112 patents
Page 2 of 6
Utility
Systems and Methods for Subscription Management of Specific Classification Groups Based on User’s Actions
16 Feb 23
Embodiments of the disclosure describe systems and methods for selecting a first group of users, which is selected to receive simulated phishing emails as part of a simulated phishing campaign, and adding users to a second group of users based upon those selected users interacting with a simulated phishing email that is part of a simulated phishing campaign; tracking the completion of remediation training related to phishing emails by users in the second group of users and receiving one or more indications that the users in the second group of users have completed remedial training; and automatically adding users, who are members of the second user group, to the first user group, to a third user group, or to a predetermined user group responsive to the one or more indications that the users in the second group of users have completed remedial training.
Greg Kras, Alin Irimie
Filed: 31 Oct 22
Utility
Systems and Methods for Analysis of User Behavior to Improve Security Awareness
9 Feb 23
Systems and methods are disclosed for analysis of user behavior data to improve security awareness.
Mark William Patton
Filed: 28 Jul 22
Utility
Time Based Triggering of Dynamic Templates
19 Jan 23
Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user.
Greg Kras
Filed: 26 Sep 22
Utility
Systems and Methods for Simulated Phishing Attacks Involving Message Threads
12 Jan 23
Systems and methods are disclosed for simulating a phishing attack involving an email thread.
Greg Kras
Filed: 15 Aug 22
Utility
Systems and Methods for an Artificial Intelligence Driven Agent
29 Dec 22
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 28 Aug 22
Utility
System and Methods to Incentivize Engagement In Security Awareness Training
24 Nov 22
Systems and methods to incentivize engagement in security awareness training are disclosed.
Greg Kras
Filed: 16 May 22
Utility
Systems and Methods for Determination of Indicators of Malicious Elements Within Messages
3 Nov 22
Systems and methods are described for determination of indicators of malicious elements within messages.
Stu Sjouwerman, Greg Kras
Filed: 26 Apr 22
Utility
Prioritization of Reported Messages
27 Oct 22
Systems and methods for prioritization of reported messages and rewarding reporting users are disclosed.
Greg Kras
Filed: 15 Apr 22
Utility
Systems and Methods for Communication with a Third-party Email Client Plug-in
6 Oct 22
Systems and methods are described for communication of a third-party application server with a third-party email client plug-in.
Greg Kras
Filed: 20 Jun 22
Utility
Systems and Methods to Identify a Simulated Phishing Message
6 Oct 22
Systems and methods are described for detecting a simulated phishing message by an email client plug-in.
Greg Kras
Filed: 25 Mar 22
Utility
Using Smart Groups for Computer-based Security Awareness Training Systems
15 Sep 22
This disclosure describes embodiments of an improvement to the static group solution because all the administrator needs to do is specify the criteria they care about.
Greg Kras, Alin Irimie
Filed: 27 May 22
Utility
System and Methods for Minimizing Organization Risk from Users Associated with a Password Breach
15 Sep 22
System and methods are disclosed for organizations to run a test against an active directory list to see if any user-provided passwords have been part of an existing data breach.
Greg Kras
Filed: 1 Jun 22
Utility
Systems and Methods for Aida Campaign Controller Intelligent Records
1 Sep 22
Systems and methods, disclosed herein, of a campaign controller that stores information to a database about execution of multiple simulated phishing campaigns for multiple users, where each of the simulated phishing campaigns use one or more models for communicating simulated phishing communications.
Stu Sjouwerman, Eric Sites
Filed: 16 May 22
Utility
Systems and Methods for End-user Security Awareness Training for Calendar-based Threats
1 Sep 22
Systems and methods are described for providing calendar-based simulated phishing attacks to users of an organization.
Perry Carpenter, Kathy Wattman, Morgan Flake, Detlev Weise, John Just, Kevin Mitnick
Filed: 16 May 22
Utility
Systems and Methods of Simulated Phishing Campaign Contextualization
1 Sep 22
Systems and methods are described for contextualizing a simulated phishing communication based at least on one of language and locale.
Greg Kras, Katie Brennan
Filed: 18 May 22
Utility
Systems and Methods for Using Attribute Data for System Protection and Security Awareness Training
21 Jul 22
The present disclosure describes a system for saving metadata on files and using attribute data files inside a computing system to enhance the ability to provide user interfaces based on actions associated with non-executable attachments like text and document files from untrusted emails, to block execution of potentially harmful executable object downloads and files based on geographic location, and to a create a prompt for users to decide whether to continue execution of potentially harmful executable object downloads and files.
Bret Lowry, Gauvin Repuspolo
Filed: 4 Apr 22
Utility
Systems and Methods for Determining a Job Score from a Job Title
14 Jul 22
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a job score for a user based on the user's job title.
Eric Wayne Sites, Ryan Scott Davis, Daniel James DeCola
Filed: 4 Apr 22
Utility
System and Methods for Spoofed Domain Identification and User Training
14 Jul 22
Systems and methods are disclosed that minimize ongoing risk to an organization from user behaviors which magnify the severity of a spoofed domain.
Stu Sjouwerman, Alin Irimie, Greg Kras
Filed: 1 Apr 22
Utility
Systems and Methods for Determination of Level of Security to Apply to a Group Before Display of User Data
30 Jun 22
Systems and methods are described for using secured groups for simulated phishing campaigns to obfuscate data for levels of privacy based on protected criteria classes.
Greg Kras, Chris Cline
Filed: 17 Mar 22
Utility
Systems and Methods for Situational Localization of Aida
30 Jun 22
The present disclosure describes systems and methods for using for a simulated phishing campaign, information about one or more situations of a user determined from an electronic calendar of the user, A campaign controller may identify/ an electronic calendar of a user for which to direct a simulated phishing campaign, determine one or more situations of the user from information stored in the electronic calendar and select either a template from a plurality of templates or a starting action from a plurality of starting actions for the simulated phishing campaign based at least on the one or more situations of the user.
Greg Kras
Filed: 16 Mar 22