-KPI metrics brief with narrative commentary — audit-exportable.
Plan B · Mature Program + TTX

Carrier-ready default

$$$Annual · per workforce

The default recommendation for regulated workforces, post-incident clients, and any organization whose cyber-insurance warranty mentions 'security awareness program' rather than 'security awareness training.' Combined physical-plus-cyber TTX available every eighteen to twenty-four months.

  • Multi-vector · MonthlyTwelve phishing plus rotated smishing and vishing drills — alternated quarterly.
  • Role-based video · RefreshedFour tracks refreshed annually — all-hands, finance, exec, IT admin, new-hire.
  • Tabletops · Annual + combinedAnnual IT TTX, alt-year executive TTX, combined physical+cyber TTX every 18–24 mo.
  • Coaching loop · Named instructorRepeat-offender cohort handled by a named instructor, not the line manager.
07 / FAQ

Questions we
hear every week.

The ones below are the honest ones — the questions most vendors will not give you a straight answer on. If your question isn't here, the program lead who would run your engagement will take the call directly, not a sales rep.

Is security awareness training actually effective, or is it theatre?

Effective, when it is measured. The Verizon Data Breach Investigations Report puts the untrained industry-average phish-prone rate at roughly thirty-two percent — meaning about one in three employees click a realistic phishing lure on first exposure. Mature programs with monthly or continuous phishing simulation, role-based content, and a working report button move that number under five percent within twelve to eighteen months.

What does not work is once-a-year compliance-only video training with no simulation layer behind it. Auditors will accept it. Attackers will ignore it. The gap between those two outcomes is where nearly every breach tied to social engineering opens up.

What's a good phish-prone rate, and when should we worry?

Baseline testing for an untrained workforce typically lands between twenty-five and thirty-five percent — in line with the Verizon DBIR industry average. After six months of disciplined quarterly simulation the number should be under fifteen percent. After twelve to eighteen months of monthly cadence with role-based content, under five percent is achievable and is the number most cyber-insurance carriers now want to see.

A rate that refuses to move below ten percent after a year usually points to a content-quality or escalation-path problem rather than a workforce problem. It often means the simulations are too generic to train pattern recognition, or the report button does not work in the mobile client, or in-the-moment training is not firing on click.

How often should we train, and is quarterly really enough?

Quarterly is the minimum we will sign our name to for a baseline program. Monthly is the standard we recommend to any organization that has had an incident, handles sensitive data, or holds a cyber-insurance policy with a training warranty. Continuous — a light touch every two to three weeks — is our top-tier cadence and the one that produces the steepest drop in phish-prone rate.

Annual video training on its own does not change behavior. It only satisfies compliance checkboxes. If that is all you can do this year, do that; but do not call it a program and do not expect the phish-prone number to move.

Do tabletop exercises need to include executives, or can we keep them technical?

Both exist for good reason, and they cover different risks. An IT tabletop drills the blue-team playbook — detection, containment, evidence handling, vendor escalation. An executive tabletop drills the decision layer — ransom posture, disclosure obligations, regulator notification, board communication, media response.

If you only run one, the IT version is table-stakes. If you only ever run the IT version, the first time your executives see an incident will be the day of an incident — and our after-action reports from those incidents are consistently harder reading than the ones where the executive team had rehearsed. We recommend alternating annually with a combined physical-plus-cyber exercise every eighteen to twenty-four months.

What makes a combined physical-plus-cyber tabletop different from a normal cyber tabletop?

Most cyber tabletops assume the attacker is remote and the physical environment is irrelevant. Real incidents do not respect that line. A combined exercise layers on scenarios such as a tailgated access-control bypass that leads to a malicious device drop, a stolen executive laptop during a business-travel stop, an insider with badge access exfiltrating before termination, or a vendor technician inserting a rogue device during an after-hours service call.

Because our leadership team owns both the physical-security and cyber sides of the house, we facilitate that crossover exercise without handing off between vendors — we author injects across both domains and test the cross-team handoff explicitly. It is our single most-requested engagement from clients who take resilience seriously, and the one engagement where we have no direct competitor in our two-state footprint.

How do you handle repeat clickers without creating a punitive culture?

We separate the repeat-offender list from the discipline process entirely. A first click triggers in-the-moment micro-training — a thirty-second contextual lesson on what the lure used and why it worked. A second click within a rolling ninety-day window triggers a scheduled ten-minute coaching call with a named instructor, not the employee's manager.

A third click triggers a conversation with the reporting manager about whether role risk exceeds the individual's training level, with options to reassign to a lower-exposure track rather than to discipline. We report counts but never names in the quarterly dashboard, and we will not author a simulation designed to humiliate a known clicker — that pattern poisons report-rate, which is the more valuable number.

Is annual compliance training enough to satisfy our auditor?

For most frameworks — HIPAA, PCI-DSS, SOC 2, CMMC — yes, on paper. Auditors want to see that training was assigned, completed, and documented against a written policy. That is a floor, not a program.

Cyber insurance carriers, increasingly, want more: documented phishing simulation, a measurable phish-prone rate, and evidence of a report button with a tracked report-rate. If your policy warranty language mentions 'security awareness program' rather than 'security awareness training,' your carrier has already decided annual video alone is not enough. Read your warranty page before renewal — we have seen claims contested over exactly this distinction.

What platforms do you use — KnowBe4, Proofpoint, something custom?

We are platform-agnostic. For most mid-market engagements we deliver on KnowBe4 or Proofpoint Security Awareness because the content libraries are deep, the reporting is mature, and clients often already license one. For higher-regulation or higher-customization engagements we deliver on a custom-built simulation stack hosted under our tenancy, which lets us author lures against the client's own brand voice and vendor list.

The choice is yours. We will recommend based on workforce size, existing tooling, and budget — and we are comfortable running on whichever platform your security team already operates. We do not take referral fees from either vendor.

Do you cover smishing and vishing, or just email phishing?

Both, and they matter more each year. Smishing — SMS phishing — has overtaken email as the preferred vector for finance and executive targeting; a single Slack-MFA or DocuSign-MFA text sent during a board week is now a standard attacker play. Vishing — voice phishing, often with voice cloning — is the current favorite for help-desk and password-reset social engineering.

Our mature program cadence alternates email, SMS, and voice simulations quarterly so employees learn to recognize the pattern, not just the medium. Vectors are tracked on separate dashboards so a program that is strong on email and weak on SMS does not hide behind a single combined number.

What written policies do you draft, and do they hold up to counsel review?

Standard drafting covers Acceptable Use, BYOD and mobile, Incident Response Plan, Password and credential, Data Classification and handling, and an Onboarding-Offboarding security checklist. We have also drafted Remote Work, Vendor Management, and AI-Usage policies on request.

Every draft is written in board-adoptable language — structured with defined terms, scope, enforcement, and revision history. The authors are familiar with the overlays most TN and MS clients face: HIPAA, GLBA, CMMC Level 2, PCI-DSS, and state breach-notification law. We expect your counsel to redline. Our drafts are built to survive that redline.

How do you onboard a new hire without overwhelming week one?

Day-one onboarding runs a focused fifteen-minute module — phishing recognition, the report button, the password policy summary, and a short quiz — delivered inside whichever HRIS the client uses. The full role-based track is layered in across weeks two through six so training competes with other onboarding load rather than stacking on top of it.

Phishing simulation begins at week four, after the employee has had a real chance to see the program work. We do not bait brand-new hires in their first week. We have seen it erode trust and skew baseline numbers, and the data you get from a week-one click is noise rather than signal.

What exactly shows up on the quarterly dashboard?

Four headline numbers every quarter: phish-prone percent (trended across the last four quarters), report-rate percent, training-completion percent by role track, and the size of the rolling ninety-day repeat-offender cohort. Under each headline is a short narrative explaining what moved and why — a campaign launch, a new lure family, a change in cadence, a role reorg.

The dashboard is designed to be dropped directly into a board packet or a carrier renewal submission without reformatting. About a third of our clients do exactly that. On request we also include a benchmark line comparing your trend against a redacted cohort of similarly-sized TN and MS clients in the same industry.

08 / Next Step

Train the layer
attackers are counting on.

Tell us workforce size, regulatory overlays, and whether you are operating post-incident or building ahead of one. The program lead who would run your engagement will be on a scoping call within five business days — with a cadence recommendation and a written scope before any paperwork moves.