Security Awareness Training

    From insight to adaptive intervention

     What’s new for Human Risk Command Center and Security Behavior Management

    by Kurt Werner  

    Key Points

    • Mimecast's Human Risk Command Center now integrates with 17 tools across six security domains, pulling signals from platforms like CrowdStrike, Okta, and Netskope into a single view of human risk, eliminating the need to jump between siloed systems.
    • The new Watchlist Manager lets security teams create dynamic user groups that update hourly based on risk scores and behaviors, automatically adjusting security policies so controls always reflect current risk without manual intervention.
    • The Engage AI Phishing Template Generator allows teams to create realistic, customizable phishing templates in up to 27 languages using natural language prompts, keeping simulations relevant and closing the loop between risk detection, training, and behavior change.

    For years, “security awareness training” has been reduced to a check-the-box initiative—something organizations give employees rather than a program that targets risky behavior. And in the face of AI-powered threats, the lesson is clear: security teams need more than training in their toolkit. They need security behavior management—the ability to understand employee behavior, measure risk in real time, and adapt controls automatically.

    The real gap isn’t knowledge. It’s action—connecting real behaviors with real intervention.

    Security teams generally know who clicks simulated phishing links, mishandles sensitive files, or works in departments facing elevated risk. What they’ve lacked is a way to translate that insight into timely intervention across their existing tools. By the time manual workflows kick in, the risk has likely already materialized.

    With Mimecast’s March 2026 platform launch, that changes. This release brings together deeper integrations, real-time adaptive controls, and AI-powered training to operationalize security behavior management—enabling security programs that move at the speed of behavioral risk.

    Freedom of choice: one platform, 17 Integrations—making your entire security stack smarter

    Organizations are invested heavily in CrowdStrike, SentinelOne, Okta, Microsoft, Netskope, and countless other tools. But today, few teams find a way to make these tools actually work together

    That’s why we built the Mimecast Human Risk Command Center.

    The Human Risk Command Center now brings together 17 integrations across six security domains, transforming signals from your existing tools into a unified, contextualized view of human risk. More importantly, it enables you to take smarter, risk‑informed actions without needing to jockey between siloed systems.

    Integrations now include:

    • Phishing: Mimecast, Microsoft
    • Malware: CrowdStrike, SentinelOne, Sophos, Palo Alto, Microsoft
    • Identity: Duo, Okta, Microsoft
    • Sensitive data handling: Netskope, Mimecast, Microsoft
    • Phishing simulation: Mimecast, Microsoft
    • Training: Mimecast, Microsoft

    You probably don’t need more changes to your security stack; you need connectivity. Each integration enriches your human risk analysis—all in one place. Plus, setup takes just minutes.

    And with the new Human Risk Command Center Outbound API, you can automate programmatic access to human risk scores, behavior events, and trends, sending data directly into SIEM, SOAR, or custom dashboards. This is where the Human Risk Command Center really comes to life as a staging point for actioning behavior-based data. 

    Explore the full list of HRCC integrations → 

    Simplicity: automated adaptive security policies

    So, wondering how to turn human risk intelligence into adaptive controls?

    • Step one: identify your high-risk users
    • Step two: automatically adjust security controls based on risk

    Easier said than done, right? That’s where the Human Risk Command Center Watchlist Manager comes in.

    Watchlist Manager enables administrators to create dynamic, rule-based user groups that update in real-time based on risk scores, behaviors, and user attributes. Each Watchlist is automatically synced with a Profile Group, making it immediately actionable across Mimecast’s platform or third-party integrations via the Profile Group API.

    This eliminates manual group management and frees security teams to focus on adaptive risk mitigation. 

    Some real-world examples of what customers are already building:

    • Data exfiltration prevention: Users with high human risk scores, sensitive data handling activity, and overdue training are automatically routed into stricter controls—BCC’ing outbound emails to the SOC, blocking encrypted files, or holding sensitive document types.
    • BEC and phishing protection for finance: Finance users with high Attack Factor scores and repeat simulated phishing clicks receive elevated inbound protections, including prominent external email banners and more aggressive BEC defense.
    • Security champions: Low‑risk users who complete training and report simulated phishing are rewarded with a streamlined experience—fewer training assignments, less friction.

    Watchlist memberships update continuously—every hour—ensuring policies always reflect current behavior. No more stale groups or misapplied policies. This is security that moves at the speed of risk.

    Read the full Watchlist Manager blog →

    Efficacy: AI-powered phishing templates

    The effectiveness of phishing simulations depends on one thing: do simulations actually reflect the real world? If your templates look outdated or generic (was COVID six years ago, already?), employees quickly learn to spot them—but not for the right reasons. 

    That’s why the new Mimecast Engage AI Phishing Template Generator is a long-awaited game changer for security awareness.

    Security teams can now generate realistic, customizable phishing templates in up to 27 languages through natural language prompts. Specify the attack vector, scenario, industry, and difficulty level—and the system generates at least three unique, fully editable templates complete with branding, imagery, and landing pages. 

    With AI-powered template creation, security teams save time and ensure training remains relevant and impactful in the face of evolving threats. No more design and development bottlenecks. More frequent, more realistic simulations keep pace with real threats and produce more meaningful learning moments.

    When combined with the Watchlist Manager’s ability to automatically assign more targeted training to higher-risk users, you have a closed loop: risk informs training, training changes behavior, behavior updates risk scores, and the cycle repeats continuously.

    The bigger picture

    Each of these capabilities—the 17 integrations, the Watchlist Manager, the AI Phishing Template Generator—is powerful on its own. But together, they mark a meaningful shift: security behavior management is no longer about awareness or isolated metrics. It’s about closing the loop between insight and intervention.

    That is the core of Mimecast’s March 2026 platform launch. We’re building an ecosystem where:

    • risk signals are connected
    • controls are adaptive
    • workflows are automated
    • and behavior change is measurable

    This is the future of human-centric security—a platform where intelligence, automation, and intervention work as one continuous system.

    Mimecast HRCC and Engage now deliver a fully integrated, adaptive security behavior management platform—one that evolves with your organization and responds to risk in real time.

    Read the full March 2026 launch announcement → | Explore all launch details on the Mimecast Community →

    Subscribe to Cyber Resilience Insights for more articles like these

    Get all the latest news and cybersecurity industry analysis delivered right to your inbox

    Sign up successful

    Thank you for signing up to receive updates from our blog

    We will be in touch!

    Ready to secure the human layer? REQUEST A DEMO
    Back to Top