Let's Be Honest About Cybersecurity Training: What Actually Works
An honest assessment of why traditional cybersecurity training fails and what actually changes employee behavior, from phishing simulations to just-in-time training and building a security-aware culture.
One of the things we say to every new client at Agency is this: if your cybersecurity training program consists of an annual slide deck and a quiz that everyone clicks through in 15 minutes, you are spending money to feel good about a checkbox. You are not actually reducing risk. That might be uncomfortable to hear, but in our experience, honesty about what works and what does not is where real security improvement begins.
Here is the uncomfortable truth about cybersecurity training that the training vendor industry does not want to talk about: most of it does not work. Annual compliance training, as typically implemented, produces no measurable reduction in phishing click rates, no sustained behavior change, and no meaningful improvement in incident reporting. Companies spend an average of $1,500 per employee annually on security awareness programs, and the overwhelming majority of that spend is wasted on approaches that satisfy auditors but fail to protect the organization.
This is not an argument against training. It is an argument against bad training. In our experience working with hundreds of companies, we have seen what actually moves the needle — and it looks nothing like a yearly compliance video.
Why Traditional Annual Training Fails
The Compliance Checkbox Problem
What we tell clients is that most training programs are designed to satisfy an audit requirement rather than change behavior. The typical annual security awareness program follows a predictable pattern: once a year, employees receive an email directing them to complete an online training module. The module covers a broad range of topics — phishing, password hygiene, physical security, data handling, social engineering — in a generic format that assumes everyone has the same risk profile. Employees click through the slides, answer a multiple-choice quiz, receive a completion certificate, and forget everything within two weeks.
This approach satisfies SOC 2 requirements. It checks the box for cyber insurance applications. It produces a spreadsheet showing 98 percent completion that leadership can review and feel good about. What it does not do is reduce the probability that an employee will click a phishing link, share credentials, or fail to report a suspicious email.
The research supports this assessment. Studies consistently show that knowledge retention from annual training drops below 10 percent within 30 days. Click rates on phishing simulations are statistically identical whether measured before or after annual training modules are completed. The training-to-behavior pipeline is broken, and continuing to invest in the same approach while expecting different results is the definition of a compliance-driven rather than security-driven program.
The Engagement Problem
In our experience, the root cause is not that employees are careless or stupid — it is that traditional training is boring, irrelevant, and disconnected from their daily work.
Generic training that covers "how to spot a phishing email" using examples from 2018 does not prepare employees for the AI-generated, context-aware phishing attacks they will encounter today. Training that addresses every possible security topic in a single sitting creates information overload without building any depth of understanding. Training that feels punitive — "you must complete this or face consequences" — creates resentment rather than engagement.
What we see across our client base is that the companies with the strongest security cultures approach training fundamentally differently. They treat security awareness not as an annual event but as an ongoing program that meets employees where they are, when it matters, with content that is relevant to their specific role and risk profile.
What Actually Changes Behavior
Phishing Simulations That Teach
Phishing simulations, when done well, are the single most effective tool for improving employee resilience to social engineering. But "done well" is the operative phrase. In our experience, most companies implement simulations in a way that generates metrics without generating learning.
What does not work: Sending a monthly simulated phishing email, tracking who clicks, and publishing a leaderboard of departments with the highest click rates. This approach creates fear and resentment. Employees learn to be suspicious of all internal emails, which degrades communication and trust. Departments game the metric by warning each other about simulations rather than developing genuine phishing recognition skills.
What we recommend instead: Simulations that are calibrated to individual difficulty levels, that use immediate teachable moments when someone clicks, and that progressively increase in sophistication. Here is what an effective simulation program looks like:
| Element | Ineffective Approach | Effective Approach |
|---|---|---|
| Frequency | Monthly, same difficulty for everyone | Bi-weekly, difficulty adapts to individual performance |
| Content | Generic templates that look obviously fake | Role-specific lures using real-world attack patterns |
| Response to clicks | Name on a spreadsheet; manager notification | Immediate redirect to a 2-minute micro-training specific to the technique used |
| Response to reports | Nothing — reporting is not tracked | Positive reinforcement; reporting rate is a primary metric |
| Difficulty progression | Static — same complexity every month | Adaptive — employees who consistently identify simulations receive harder challenges |
| Metrics focus | Click rate | Reporting rate, time-to-report, click rate trend over time |
The shift from "gotcha" to "teachable moment" is what transforms simulations from a fear-based compliance exercise into an effective training mechanism. In our experience, companies that implement adaptive simulations with immediate micro-training see click rates drop by 60 to 70 percent over 12 months, compared to 10 to 15 percent for traditional annual training programs.
Just-in-Time Training
Just-in-time training delivers security guidance at the exact moment it is relevant — when an employee is about to take an action that has security implications. This approach leverages the psychological principle that learning is most effective when it is immediately applicable.
Examples of just-in-time training moments:
- An employee adds an external recipient to an email containing sensitive data and receives a brief pop-up explaining data handling expectations before the email is sent
- A new employee is setting up their workstation and receives guided security configuration instructions during the setup process rather than three weeks later in a training module
- An employee attempts to upload a file to an unapproved cloud storage service and receives a redirect to the approved alternatives with a brief explanation of why
- A developer is about to commit code containing what appears to be an API key and receives an automated alert explaining secrets management practices
What we tell clients is that just-in-time training respects employees' time and context. Instead of pulling them out of their work for an hour-long training session, it integrates security guidance into their workflow. The training is relevant because it addresses exactly what the employee is doing right now. It is brief because it covers one specific topic. And it is retained because the employee immediately applies the knowledge.
Gamification That Is Not Patronizing
Gamification has become a buzzword in security training, and most implementations are terrible. Cartoon characters, fake "security hero" badges, and leaderboards that shame low performers do not work for professional adults. What we recommend is gamification that respects your employees' intelligence while leveraging the psychological mechanisms that make games engaging.
Effective gamification elements:
- Team-based competitions where departments compete on reporting rate rather than individual click rate, fostering collective security responsibility
- Scenario-based challenges that present realistic situations and ask employees to make decisions, with immediate feedback on the consequences of each choice
- Progressive skill development where employees visibly build competency over time, unlocking more advanced scenarios as they demonstrate mastery
- Recognition that matters — mention in team meetings, small tangible rewards, or contributions to a team charity fund rather than digital badges
In our experience, the companies with the best engagement use platforms like Hoxhunt, KnowBe4's more advanced modules, or custom-built challenge programs that feel like professional development rather than compliance theater.
Metrics That Actually Matter
What to Stop Measuring
Annual training completion percentage. A 98 percent completion rate tells you that 98 percent of employees clicked through a module. It tells you nothing about whether they learned anything or will behave differently. In our experience, this is the most commonly reported security training metric and the least useful.
Raw phishing click rates. A 3 percent click rate sounds good until you realize that 3 percent of a 500-person company is 15 people who would have compromised their credentials — and an attacker only needs one.
What to Start Measuring
| Metric | Why It Matters | Target |
|---|---|---|
| Phishing reporting rate | Measures whether employees actively identify and report threats, not just avoid them | Above 70% of simulated phishing emails reported within 24 hours |
| Time to report | Measures how quickly threats are escalated to the security team | Median time under 5 minutes from receipt to report |
| Click rate trend | The direction matters more than the absolute number — are you improving? | Consistent downward trend over 6-month rolling average |
| Repeat clicker rate | Identifies employees who need additional targeted support | Below 5% of employees clicking on 3+ simulations in 12 months |
| Training engagement | Active participation vs passive completion — completion time, quiz interaction, voluntary participation | Completion times consistent with content length; engagement scores above 70% |
| Real threat reporting | Are employees reporting actual suspicious emails, not just simulations? | Increasing trend in real-world phishing reports |
What we tell clients is that the reporting rate is the single most important metric. A company where employees reliably report suspicious emails within minutes has a distributed human detection system that complements technical controls. A company where employees silently delete suspicious emails — or worse, do not recognize them — has a gap that no amount of technical tooling can fully close.
Training Frequency and Format
The Right Cadence
In our experience, the optimal training cadence balances frequency with fatigue. What we recommend is:
- Phishing simulations: Every two weeks, varying in difficulty and technique
- Micro-training modules: Monthly, 3 to 5 minutes each, focused on a single topic relevant to current threats
- Role-specific deep dives: Quarterly, 20 to 30 minutes, tailored to the specific risks of engineering, finance, executive, and customer-facing roles
- Comprehensive refresher: Annually, to satisfy compliance requirements, but designed as a capstone to the ongoing program rather than the program itself
- Incident-triggered training: Immediately following a real security incident or near-miss, specific to the attack type encountered
Format Recommendations
What we tell clients is that the delivery format matters as much as the content. In our experience, the following formats produce the highest engagement and retention:
Short video (under 3 minutes) for awareness topics — delivered through Slack or Teams rather than email, which is more likely to be ignored. Real examples using anonymized incidents from the company or industry are dramatically more engaging than generic scenarios.
Interactive scenarios for skill development — presenting employees with realistic situations and asking them to make decisions. These should branch based on choices, showing consequences rather than simply telling employees what they should have done.
Live demonstrations for high-impact topics — a quarterly "hack demo" where someone demonstrates real attack techniques (credential harvesting, MFA fatigue attacks, social engineering calls) in a live setting is consistently the highest-engagement training format we see. Employees remember what they see happening in real time far longer than what they read in a slide deck.
Building Security Culture Beyond Compliance
In our experience, the companies with the strongest security postures share a common characteristic: security is part of the culture rather than an imposition on it. Training alone does not create this culture, but training done well is one of the essential building blocks.
Leadership modeling. When executives visibly follow security practices — using password managers, authenticating with hardware keys, talking about security in all-hands meetings — it signals that security is an organizational value, not just an IT requirement. What we tell clients is that the CEO's behavior sets the security culture more than any training program.
Psychological safety for reporting. Employees must feel safe reporting mistakes — clicking a phishing link, losing a device, accidentally sharing credentials — without fear of punishment. In our experience, companies that punish security mistakes drive those mistakes underground, where they cause far more damage. Companies that celebrate reporting, even when the employee made the mistake, build the rapid detection capability that limits breach impact.
Security as enablement. Frame security practices as tools that help employees do their jobs safely rather than restrictions that slow them down. Password managers make authentication faster, not harder. Approved file-sharing tools are easier to use than workarounds. When security enables productivity rather than impeding it, adoption follows naturally.
Feedback loops. Share the results of the security program with the whole company. When phishing reporting rates improve, celebrate that publicly. When a real phishing attack is caught because an employee reported it, tell that story (anonymized appropriately). Employees who see their efforts contributing to a measurable outcome are more likely to sustain those efforts.
Key Takeaways
- In our experience, annual compliance training produces compliance metrics, not security outcomes. If your training program is a once-a-year slide deck, you are checking a box, not reducing risk.
- What we recommend is replacing the annual training model with a continuous program that includes bi-weekly phishing simulations with adaptive difficulty, monthly micro-training, quarterly role-specific deep dives, and incident-triggered learning.
- What we tell clients is that reporting rate is the metric that matters most. A company where 70 percent or more of simulated phishing emails are reported within 24 hours has a fundamentally stronger security posture than one with a low click rate but no reporting culture.
- In our experience, the delivery format matters as much as the content. Short videos through Slack, interactive scenarios, and live hack demonstrations produce dramatically higher engagement and retention than traditional slide-based modules.
- What we tell clients is that training cannot create security culture alone. Leadership modeling, psychological safety for reporting, framing security as enablement, and visible feedback loops are equally essential to building an organization that is genuinely resilient.
Agency Team
Agency Insights
Expert guidance on cybersecurity compliance from Agency's advisory team.
LinkedIn