Skip to content
English
  • There are no suggestions because the search field is empty.

Case in Point Collection

Case in Point

CaseInPoint_ClientMarketingFlyer_8-5x11_THUMBNAIL

Audience: General End User (All)
Difficulty Level: Foundational
Time: 15 modules, 2-3 minutes each + 5 Questions per module
Availability: Available on Training as individual modules. Do not need to be assigned or watched together, designed to stand independently.
Modules:

  • Case in Point: Advanced Financial Social Engineering (3:30 Video)
  • Case in Point: Cloud Security Threats (2:36 Video)
  • Case in Point: Internet of Things (2:39 Video)
  • Case in Point: Mobile Security (1:40 Video)
  • Case in Point: Password Management (1:32 Video)
  • Case in Point: Physical Security (1:37 Video)
  • Case in Point: Point of Sale (PoS) Security (3:56 Video)
  • Case in Point: Ransomware (2:25 Video)
  • Case in Point: Reporting Suspicious Activity (2:52 Video)
  • Case in Point: Synthetic Identity Theft (2:37 Video)
  • Case in Point: Themed Phishing (2:30 Video)
  • Case in Point: Travel Secure (1:42 Video)
  • Case in Point: Vendor Email Compromise (VEC) (2:39 Video)
  • Case in Point: Work From Home (2:29 Video)

Sample video: Case in Point - Travel Secure 

Marketing Materials: Case in Point Marketing Kit



Major Themes: Case in Point modules use powerful analogies, stories, and metaphors to educate end users on seemingly inaccessible concepts.

Major Learning Concepts:

  • Case in Point: Advanced Financial Social Engineering
    • Vishing
    • Social engineering
    • Sensitive data
    • Red flags
    • Vendor compromise
  • Case in Point: Cloud Security Threats
    • “The Cloud” definition
    • Risks of the cloud
    • Securing data in the cloud
    • Following policy
  • Case in Point: Internet of Things
    • Risks of internet-connected devices
    • Changing default passwords
    • Device updates
    • Privacy settings
  • Case in Point: Mobile Security
    • Apps permissions
    • Personal data harvesting
    • Data breaches
  • Case in Point: Password Management
    • Risks of reusing passwords
    • Multi-factor authentication
    • Credential Stuffing
  • Case in Point: Physical Security
    • Physical security threats
    • Sensitive information in the open
    • Policy compliance
    • Disposal of sensitive data
    • Locking devices
  • Case in Point: Point of Sale (PoS) Security
    • Physical security threats at Point of Sale
    • At-risk devices
    • Sensitive data
    • Consequences of security incidents
    • Securing terminals
    • Disposal of old devices
  • Case in Point: Ransomware
    • Ransomware definition and objective
    • Potential losses
    • Risks of paying a ransom
    • Backups
  • Case in Point: Reporting Suspicious Activity
    • Warning signs of phishing
    • Red flags on social media
    • Vishing
    • Consequences of ignoring suspicious activity
  • Case in Point: Synthetic Identity Theft
    • Identity theft vs synthetic identity theft
    • Account monitoring
    • Consequences of synthetic identity theft
    • Securing physical documents
    • Secure disposal of sensitive data
    • Reporting unusual activity
  • Case in Point: Themed Phishing
    • Phishing red flags
    • Staying safe from phishing
    • Phishing on mobile devices
  • Case in Point: Travel Secure
    • Locking unattended devices
    • Doxing
    • Avoiding public USB ports
  • Case in Point: Vendor Email Compromise (VEC)
    • Definition of phishing and third party phishing
    • Verifying senders
    • Red flags
    • Reporting suspicious messages
  • Work From Home
    • VPNs
    • Avoiding public WiFi
    • Locking unattended devices
    • Work vs personal devices
    • Suspicious event invites

🔍 View Case in Point in your Living Security platform catalog here!