Cyber SecurityAgentic

Security Awareness Training Enters the Agentic Era

By Brandon Min, CEO and co-founder of Herd Security

Security awareness training is undergoing the same transformation happening across the rest of the enterprise: the move from static systems toward autonomous technology.

Historically, awareness training has followed a fairly predictable routine. Organizations deploy once-a-year compliance programs where employees complete the required courses, run through a few exercises, and navigate a phishing simulation. This approach made some sense when the attack surface wasn’t as wide or new threats weren’t as frequent.

Things look different today. Attacks evolve weekly, employees are interacting with AI tools daily, and human behavior has become one of the most targeted attack surfaces in the enterprise. In many organizations, security awareness training is not keeping pace with the kinds of attacks employees are actually seeing.

The disconnect becomes obvious pretty quickly in practice. Employees may complete a training session and feel prepared, only to encounter attacks later that look very different from the examples they were shown beforehand. Data shows that 80% of employees feel confident in their ability to spot a deepfake or phishing example, but only 32% are passing performance tests in practice. The result is a confidence gap, where people believe they can recognize and stop threats effectively but that perception breaks down against the real-world risks they actually face.

As the threat landscape evolves faster than traditional training can keep up, the industry is beginning to move toward agentic training models that adapt continuously to changing threats and employee behavior.

The problem with periodic programs

A lot of awareness programs still revolve around compliance requirements. Employees complete the required sessions, maybe run through a phishing exercise, and then do not revisit the material again for months. The problem is attackers are not operating on the same timeline.

A phishing campaign can shift quickly from fake invoices to bogus meeting requests or messages pretending to come from internal teams. AI tools have made it much easier to rewrite and tailor those messages for different departments and job roles, often with very little effort. They seamlessly blend into everyday communications and do not immediately appear as malicious.

Employees also work across far more systems than they used to. A normal day now involves  bouncing between inboxes, chats, meetings, documents, cloud platforms, and AI assistants without much separation between them. Suspicious messages now tend to appear in the middle of those everyday interactions rather than in isolation.

This creates a difficult environment for the annual, compliance-era training model. As threats become more dynamic and embedded within everyday workflows, periodic programs are increasingly misaligned with the realities of modern risks and less effective at preparing employees.

Human risk is becoming more dynamic

The definition of human risk is expanding well beyond phishing clicks and password reuse as employees interact with AI, from copilots to browser-based assistants, transcription tools, note-taking applications, and more.

Many of these systems improve productivity and automate repetitive tasks, but they also create entirely new ways sensitive information can be exposed, copied, or shared outside approved channels. In many situations, employees do not necessarily view those interactions as security decisions. Someone pasting confidential data into a generative AI tool may see it simply as a faster way to complete a task. The same applies to workers using AI systems to summarize meetings, organize customer information, review proprietary code, or generate internal content.

That creates new visibility challenges for security teams. Organizations are now trying to understand how employees interact with AI systems, where information flows between tools, and how machine-generated content influences everyday decisions across the business.

Attackers are also benefiting from the same advances in AI. Campaigns can now be tailored more easily around specific employees, departments, workflows, and business contexts. As a result, human risk is becoming more contextual, behavioral, and difficult to measure through legacy awareness programs alone.

Organizations are increasingly realizing they need systems that can adapt to both evolving employee behavior and machine-driven threats, rather than responding months later after risks have already changed.

Why the industry is moving toward agentic training

Organizations are also starting to rethink what awareness training is supposed to do. Rather than relying on occasional training sessions and periodic refreshes, there is growing interest in approaches that can change more regularly as threats and employee behavior shift over time.

Agentic training models are designed to generate, personalize, and deliver simulations based on live threat intelligence, user behavior, and emerging attack patterns. Rather than manually building exercises months in advance, AI helps security teams respond much more quickly when new scams or social engineering techniques begin circulating.

If finance teams suddenly start receiving invoice fraud emails, for example, organizations can quickly create simulations based on those same tactics instead of waiting for the next training refresh cycle. The same approach can be used for executive impersonation attempts, credential theft campaigns, AI-generated voice scams, or phishing attacks.

That matters because employees across the organization deal with very different kinds of risk. A developer is likely to encounter different threats than someone in finance, HR, or executive support. Running the same exercises for everyone no longer reflects how attacks actually target people inside modern organizations.

Additionally, no two organizations are the same. All businesses operate differently, making a one-size-fits-all approach to security awareness increasingly ineffective. Training has to be delivered and designed in ways that reflect an organization’s specific risk posture, workflows, and communication patterns. AI makes this far more achievable by empowering security teams to build more holistic security programs.

There is also a broader shift happening in how companies think about awareness training itself. Employees are much more likely to encounter suspicious activity while going about normal work than during a scheduled training session. As a result, organizations are looking for ways to make awareness programs feel more connected to the situations employees actually face daily– and they need to reach employees in the moments that matter most.

Agentic models are part of that shift. Instead of updating training material every few months, security practitioners can leverage these systems to adjust exercises more continuously as attack patterns and employee behavior change over time.

The future of awareness training will be continuous

Security teams are starting to accept that older awareness models are no longer enough on their own. The pace of modern attacks, combined with how employees now work and use AI tools, has made static training programs feel increasingly out of date.

Many organizations are now trying to make awareness training feel more engaging and connected to the kinds of situations employees actually run into during the workday. Traditional exercises still have value, but companies are increasingly looking for approaches that can be updated more often as attack patterns and working habits change.

None of that removes human practitioners from the process. Security teams still define priorities, identify the biggest areas of risk, and determine how awareness fits into broader security strategy. What changes is how quickly training can react when conditions change.

The future of security awareness is likely to look less like periodic compliance exercises and more like intelligent systems designed to reinforce decision-making at the pace of modern threats.

Author

Related Articles

Back to top button