Skip to main content
Everyone at Denialbase receives security awareness training on hire and annually thereafter. Role-specific modules add depth for developers, support staff, and anyone with privileged access.
Owner: Security Officer · Cadence: Annual (minimum), monthly for phishing simulation · Policy version: 0.9 (draft)

Program overview

Universal baseline

Everyone completes on hire + annually: HIPAA Privacy/Security rule essentials, Denialbase security policies, phishing recognition, credential hygiene, incident reporting, PHI handling, device hygiene.

Role-specific modules

Add-on modules based on role — secure SDLC for engineers, support-desk PHI handling for CS, privileged access for ops, customer data handling for sales.

Continuous awareness

Monthly phishing simulations, weekly security digest, quarterly “red flag” walk-throughs of recent external incidents.

Just-in-time

Triggered training — e.g. if an access review reveals scope creep, training on least-privilege for that team.

Required learning (universal)

Every workforce member completes the following within their first 14 days:
ModuleDurationFormat
HIPAA Privacy & Security Rule essentials45 minVideo + 10-question quiz (pass ≥ 80%)
Denialbase Information Security Policy20 minRead-and-acknowledge
Acceptable Use Policy15 minRead-and-acknowledge
Phishing recognition30 minVideo + practice exercises
Password & credential hygiene15 minQuick course + 1Password setup
Incident reporting10 minVideo + contact sheet
PHI handling 10130 minVideo + scenario quiz
Workstation hygiene15 minVideo + MDM verification
Total: ~3 hours. Completion is blocking for production access.

Annual refresher

All workforce members complete an updated version of the universal modules each year, scheduled within 30 days of their hire anniversary or 1 January (whichever comes first). The refresher incorporates:
  • Changes to HIPAA enforcement or state privacy laws in the last year.
  • Lessons from incidents in the last year (sanitized).
  • New threat trends (e.g. AI-driven phishing, specific campaigns targeting healthcare SaaS).
  • Any policy changes.
Target completion rate: ≥ 95% within 30 days of invitation. Managers are accountable for their direct reports’ completion.

Role-specific modules

Software engineers

  • OWASP Top 10 refresher (focused on Rails/React pitfalls)
  • Threat modeling using STRIDE or equivalent
  • Secure code review — what to look for as a reviewer
  • Secure handling of customer data in dev/test — seed data only, no prod PHI
  • Responding to security@denialbase.com reports

Support staff

  • PHI minimization in tickets, screenshots, and recordings
  • Identity verification before discussing any customer account
  • Social engineering resistance
  • Escalation path for suspected breaches

Privileged access holders (CTO, Security Officer, senior engineers)

  • Break-glass access procedure and documentation requirements
  • Prod data access etiquette — just-in-time, time-limited, audit-logged
  • Encryption key handling — never extract from Secret Manager, rotate procedures
  • Terraform safetyplan before apply, no force-flags, review requirements

Leadership (CEO, executives)

  • Whaling / spear-phishing awareness (execs are the prime target)
  • Wire transfer fraud recognition
  • Board / investor communications security
  • Legal privilege boundaries for incident response

Phishing simulation

One simulated phishing email per month, sent to all employees. Campaigns vary in difficulty and vector (credential phish, attachment, voice/SMS variants).
Per-person and org-level click and report rates tracked. Org target: click rate < 5%, report rate > 50%.
A click doesn’t trigger discipline — it triggers a 10-minute just-in-time micro-training and a follow-up simulation. Repeated clicks after training trigger a manager conversation.
Every report, real or simulated, is acknowledged within 1 business hour. Real reports go to the incident response flow.

Micro-learning

Short-form content to keep security top-of-mind between formal trainings:
  • Weekly “one-minute security” — a single tip, Slack-delivered, with a linked deep-dive.
  • Quarterly “red flag” sessions — 20-min group walk-through of recent external incidents (Okta breach, 23andMe credential stuffing, healthcare ransomware reports) and what we’d do differently.
  • Monthly office hours — the Security Officer holds a 30-min drop-in for questions, “is this suspicious”, or policy clarifications.

Records retained

RecordRetention
Completion records (who, what, when)Employment + 6 years
Quiz scoresEmployment + 3 years
Phishing simulation outcomes3 years
Policy acknowledgementsEmployment + 6 years

Metrics

Reported quarterly to Management review:
MetricTarget
Universal training completion (new hires)100% within 14 days
Annual refresher completion≥ 95% within 30 days of invitation
Role-specific training completion100% within 30 days of role start
Phishing click rate (org average)< 5%
Phishing report rate> 50%
Quiz pass rate on first attempt≥ 80%

Current gaps — honest status

Training modules are delivered via a mix of live sessions, third-party platform (TBD), and internal Loom recordings. Formal curriculum docs and an LMS are being set up Q2 2026.
Running manual simulations today; evaluating vendor platforms (KnowBe4, Proofpoint, Hoxhunt) for Q2 2026.
Completion is tracked today in a Google Sheet and per-person in employment records. Migrating to an HR platform with audit-exportable records Q3 2026.