112 patents
Page 3 of 6
Utility
Systems and Methods for Determining Individual and Group Risk Scores
23 Jun 22
Emboiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 7 Mar 22
Utility
Systems and Methods for Improving Assessment of Security Risk Based on Personal Internet Account Data
16 Jun 22
Systems and methods are described for improving assessment of security risk based on a user's personal information.
Greg Kras
Filed: 9 Dec 21
Utility
Systems and Methods for Providing Configurable Responses to Threat Identification
9 Jun 22
Systems and methods are described for providing customized message content to be displayed to a user of an email client, responsive to the user selecting, via a plug-in or agent of the email client, to report an email as a potential phishing email.
Greg Kras, Adam Alessandrini
Filed: 24 Feb 22
Utility
Systems and Methods for Mitigating False Positives In a Simulated Phishing Campaign
2 Jun 22
Systems and methods are described for mitigating false positives in a simulated phishing campaign.
Greg Kras
Filed: 1 Dec 21
Utility
Systems and Methods Identifying Malicious Communications In Multiple Message Stores
26 May 22
Systems and methods are described for identifying other instances of messages corresponding to a reported malicious message.
Mark William Patton, Steffan Perry, Amanda Lewis
Filed: 17 Nov 21
Utility
Systems and Methods for Providing User Interfaces Based on Actions Associated with Untrusted Emails
21 Apr 22
The present disclosure describes a system that notifies users regarding specific user decisions with respect to solution phishing emails.
Bret Lowry, Gauvin Repuspolo, Greg Kras
Filed: 30 Dec 21
Utility
Systems and Methods of Simulated Phishing Campaign Contextualization
3 Mar 22
Systems and methods are described for contextualizing a simulated phishing communication based at least on one of language and locale.
Greg Kras, Katie Brennan
Filed: 30 Jul 21
Utility
Systems and Methods for Adaptation of Scorm Packages at Runtime with an Extended LMS
3 Mar 22
Systems and methods are described for tailoring shareable content object reference model (SCORM)-compliant content to one or more users.
Carl Kritzinger, Francisco Barreto, Mark William Patton
Filed: 23 Feb 21
Utility
Systems and Methods for Effective Delivery of Simulated Phishing Campaigns
24 Feb 22
Systems and methods are described for verifying whether simulated phishing communications are allowed to pass by a security system of an email system to email account of users.
Mark William Patton, Daniel Cormier, Greg Kras
Filed: 24 Aug 20
Utility
Systems and Methods for Determining Individual and Group Risk Scores
3 Feb 22
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a risk score or vulnerable for a user of a security awareness system, or for a group of users of a security awareness system.
Eric Sites, Greg Kras, Alin Irimie, Stu Sjouwerman, Marcio Castilho, Siegfried Martens, Eric Bonabeau, Kristian Kime
Filed: 25 Aug 21
Utility
Systems and Methods for Security Awareness Using Ad-based Simulated Phishing Attacks
3 Feb 22
Systems and methods are described for modifying one or more advertisements of a webpage or a social media feed to create a simulated cybersecurity attack.
Greg Kras, Chris Cline
Filed: 29 Jul 21
Utility
Systems and Methods for Aida Based Role Models
20 Jan 22
The present disclosure describes systems and methods for using a model for a predetermined role for simulated phishing campaigns.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 28 Sep 21
Utility
Using Smart Groups for Computer-based Security Awareness Training Systems
30 Dec 21
This disclosure describes embodiments of an improvement to the static group solution because all the administrator needs to do is specify the criteria they care about.
Greg Kras, Alin Irimie
Filed: 13 Sep 21
Utility
Systems and Methods for Determining a Job Score from a Job Title
23 Dec 21
Embodiments disclosed herein describe a server, for example a security awareness server or an artificial intelligence machine learning system that establishes a job score for a user based on the user's job title.
Eric Wayne Sites, Ryan Scott Davis, Daniel James DeCola
Filed: 22 Apr 21
Utility
Systems and Methods for Efficient Combining of Characteristc Detection Rules
16 Dec 21
System and methods are described which are useful for efficiently combining characteristic detection rules, such as may be done to efficiently and quickly assist in the dispositioning of user reported security threats.
Marcio Castilho, Alin Irimie, Michael Hanley, Daniel Cormier, Raymond Skinner
Filed: 30 Aug 21
Utility
Systems and Methods for Use of Address Fields In a Simulated Phishing Attack
16 Dec 21
Systems and methods are disclosed for creating simulated phishing attack messages that have characteristics which make them appear genuine, while also having characteristics that a user should recognize as being false.
Jasmine Rodriguez, Daniel Cormier
Filed: 30 Aug 21
Utility
Systems and Methods for Simulated Phishing Attacks Involving Message Threads
2 Dec 21
Systems and methods are disclosed for simulating a phishing attack involving an email thread.
Greg Kras
Filed: 11 Aug 21
Utility
Systems and Methods for Use of Employee Message Exchanges for a Simulated Phishing Campaign
25 Nov 21
Systems and methods are described for facilitating use of employee message exchanges for a simulated phishing campaign.
Greg Kras, Coda Babani, Hector Centeno, Christine Kipke, Rob Henley
Filed: 19 May 21
Utility
Systems and Methods for End-user Security Awareness Training for Calendar-based Threats
25 Nov 21
Systems and methods are described for providing calendar-based simulated phishing attacks to users of an organization.
Perry Carpenter, Kathy Wattman, Morgan Flake, Detlev Weise, John Just, Kevin Mitnick
Filed: 19 May 21
Utility
Systems and Methods for an Artificial Intelligence Driven Agent
18 Nov 21
A system and method is described that sends multiple simulated phishing emails, text messages, and/or phone calls (e.g., via VoIP) varying the quantity, frequency, type, sophistication, and combination using machine learning algorithms or other forms of artificial intelligence.
Alin Irimie, Stu Sjouwerman, Greg Kras, Eric Sites
Filed: 26 Jul 21