Solutions

Cybersecurity Training That Actually Works: Metrics and Models

June 25, 2025

Discover how to design cybersecurity awareness training that changes behaviour, and learn which metrics prove its impact to executives.

Security awareness training has a mixed reputation. Many employees see it as a compliance checkbox, while security teams struggle to prove its value. At the same time, reports consistently show the “human element” remains a major factor in breaches, with misdelivery, phishing and social engineering contributing to a large share of incidents.

Done well, cybersecurity training can measurably reduce phishing click rates, improve incident reporting and strengthen overall security culture. Done poorly, it becomes noise that users learn to ignore. This article focuses on the practical models and metrics that separate impactful programmes from ineffective ones.

Why traditional training fails

Several common patterns explain why many awareness programmes underperform:

  • One-size-fits-all content – Highly technical modules are pushed to all staff, regardless of role or risk profile.
  • Infrequent, lengthy sessions – Annual or quarterly e-learning marathons overwhelm users and are quickly forgotten.
  • No link to real incidents – Training is detached from the threats users actually see in their inboxes or systems.
  • Lack of measurement – Organisations track completion rates but not behavioural change.

Research into personalised phishing training has shown that tailoring training to users’ existing detection skills and knowledge significantly increases effectiveness compared to generic modules.

What effective cybersecurity training looks like

Modern, effective programmes share several characteristics:

  • Risk-based and role-specific: Content is aligned with actual risks faced by different roles: finance staff, developers, executives, OT engineers and so on.
  • Continuous and bite-sized: Training is delivered in small chunks throughout the year, often integrated into real workflows (for example, embedded micro-lessons in simulated phishing emails).
  • Reinforced by culture and leadership: Managers talk about security, act as role models and encourage reporting without blame.
  • Measurable – Programmes track not just participation, but how user behaviour changes over time.

KnowBe4’s 2025 Phishing by Industry Benchmarking Report, for example, shows that organisations that run sustained training and phishing simulations over 12 months can reduce average phishing click rates by up to 86 percent.

Models for structuring effective training

Two useful frameworks can be adapted to cybersecurity awareness: the Kirkpatrick model and a “human risk management” view.

1. Kirkpatrick model for security training

The Kirkpatrick model evaluates training at four levels:

  1. Reaction – Did participants find the training relevant and engaging?
  2. Learning – Did they acquire knowledge or skills (for example, how to spot a phishing email)?
  3. Behaviour – Are they applying what they learned in daily work?
  4. Results – Has the training contributed to measurable security improvements?

In a security context:

  • Reaction can be gathered via short surveys after modules.
  • Learning can be measured with quizzes or short scenario-based questions.
  • Behaviour is reflected in phishing simulation results, real incident reports and password hygiene.
  • Results are captured in metrics such as reduced successful phishing incidents or fewer high-risk policy violations.

2. Human risk management model

A complementary approach is to treat users as another type of “control surface” with measurable risk levels.

Key elements include:

  • Segmentation of user groups by role, access level and historical performance (for example, frequent clickers vs. champions).
  • Targeted interventions such as extra coaching for high-risk users or advanced scenarios for power users.
  • Feedback loops where real incident patterns inform upcoming training topics.

Vendors and consultancies increasingly promote this model, supported by research showing that personalised and adaptive training yields better long-term results than uniform content.

Metrics that matter: proving ROI of training

Executives care about outcomes, not just activities. The following metrics are useful for demonstrating the impact of awareness initiatives:

  • Phishing simulation click rate
    • Baseline: percentage of users who click on simulated phishing links before training.
    • Ongoing: trend over time after regular simulations and training.
  • Report rate for real and simulated threats
    • Measure how many users report suspicious emails or activity via the correct channels. Hoxhunt’s phishing trends report notes increasing reporting rates among users who have trained for more than a year, underscoring the value of continued engagement.
  • Time-to-report
    • Track how quickly suspicious messages are reported after delivery. Faster reporting shortens dwell time and limits damage.
  • Incident statistics linked to human error
    • Monitor trends in incidents attributed to misdelivery, misconfiguration, or unsafe browsing, ideally showing a downward trend as training matures.
  • Password and MFA adoption metrics
    • Measure adoption of password managers, unique passwords and MFA usage for critical applications.

External studies on breach costs can help translate these improvements into financial terms. IBM’s Cost of a Data Breach report, for instance, provides global average breach costs that can be used in high-level ROI models to show how even modest reductions in incident likelihood can justify training investments.

Designing a training programme that fits your organisation

To make training work in practice, consider the following design principles:

  1. Anchor training in real threats to your organisation
    • Use anonymised examples of real phishing attempts, fraud attempts or misconfigurations observed in your environment.
    • Align topics with current campaigns (for example, tax scams, romance scams, AI-generated phishing), and point users to additional resources such as DACTA’s reports on AI-enabled threats and online fraud.Dacta Global+1
  2. Blend formats for different learning styles
    • Short videos or micro-lessons for general staff
    • In-depth workshops for high-risk teams (finance, executive assistants, administrators)
    • Tabletop exercises for leadership, focused on incident response and decision-making
  3. Make reporting easy and safe
    • Provide a one-click “Report Phish” button in email clients.
    • Reinforce that reporting a suspicious email, even after clicking, is positive behaviour.
    • Publicly recognise teams that show strong reporting culture.
  4. Integrate training with technical controls
    • Use simulated phishing in combination with email security tools to reflect realistic conditions.
    • Align training topics with new security rollouts (for example, when introducing MFA, explain why and how it protects against account takeover).

How DACTA Global supports effective training programmes

DACTA Global often works with organisations that have existing learning platforms but lack time or expertise to design security-specific content and metrics. Typical support includes:

  • Mapping awareness topics to the organisation’s risk register and incident history
  • Designing role-based curricula and campaign calendars, aligned with events such as Cybersecurity Awareness Month
  • Integrating awareness initiatives with technical services such as Managed Detection & Response and Incident Response, so user reports flow directly into monitoring workflows
  • Helping security leaders define and track the metrics discussed above, and packaging them into executive-ready dashboards

Conclusion: security training as a strategic control, not a checkbox

The evidence is clear: when done well, cybersecurity training can significantly reduce phishing susceptibility and improve early detection of threats. When treated as an annual formality, it delivers little more than frustration and checkbox compliance.

By adopting proven models like Kirkpatrick and human risk management, focusing on risk-based and personalised content, and tracking metrics that show behavioural change, organisations can transform security awareness from a cost centre into a measurable control. With the right combination of internal champions and external partners such as DACTA Global, training can become a powerful layer in your overall cybersecurity strategy, rather than an afterthought.

Under attack or experiencing a security incident?

If you're experiencing an active security incident and need immediate assistance, contact the DACTA Incident Response Team (IRT) at support@dactaglobal.com.

You might also be interested in