Chat-bot courses that keep your team engaged

Try our free demo—no card required.

Your Ultimate Guide to Brightside AI: Navigating the Platform That Trains and Protects Your Team

In the age of AI-powered cyber threats, organizations need more than outdated training videos and occasional phishing drills. They need real-time, data-driven tools that proactively help their employees identify, understand, and respond to modern digital threats like phishing, vishing, and deepfakes.

Brightside AI is built to deliver exactly that.

This guide walks you through the core features of the Brightside AI platform—designed not just to monitor your company’s cybersecurity readiness but to actively improve it through hyper-personalized simulations, real-world insights, and a user-friendly experience.

Let’s dive into the five main areas of the platform:

1. The Dashboard: Your Cybersecurity Command Center

Screenshot of the Brightside AI platform dashboard showing a vulnerability score of 31 (medium risk) with no recent simulation activity. Below, a general overview displays zero personal data exposures such as emails, locations, or passwords.

The Dashboard is the beating heart of the Brightside AI platform. It's where you get instant, high-level visibility into your company's cybersecurity health and employee readiness.

Here’s what you’ll find:

Vulnerability Score

The vulnerability score is a central metric displayed prominently on the dashboard. It helps you track your organization’s overall cyber exposure and its change over time.

Definition: The vulnerability score is based on all your employee metrics, such as course completion, digital footprint size, and simulations results. It is measured on a scale from 0–100, where 0–25 is low, 25–50 is medium, 50–75 is high, and 75–100 is critical.

You can customize the score display based on a selected time frame—weekly, monthly, or yearly—making it easy to measure progress and spot negative trends before they escalate.

Simulation Status

This section summarizes recent simulations, including:

  • Whether phishing, vishing, or deepfake simulations were delivered

  • If they were opened, clicked, or responded to

  • Whether sensitive information was submitted

This live feedback loop helps you quickly understand how your employees are responding to training and what kind of threats are resonating with them.

Employee Exposure Overview

See a breakdown of the publicly available data found on your employees:

  • Emails

  • Locations

  • Dates of birth

  • IP addresses

  • Passwords

  • Phone numbers

This isn’t just a list—it’s actionable intelligence showing you how visible and vulnerable your people are on the open web.

Security Champions vs. Security Laggards

This comparison highlights:

  • Employees most likely to be targeted based on their data and behavior

  • Employees who consistently succeed in simulations and course completion

Each individual’s vulnerability score is displayed, making it easy to recognize top performers and those who may need additional training.

“Pay Attention” Section

Stay on top of training recommendations, new course releases, or urgent security tips. This section keeps cybersecurity awareness fresh and relevant.

2. Employees: Know Your People, Protect Your People

The Employees section provides a granular view of every individual in your organization. It’s your go-to space for tracking employee readiness, identifying high-risk users, and personalizing support.

Key Metrics Per Employee

  • Vulnerability Score

  • Number of simulations that caught the employee

  • Number of courses completed

  • Last activity and changes to their vulnerability score

Employee Profile View

Each employee has a detailed profile, including:

  • Email address and associated data points

  • List of vulnerabilities and exposure level

  • Courses completed or in progress

  • Specific simulations the employee interacted with (e.g., clicked a phishing link or responded to a deepfake request)

  • Group memberships such as “New Employees,” “Completed Training,” or “Critical Risk”

This visibility lets you tailor your training and communication strategies—focusing on the people who need it most.

3. Simulations: Test Reality Before Reality Tests You

The Simulations section allows you to review past training events and launch new, highly-targeted attack simulations based on real employee data.

Overview of Previous Simulations

For each campaign, you’ll see:

  • Date of launch

  • Audience size and profile

  • Type of simulation (phishing, vishing, or deepfake)

  • Percentage of users who were compromised

  • Specific actions users took (clicked, submitted data, reported it, etc.)

You’ll quickly identify which tactics were most effective at exposing vulnerabilities—and which employees are improving.

Create New Simulations

When you’re ready to launch a new attack simulation, you can choose between:

  • Phishing – Emails customized with OSINT data, mimicking real business communications.

  • Vishing – AI-generated phone calls using cloned voices and real context.

  • Deepfakes – Video messages that impersonate company leaders or colleagues with shocking accuracy.

All simulations are hyper-personalized, using publicly available personal data, like social media content, job titles, leaked credentials, and online presence to create realistic attack vectors. Learn more about types of simulations here.

You can set:

  • Custom audiences

  • Difficulty levels

  • Attack goals (e.g., click rate, submission, urgency response)

Each simulation helps your team build real-world reflexes—without the real-world consequences.

Screenshot of the Brightside AI simulation setup interface. It displays three types of AI-powered simulations—Phishing, Deepfake, and Vishing—with phishing selected. Below are premade phishing templates mimicking real services like Adobe and Dropbox.

4. Courses: Build Knowledge, Build Defense

Education is just as important as testing. That’s why Brightside AI’s Courses hub helps you assign, monitor, and track cybersecurity training.

Course Library

Browse an expanding list of employee-ready training content covering topics like:

  • Phishing and spear phishing awareness

  • AI-generated threats

  • Password security

  • Social engineering

  • Identifying fake media

Each course is designed to be short, interactive, and engaging.

Assigned vs. Unassigned Courses

See which courses are currently deployed to your team—and who still needs to be enrolled.

Each course has:

  • Completion rates

  • Participation numbers

  • Integration with the vulnerability score

Progress is automatically tracked, and completion leads to real-time score improvement.

This section ensures that your security program is not only proactive—but accountable.

5. Profile Settings: Customize Brightside AI for Your Organization

Every organization is different. The Profile Settings section allows you to tailor Brightside AI to fit your structure, policies, and brand.

Workspace Configuration

  • Edit your organization name

  • Adjust time zone to align simulation schedules

  • Upload company logo

  • Set language and industry focus

Members & Access Control

Manage who has administrative access to the platform and their permission levels.

Domains & Whitelisting

Add your organization’s domains to ensure training simulations are properly configured and not blocked by internal filters.

Brightside AI is designed to be flexible—from small teams to global enterprises.

Personalized simulations
for effective employee training

Personalized simulations
for effective employee training

Brightside’s personalized simulations and courses improve cybersecurity training—start your free demo, no card required.

Brightside’s personalized and courses improve cybersecurity training—start your free demo, no card required.

Final Thoughts: Why This Platform Matters

Modern cyberattacks are no longer brute-force—they're nuanced, intelligent, and personalized. Employees are not just targets; they are also the last line of defense.

Brightside AI offers a full-spectrum cybersecurity awareness system:

  • A powerful dashboard for visibility and control

  • Deep insights into employee readiness

  • Realistic simulations that reflect the evolving threat landscape

  • Interactive courses that build actual knowledge

  • Customizable settings to make it truly yours

This isn’t just about reducing click rates. It’s about creating a culture of security, powered by real-world data and AI.

If you’re ready to transform your team from vulnerable to vigilant, Brightside AI is the platform to do it.

Explore the features, try a simulation, assign your first course—and stay on the Brightside.

Visit brside.com or reach out to see Brightside AI in action today.

Subscribe to the newsletter “All about human risks”

Subscribe to the newsletter “All about human risks”

Subscribe to our newsletter to receive a quick overview of the latest news on human risk and the ever-changing landscape of phishing threats.