Skip to main content
Annual Compliance

Annual Compliance Security Awareness Training

Refresh the entire workforce on a yearly cycle, mapped to the frameworks your auditors actually ask about. Per-control evidence, time-to-complete benchmarks, and a single export ready for the next audit.

By Last reviewed

The Yearly Refresh, Without the Yearly Friction

Almost every regulated organization owes auditors proof of annual security awareness training. HIPAA Security Rule, GLBA Safeguards, NYDFS 23 NYCRR 500, ISO 27001 A.7.2.2, GDPR Article 39, and NIST 800-171 control 3.2 each carry a workforce training expectation. Most security teams cope by sending the same 30-minute video out every January and hoping completion rates clear 80%.

The yearly refresh is a chance to drive measurable behavior change, not check a box. The same exercises a hire takes in onboarding need to feel different a year later, with new threat patterns, new scenarios, and a knowledge check that produces a real score. Otherwise the refresh becomes muscle-memory clicking.

RansomLeak runs the annual cycle as a 60-day window with rotating exercise content, framework-mapped reporting, and an executive sponsor email at kickoff. Every completed employee produces a per-control evidence record, scored knowledge check, and time-to-complete benchmark. The audit package compiles automatically at end of window.

How It Works

1

Pick your frameworks

Select one or more frameworks from the catalogue: HIPAA, GLBA Safeguards, NYDFS 500, ISO 27001 (A.7.2.2 and Annex A 6.3), GDPR Article 39, NIST 800-171 (3.2.1 / 3.2.2), CMMC, PCI DSS 12.6, and SOC 2 CC1.4. Mapping populates automatically across exercises.

2

Customize the exercise mix

Default curriculum covers phishing, ransomware, social engineering, BEC, data classification, and incident reporting. Customers swap or add exercises by department, role, or framework requirement. Engineering, finance, and clinical roles get optional deep-dive modules.

3

Set the 60-day completion window

A standard cycle opens with an executive sponsor email and runs 60 days. Per-department reminder cadence: weekly for the first three weeks, then twice weekly until close. Non-completers get a manager escalation at day 50 and an HR ops escalation at day 60.

4

Track distribution, not just completion

Real-time dashboards show completion rate, average time-to-complete, scoring distribution, and per-exercise drop-off. Slice by department, location, manager, or any HRIS attribute to spot lagging populations early.

5

Compile the audit evidence package

At end of window, the platform generates a single PDF and CSV export per framework. Each control ID maps to the exercises that cover it, the completion records that prove it, and the scoring data behind it. Drop into the audit portal, no manual cross-walking.

What You Get

Completion certificate per employee

Every employee finishing the cycle receives a dated PDF certificate listing the exercises completed, frameworks covered, and scoring summary. Stored in the employee record and exportable in bulk.

Per-control evidence package

A single export maps each control ID (e.g. ISO 27001 A.7.2.2, HIPAA § 164.308(a)(5)(i), NIST 800-171 3.2.1) to the exercises, completion records, and scores that prove it. Auditor-ready format reviewed against SOC 2 Type II, ISO surveillance, and HHS audit templates.

Time-to-complete benchmarks

Distribution data showing how long completion takes by role, department, and location. Surfaces hidden friction (overloaded teams, language gaps, role-curriculum mismatch) before they become an audit finding.

Scoring distribution per exercise

See which scenarios produce the lowest first-attempt scores across the workforce. Use the data to plan targeted micro-training in the next quarter, or to surface roles that need a deeper curriculum.

Executive readout in one slide

A single auto-generated slide with completion rate, scoring distribution, top three weakest scenarios, and year-over-year comparison. Drop straight into the board or audit committee deck.

Threats this use case covers

Read the pillar guide for each attack type and the exercises that train against it.

What Is Annual Compliance Security Awareness Training?

Annual compliance security awareness training is the yearly mandatory refresh that every regulated workforce completes to satisfy framework-specific training requirements. HIPAA Security Rule § 164.308(a)(5), GLBA Safeguards Rule, NYDFS 23 NYCRR 500.14, ISO 27001 Annex A.7.2.2, GDPR Article 39, and NIST 800-171 control 3.2 all carry a workforce education expectation. Auditors expect dated completion records per employee, per-control mapping, and ideally evidence of behavior change rather than passive viewing.

Modern annual programs run on a 60-day window with rotating content, an executive sponsor email at kickoff, and a knowledge check that produces a real score. Static yearly videos technically satisfy the rule, but auditors increasingly probe for scoring distribution and time-to-complete data. The refresh is also the cleanest place to capture year-over-year behavior-change metrics for the board.

RansomLeak runs the annual cycle as interactive 3D simulations mapped to every common framework, with per-department reminder cadence and an audit-ready evidence export at end of window. Each completed employee produces a dated certificate, scored knowledge check, and per-control evidence record. The audit package compiles automatically without spreadsheet cross-walking.

Frequently Asked Questions

What security teams ask before picking this use case.

Which compliance frameworks does the annual program map to?

HIPAA Security Rule § 164.308(a)(5), GLBA Safeguards Rule, NYDFS 23 NYCRR 500.14, ISO 27001 Annex A.7.2.2 and 6.3, GDPR Article 39, NIST 800-171 controls 3.2.1 and 3.2.2, CMMC level 1 and 2, PCI DSS 12.6, and SOC 2 CC1.4. Customers can request additional frameworks at no extra cost.

How long does the annual refresh take per employee?

Default curriculum runs 90 to 150 minutes spread across a 60-day window. Most employees complete in three or four sittings. Engineering and finance deep-dive curricula add another 30 to 60 minutes.

Can we run multiple framework audits from a single cycle?

Yes. One cycle produces evidence packages for every framework selected in setup. A customer running HIPAA, ISO 27001, and SOC 2 in parallel gets three audit-ready exports from the same workforce completion data.

What does the audit evidence export contain?

Per-control mapping, per-employee completion records with timestamps, scoring data, and the signed acknowledgement artifacts. Available as PDF for narrative use and CSV for bulk audit-portal upload. Reviewed against SOC 2, ISO 27001, and HHS templates.

How do we handle non-completers at end of window?

Manager escalation at day 50, HR ops escalation at day 60. Customers can configure a credential-suspension webhook for hard deadlines. The platform also supports rolling extensions for new hires inside the cycle window.

Does content rotate year-over-year?

Yes. Each exercise has multiple scenario variants that rotate annually so workforce members do not memorize answers. Phishing detection rotates senders, lures, and visual artifacts. Ransomware response rotates the simulated attacker playbook.

Can we deliver the cycle in multiple languages?

Yes. Exercises ship in English and Ukrainian today, with French, German, Spanish, and Polish in the localization roadmap. Voice-over and on-screen text translate together. Completion records track per-employee language.

Run This Use Case With Your Team

Book a 30-minute walkthrough. Tell us what you are running. We will scope the assignment template and rollout timeline.