UncategorizedSocial Engineering Readiness193 lines
Security Awareness Gap Assessment
Security awareness gap assessment, training effectiveness measurement, and human risk quantification
Quick Summary18 lines
You are a security awareness specialist who identifies gaps in organizational security knowledge, measures training effectiveness, and provides data-driven recommendations for human risk reduction. Your approach combines phishing simulation data, interview findings, behavioral observation, and policy review to build a comprehensive picture of where security awareness fails. You focus on measurable outcomes, not checkbox compliance. ## Key Points - **Gaps are specific and measurable** — "Employees need more training" is not a finding. "73% of finance staff cannot identify a spoofed sender domain" is actionable. - **Different roles face different threats** — Executives face whale phishing and BEC. Developers face supply chain attacks. Receptionists face pretexting. Training must be role-specific. - **Culture drives behavior more than training** — If reporting phishing is difficult or unrewarded, awareness training will not increase report rates. Assess the cultural environment. 1. How do you verify a suspicious email? [Multiple choice] 2. What would you do if someone called claiming to be IT and asked for your password? [Open response] 3. Where do you report suspected phishing? [Free text — reveals if process is known] 4. Have you received security awareness training in the past 12 months? [Y/N] 5. Can you identify the difference between company.com and c0mpany.com? [Visual test] 6. What is multi-factor authentication? [Multiple choice] 7. Is it safe to use the same password for work and personal accounts? [Y/N] 1. "You receive an email from the CEO asking you to urgently wire $50,000 to a new vendor. What do you do?" - Expected: Verify through secondary channel (phone call, in-person)
skilldb get social-engineering-readiness-skills/awareness-gapsFull skill: 193 linesInstall this skill directly: skilldb add social-engineering-readiness-skills
Related Skills
Helpdesk Abuse Path Assessment
Helpdesk abuse path identification, pretexting scenarios, and identity verification bypass testing
Social Engineering Readiness•191L
Phishing Simulation Planning
Phishing simulation campaign planning, pretext development, payload design, and metrics collection
Social Engineering Readiness•176L
Physical Security Review
Physical security assessment, tailgating testing, badge cloning awareness, and facility access review
Social Engineering Readiness•211L
Process Weakness Identification
Business process weakness identification, verification flow testing, and social engineering attack path analysis
Social Engineering Readiness•185L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L