Phishing training that actually changes how people respond.
Most awareness programs fail for a boring reason: nobody runs them like a program. We design, operate, and report on managed security awareness training so your staff learn to recognize the attacks they will actually see — and so you have the evidence HIPAA, SOC 2, and your cyber-insurance renewal will ask for.
Managed security awareness training is a phishing and awareness program that an outside team designs, runs, and reports on for you — short story-driven micro-lessons, realistic simulations, a one-click Report Phishing button that routes to a real Security Operations Center, and the documentation auditors and insurers ask for.
It is bundled into Protected ($32 per user per month) and Complete (from $55 per user per month). The Foundation tier ($15 per agent per month) is endpoint-only and does not include SAT.
We do not build the training content from scratch. Our default platform is Huntress Managed Security Awareness Training — story-driven 5-minute micro-lessons, realistic phishing simulations, and a report-phishing workflow that ties back to the same Huntress 24/7 SOC running your MDR and ITDR. KnowBe4 and Hoxhunt are deployed where existing licensing or specialty content calls for them. The Obsidian Ridge value is the program around the platform: design, content selection, simulation cadence, reporting analysis, leadership debrief, and audit-evidence packaging.
What's included
Everything that goes into a managed SAT program
Six things tend to separate a program that changes behavior from one that produces a completion certificate nobody reads.
Story-driven micro-lessons
Short lessons people can finish between meetings. Each one teaches a single pattern — urgent payment changes, login links from email, shared-file requests — using realistic examples instead of cartoon hackers and security vocabulary.
Role-based content
Finance, HR, IT, and executives each get scenarios that match their work. A bookkeeper learns vendor-payment fraud; an admin learns OAuth consent and mailbox-rule abuse; an executive learns approval-fraud and MFA fatigue. Everyone learns the basics first.
Realistic phishing simulations
Scenarios that look like the email your staff actually receives. We avoid emotionally manipulative tricks — no fake layoffs, no fake bonuses — because those teach distrust of leadership instead of distrust of suspicious requests.
One-click reporting into the SOC
A Report Phishing button lives in Outlook or Gmail. When someone reports, an analyst triages the message and replies with a verdict. Reporting becomes detection, and detection becomes feedback that reinforces the behavior.
Metrics leadership can act on
Reporting rate, time to first report, repeat risk, and which workflows still let bad email through. Click rate matters — but it is one signal, not the scoreboard.
Audit-evidence packaging
Completion records, simulation reports, policy attestations, and the program narrative in the form HIPAA, SOC 2, PCI DSS, and ISO 27001 reviewers actually ask for — including the gaps you fixed and what changed because of training.
The shift is subtle but important. The program stops asking “who failed the test?” and starts asking “where is the business still easy to trick?” That second question leads to better fixes — better payment-verification policy, better MFA coverage, better mailbox-rule monitoring. Training helps people recognize attacks before they click; the program around it helps the business respond when training is not enough.
Compare honestly
DIY phishing training vs. LMS-only platform vs. managed program
None of these are wrong choices. They solve different problems. Here is how the operational reality changes between them.
Question
DIY phishing training (free)
LMS-only platform
Managed SAT program
Who designs the program
Whoever volunteers — usually IT
You — vendor ships a content library
We do — based on your industry, headcount, and risk
Who reviews reported phish
Sometimes nobody, sometimes IT
You, if your team has time
Our SOC, with a reply back to the reporter
Who debriefs with leadership
Whoever has the spreadsheet
You — the platform gives you data, not narrative
A senior practitioner, quarterly
Audit evidence
Reassembled the week of the audit
Export a CSV; format it yourself
Packaged the way auditors consume it
Total cost (50-user org, year 1)
$0 in licenses, ~80 hrs of internal time
~$3K license + ~40 hrs to run it
Bundled into Protected — no separate program tax
Best fit
Comfortable with the audit risk
Internal security lead with bandwidth
5–500 employees, no internal security team
If you already have a security-minded person inside who genuinely owns the program, an LMS-only platform may be the right answer — and we will tell you that on the triage call. Managed SAT is for the businesses where the program would otherwise become shelfware.
See the reel
A 100-second briefing on the phishing reality
A short visual walk-through of how modern phishing reaches a small business — what an employee actually sees, where the decision happens, and how a managed program shortens the time between “this feels off” and “the SOC is already on it.”
Pricing
Two tiers that include SAT — Foundation does not
Managed SAT is bundled into Protected and Complete. The Foundation tier ($15 per agent per month) is endpoint detection and response only — it does not include awareness training, simulations, or the reporting workflow. If awareness is what you came here for, start with Protected.
Prices in USD · per agent or per user
Most common
Tier 01 · Protected
Protected
$32/ user / mo
Annual term · billed monthly
Managed security awareness training built into the wider Protected program — phishing simulations, role-based lessons, a real reporting workflow, and the training records auditors and insurers ask for.
What's included for SAT
Short story-driven micro-lessons.Awareness curriculum: five-to-ten-minute lessons people can actually finish, scheduled on a monthly or quarterly rhythm instead of a forgotten annual module.
Role-based content for finance, IT, and executives.Role-based training: finance gets BEC and vendor-payment scenarios, IT gets account-compromise and OAuth-consent training, executives get approval-fraud and MFA-fatigue practice.
Realistic phishing simulations on a calendar you can defend.Phishing simulation: scenarios match the messages your staff actually sees — fake invoices, shared documents, login prompts — never humiliating, never gotcha layoffs or fake bonuses.
One-click 'Report Phishing' button into the SOC.Reporting workflow: an Outlook or Gmail button routes suspicious email to analysts who triage it and reply to the reporter — so people get fast feedback and the business gets early warning.
Training records ready for SOC 2, HIPAA, and insurance.Compliance evidence: completion logs, simulation results, and program documentation packaged the way auditors actually consume them.
Replaces or complements
Annual compliance-check-the-box training nobody remembers a week later
Phishing simulation tools nobody reviews
Hoping the IT generalist has time to run a training program quarterly
Adds executive debriefs, deeper role-based scenarios, and audit-evidence packaging for teams that already feel the weight of compliance and want the program handled end-to-end.
Everything in Protected, plus
Quarterly leadership debrief.Executive review: we sit down with leadership to translate reporting rate, time-to-report, and risky-workflow findings into decisions about process, policy, and budget.
Deeper role-based scenarios.Custom scenarios: scenarios written around your real workflows — vendor list, payroll cadence, client-file transfer patterns — instead of generic templates.
Audit-evidence packaging.Evidence pack: training completion, simulation results, policy attestations, and the program narrative bundled into the form auditors actually accept.
Senior practitioner — 4 hrs/mo reserved.Practitioner hours: use the time for program design changes, regulator questions, M&A onboarding, or content review.
Integration with detection and identity workflows.Reported-phish triage: user-reported messages feed the SOC, identity alerts trigger micro-coaching, and clicked-credentials trigger a session-revoke playbook — training stops being a silo.
Replaces or complements
Separate LMS and simulation tools that don't talk to each other
Manual audit-evidence collection the week before a review
Annual programs with no link to detection or identity controls
Frameworks have firm expectations here: HIPAA Security Rule 164.308(a)(5) requires a workforce security awareness and training program; SOC 2 Common Criteria CC1.4 expects evidence that competent personnel are developed and trained; PCI DSS 4.0 section 12.6 requires a formal awareness program with annual training and signed acknowledgement; ISO 27001 Annex A.6.3 requires information-security awareness, education, and training. The pricing reflects a program designed to satisfy all four without four separate tools.
Managed SAT is the right fit for most small and mid-market businesses that want a working awareness program without staffing one. It is not the right fit if:
You already have a dedicated security lead who runs the program weekly, reviews every reported message, and debriefs leadership themselves. Buy a platform license.
You want a one-time annual module to satisfy a checkbox and you do not actually want behavior to change. We will not sell that and pretend it is a program.
You are looking for gotcha simulations that fake layoffs, fake bonuses, or emotionally manipulate staff. That damages trust in leadership instead of building suspicion of risky requests.
You expect training alone to stop business email compromise. It will not. Awareness has to sit next to MFA, payment verification, identity monitoring, and an incident process — we will tell you what is missing on the triage call.
If any of those describe you, we tell you that on the triage call. No follow-up sales sequence.
What happens after you reach out
From first call to first simulation — typically 21 days
01
Free 20-minute triage
A direct call with the practitioner. We confirm whether managed SAT is the right next step or whether a single workflow fix — better MFA, a payment-verification policy — would do more right now.
02
30-minute briefing & written proposal
Within one business day after the briefing, you get a fixed-fee proposal that names the underlying platform (Defender, KnowBe4, or Hoxhunt), the cadence, the role-based scenarios, and the audit frameworks the evidence will support.
03
Baseline & reporting workflow (week 1-2)
We deploy the Report Phishing button to Outlook or Gmail, baseline current reporting behavior, and write the internal note that tells staff the program is starting and what good looks like. No surprise simulation on day one.
04
First simulation & monthly rhythm (day 21 onward)
A realistic, fair simulation goes out around week three. From there: short recurring lessons, quarterly simulations or more often if risk demands, and a monthly summary in plain English. Quarterly debrief with leadership.
FAQ
Questions that come up before signing
What is managed security awareness training?
Managed security awareness training is a phishing and awareness program that an outside team designs, operates, and reports on for you. It includes short recurring lessons, realistic phishing simulations, a reporting workflow, and the documentation auditors and insurers ask for. The point is to free a small or mid-market business from running a program that needs weekly attention to actually change behavior.
How often should we run phishing simulations?
For most small and mid-market businesses, quarterly is a reasonable baseline; finance-heavy or regulated environments often benefit from monthly cadence with role-specific scenarios. The goal is repetition without fatigue: short, realistic, and consistent. Annual training tends to fade — NIST's updated awareness-program guidance emphasizes continuous improvement over one-time information dumps. Source: NIST SP 800-50 Rev. 1.
What's a healthy click rate, and is it the right metric?
Click rate is one signal, not the scoreboard. A program optimizing only for click rate tends to get harder simulations until it produces a number leadership likes. We track reporting rate, time to first report, repeat risk, and which workflows still allow bad email through — because those metrics describe whether the business can respond, not just whether employees noticed. We share benchmarks transparently from sources like Verizon's DBIR and the KnowBe4 Phishing Benchmark Report rather than quoting an industry-average number out of context.
Does HIPAA require security awareness training?
Yes. The HIPAA Security Rule at 45 CFR 164.308(a)(5)(i) requires covered entities and business associates to implement a security awareness and training program for all workforce members, including management. Specific implementation specifications cover security reminders, protection from malicious software, login monitoring, and password management. We package training completion records, simulation results, and program documentation as evidence of that requirement. Source: HHS Security Rule, 45 CFR 164.308.
What about training fatigue?
Training fatigue is real and we plan for it. The fix is shorter lessons, not less frequent ones — five useful minutes beats a forgotten hour. We also vary the format: story-driven micro-lessons, short reminders tied to current events, and simulations that match how your business operates. If people are tired of training, we shorten the lesson before reducing the cadence.
Do you write the training content yourselves?
No, and we are clear about that. Our default platform is Huntress Managed Security Awareness Training — story-driven 5-minute micro-lessons, realistic phishing simulations, and a one-click report-phishing workflow that ties back to the same 24/7 SOC that runs your ITDR. We can also deploy KnowBe4 or Hoxhunt where existing licensing or specific content requirements call for it. The Obsidian Ridge value is program design, content selection, simulation cadence, reporting analysis, the leadership debrief, and audit-evidence packaging. The training videos and base templates come from the underlying platform; we make the program work.
How is this different from buying Huntress SAT or KnowBe4 ourselves?
Huntress Managed SAT, KnowBe4, and Hoxhunt are all good platforms. The gap most teams hit is operational: who reviews reported phish, who decides the simulation calendar, who interprets the report each month, who debriefs with leadership, and who packages evidence for the audit. Buying the platform solves the content problem and leaves the program problem. Managed SAT runs the program.
Can you produce audit evidence for SOC 2, HIPAA, or PCI DSS?
Yes. SOC 2 CC1.4 expects evidence that the organization develops and retains competent personnel and that awareness training is delivered and tracked. PCI DSS 4.0 section 12.6 requires a formal security awareness program with annual training and acknowledgement. HIPAA requires the program at 164.308(a)(5). We package completion logs, simulation summaries, policy attestations, and program narrative in the form each framework's reviewers actually expect.