212 patents
Page 9 of 11
Utility
Systems and methods for performing or creating simulated phishing attacks and phishing attack campaigns
30 Nov 20
A method for establishing a campaign for a simulated phishing attack includes receiving, via a campaign manager, specification of a plurality of parameters for a campaign including at least an identifier of a campaign and identification of users to which to send the campaign, establishing, via the campaign manager, a type of exploit for the campaign and one or more types of data to collect via the type of exploit, storing, by the campaign manager, the campaign comprising the plurality of parameters, and identifying, by a simulation server, the campaign stored in the database to create a simulated phishing email, to be sent to email accounts of the users, using the plurality of parameters of the campaign, wherein the simulated phishing email is to be created to have a link to a landing page comprising the type of exploit and configured to collect the one or more types of data.
Alin Irimie, Wendy Bartlett, David Austin
Filed: 3 Nov 19
Utility
System and Methods for Efficient Combining of Malware Detection Rules
25 Nov 20
System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
Filed: 10 Aug 20
Utility
Time Based Triggering of Dynamic Templates
25 Nov 20
Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user.
Greg Kras
Filed: 7 Jun 20
Utility
Time Based Triggering of Dynamic Templates
18 Nov 20
Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user.
Greg Kras
Filed: 30 Apr 20
Utility
Systems and methods for AIDA campaign controller intelligent records
16 Nov 20
Systems and methods, disclosed herein, of a campaign controller that stores information to a database about execution of multiple simulated phishing campaigns for multiple users, where each of the simulated phishing campaigns use one or more models for communicating simulated phishing communications.
Stu Sjouwerman, Eric Sites
Filed: 30 Nov 17
Utility
Systems and Methods for Aida Based Grouping
4 Nov 20
The present disclosure describes systems and methods for dynamically creating groups of users based on attributes for simulated phishing campaign.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 14 May 20
Utility
Systems and methods for aida based role models
2 Nov 20
The present disclosure describes systems and methods for using a model for a predetermined role for simulated phishing campaigns.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 14 Jun 20
Utility
Systems and methods for performing a simulated phishing attack
2 Nov 20
Systems and methods for performing a simulated phishing attack are provided.
Alin Irimie, Stu Sjouwerman, Brian Jack
Filed: 9 May 19
Utility
Using smart groups for computer-based security awareness training systems
19 Oct 20
This disclosure describes embodiments of an improvement to the static group solution because all the administrator needs to do is specify the criteria they care about.
Greg Kras, Alin Irimie
Filed: 22 Jan 20
Utility
Systems and methods for aida based second chance
19 Oct 20
Methods and systems are described in which a system provides a user interface to confirm whether to review or take an action associated with an untrusted email.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 30 Nov 17
Utility
System and methods for efficient combining of malware detection rules
19 Oct 20
System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
Filed: 18 Apr 19
Utility
Systems and methods for AIDA based A/B testing
19 Oct 20
Systems and methods are described by which a serving module of a campaign controller identifies a first version of a model which the campaign controller uses to communicate a first simulated phishing communication to a plurality of users.
Eric Sites
Filed: 27 Feb 20
Utility
Systems and Methods for Subscription Management of Specific Classification Groups Based on User?s Actions
7 Oct 20
Embodiments of the disclosure describe systems and methods for selecting a first group of users, which is selected to receive simulated phishing emails as part of a simulated phishing campaign, and adding users to a second group of users based upon those selected users interacting with a simulated phishing email that is part of a simulated phishing campaign; tracking the completion of remediation training related to phishing emails by users in the second group of users and receiving one or more indications that the users in the second group of users have completed remedial training; and automatically adding users, who are members of the second user group, to the first user group, to a third user group, or to a predetermined user group responsive to the one or more indications that the users in the second group of users have completed remedial training.
Greg Kras, Alin Irimie
Filed: 17 Jun 20
Utility
Systems and Methods for Aida Based Role Models
30 Sep 20
The present disclosure describes systems and methods for using a model for a predetermined role for simulated phishing campaigns.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 14 Jun 20
Utility
Systems and Methods for Providing User Interfaces Based on Actions Associated with Untrusted Emails
30 Sep 20
The present disclosure describes a system that notifies users regarding specific user decisions with respect to solution phishing emails.
Bret Lowry, Gauvin Repuspolo, Greg Kras
Filed: 15 Apr 20
Utility
System and Methods for Reverse Vishing and Point of Failure Remedial Training
16 Sep 20
Embodiments of the disclosure describe a simulated phishing campaign manager that communicates a simulated phishing communication that includes at least the telephone number and reference identifier, to a device of a user.
Greg Kras, Alin Irimie
Filed: 2 Jun 20
Utility
Systems and Methods for Determining Individual and Group Risk Scores
9 Sep 20
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 21 Apr 20
Utility
Systems and methods for an artificial intelligence driven smart template
31 Aug 20
The present disclosure describes systems and methods for using a template for a simulated phishing campaign, A database includes a plurality of templates for simulated phishing campaigns, each template of the plurality of templates identifying a list of a plurality of types of simulated phishing communications and at least a portion of content for the simulated phishing communications.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 30 Oct 17
Utility
Systems and Methods for Using Artificial Intelligence Driven Agent to Automate Assessment of Organizational Vulnerabilities
19 Aug 20
The present disclosure describes systems and method for performing a vulnerabilities assessment of an organization.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 5 May 20
Utility
System and Methods for Spoofed Domain Identification and User Training
19 Aug 20
Systems and methods are disclosed that minimize ongoing risk to an organization from user behaviors which magnify the severity of a spoofed domain.
Stu Sjouwerman, Alin Irimie, Greg Kras
Filed: 3 May 20