212 patents
Page 8 of 11
Utility
Systems and methods for determining a job score from a job title
27 Apr 21
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a job score for a user based on the user's job title.
Eric Wayne Sites, Ryan Scott Davis, Daniel James DeCola
Filed: 30 Sep 20
Utility
Systems and methods of cybersecurity attack simulation for incident response training and awareness
13 Apr 21
Systems and methods are disclosed that are useful for minimizing organization risk in the case of a cybersecurity attack, through computer-based simulation of cybersecurity attacks, incident response tracking and incident response training provided responsive to the simulation outcome.
Greg Kras, Alin Irimie
Filed: 2 Nov 18
Utility
Systems and Methods for an Artificial Intelligence Driven Agent
18 Mar 21
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 30 Nov 20
Utility
Systems and methods for adaptation of SCORM packages at runtime with an extended LMS
16 Mar 21
Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users.
Carl Kritzinger, Francisco Barreto, Mark William Patton
Filed: 28 Aug 20
Utility
Systems and Methods for Aida Campaign Controller Intelligent Records
11 Mar 21
Systems and methods, disclosed herein, of a campaign controller that stores information to a database about execution of multiple simulated phishing campaigns for multiple users, where each of the simulated phishing campaigns use one or more models for communicating simulated phishing communications.
Stu Sjouwerman, Eric Sites
Filed: 16 Nov 20
Utility
Systems and Methods for Simulated Phishing Attacks Involving Message Threads
11 Mar 21
Systems and methods are disclosed for simulating a phishing attack involving an email thread.
Greg Kras
Filed: 14 Aug 20
Utility
Systems and Methods for Aida Based Role Models
11 Feb 21
The present disclosure describes systems and methods for using a model for a predetermined role for simulated phishing campaigns.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 27 Oct 20
Utility
Systems and methods for artificial model building techniques
9 Feb 21
Embodiments disclosed describe a security awareness system may adaptively learn the best design of a simulated phishing campaign to get a user to perform the requested actions, such as clicking a hyperlink or opening a file.
Eric Sites
Filed: 12 Apr 19
Utility
Systems and methods for artificial intelligence driven agent campaign controller
9 Feb 21
The present disclose describes systems and methods for creating a simulated phishing campaign for a user based on at least a history of the user with respect to simulated phishing campaigns.
Eric Sites
Filed: 3 Apr 19
Utility
Systems and methods for effective delivery of simulated phishing campaigns
9 Feb 21
Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users.
Mark William Patton, Daniel Cormier, Greg Kras
Filed: 25 Aug 20
Utility
Systems and methods for AIDA based second chance
9 Feb 21
Methods and systems are described in which a system provides a user interface to confirm whether to review or take an action associated with an untrusted email.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 14 Oct 20
Utility
Using Smart Groups for Computer-based Security Awareness Training Systems
4 Feb 21
This disclosure describes embodiments of an improvement to the static group solution because all the administrator needs to do is specify the criteria they care about.
Greg Kras, Alin Irimie
Filed: 19 Oct 20
Utility
Systems and Methods for Aida Based Second Chance
28 Jan 21
Methods and systems are described in which a system provides a user interface to confirm whether to review or take an action associated with an untrusted email.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 14 Oct 20
Utility
Systems and Methods for Aida Based A/b Testing
14 Jan 21
Systems and methods are described by which a serving module of a campaign controller identifies a first version of a model which the campaign controller uses to communicate a first simulated phishing communication to a plurality of users.
Eric Sites
Filed: 30 Sep 20
Utility
Systems and methods for AIDA based grouping
12 Jan 21
The present disclosure describes systems and methods for dynamically creating groups of users based on attributes for simulated phishing campaign.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 15 May 20
Utility
Systems and methods for an artificial intelligence driven smart template
28 Dec 20
The present disclosure describes systems and methods for determining a subsequent action of a simulated phishing campaign.
Stu Sjouwerman
Filed: 30 Oct 17
Utility
Systems and Methods for an Artificial Intelligence Driven Smart Template
16 Dec 20
The present disclosure describes systems and methods for using a template for a simulated phishing campaign, A database includes a plurality of templates for simulated phishing campaigns, each template of the plurality of templates identifying a list of a plurality of types of simulated phishing communications and at least a portion of content for the simulated phishing communications.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 26 Aug 20
Utility
Systems and Methods for Performing a Simulated Phishing Attack
16 Dec 20
Systems and methods for performing a simulated phishing attack are provided.
Alin Irimie, Stu Sjouwerman, Brian Jack
Filed: 26 Aug 20
Utility
Systems and methods for determining individual and group risk scores
14 Dec 20
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 21 Apr 20
Utility
Systems and methods for an artificial intelligence driven agent
30 Nov 20
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 29 Oct 17