Overview

Since 2002, Security Innovation has been the trusted partner for cybersecurity risk analysis and mitigation for the world’s leading companies, including Microsoft, Sony, GM, Disney, Google and Dell. Recognized as a Leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training for the second year in a row, Security Innovation is dedicated to securing and protecting sensitive data in the most challenging environments - automobiles, desktops, web applications, mobile devices and in the cloud. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com.


Products

  • Security Awareness Training

    Employees are the greatest security risk to any organization. Training them to understand and spot common security threats can help prevent a data breach. As a leader in the Gartner Magic Quadrant, Security Innovation’s security awareness training program covers everything from social media, password protection, email and more.

  • Application Security Training

    Learning how to code securely can prevent future vulnerabilities within applications. Security Innovation’s course catalog contains 120+ courses focusing on application security best practices, secure coding and more. Online courses are complemented with an on-demand reference knowledgebase full of detailed secure coding and remediation guidance.

  • Web Application Hackathon Training

    CMD+CTRL Web Application Hackathon takes learners beyond theoretical training and immerses them into an authentic simulation environment where they compete to find vulnerabilities in application while gaining an appreciation for protecting the enterprise.

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Datasheet

Our highly interactive scenario-based modules equip general staff to recognize the value of different types of information; to understand the scope, nature and origin of the diverse risks to such information; and to behave proactively to protect this information in their everyday work.

Training is most effective when emotions are evoked. Phishing simulation integrated with just-in-time training creates a harmless “hurt and rescue” exercise that makes users think twice before acting improperly when placed in a similar situation in the future.

Recognized as a Leader in the Gartner Magic Quadrant for Computer Based Training for the second year in a row, Security Innovation provides organizations with an easy way to implement role-based security training to small teams, large departments or company-wide. Our courses range from introduct...

Resource

The growing use of technology has left us vulnerable to an increasing amount of cyberattacks. Have you ever wondered what would happen if you lost your mobile device? Do you know what a cybercriminal can find out about you just by looking at your social media profiles? Often with security and privac...

Smishing. Spear Phishing. Clickjacking. We are bombarded everyday with headlines shouting the new and inventive ways attackers are coming after our sensitive information and the catastrophic consequences when they actually get their hands on it. By now, security education should be a top priority fo...

SIlogo.png
Resource
When digitalX began closed beta testing on its latest transaction software, AirPocket™ in the fall of 2014, it called upon leading independent U.S. security firm, Security Innovation, to provide risk assessments and penetration testing services. Security Innovation previously provided similar ...

SIlogo.png
Resource
In partnering with Security Innovation, the ISDP established a formal training program for software developers with the following goals: increase security awareness, elevate and standardize security understanding, and keep pace with the digital transformation. While the initial training focused on a...

CMD+CTRL includes three authentic and intentionally vulnerable websites: Shadow Bank, Shred Skateboard & Graffiti online store, and Account All HR intranet site. Guided by cheat sheets and optional on-site “ninjas”, participants become immersed in a “find the vulnerabilities” game where ...

In 30 days, you can be on your way to a safer, more secure organization with your employees working as an active line of defense. Take the Security Innovation 30 day challenge by rolling out a sample Information Security & Privacy Awareness (ISPA) campaign.

Ed Adams, CEO of Security Innovation talks about being named as a leader in the Gartner Magic Quadrant for Computer-Based Security Awareness Training for the 2nd year running.