Your Ultimate Guide to Brightside AI: Navigating the Platform That Trains and Protects Your Team
In the age of AI-powered cyber threats, organizations need more than outdated training videos and occasional phishing drills. They need real-time, data-driven tools that proactively help their employees identify, understand, and respond to modern digital threats like phishing, vishing, and deepfakes.
Brightside AI is built to deliver exactly that.
This guide walks you through the core features of the Brightside AI platform—designed not just to monitor your company’s cybersecurity readiness but to actively improve it through hyper-personalized simulations, real-world insights, and a user-friendly experience.
Let’s dive into the five main areas of the platform:
1. The Dashboard: Your Cybersecurity Command Center

The Dashboard is the beating heart of the Brightside AI platform. It's where you get instant, high-level visibility into your company's cybersecurity health and employee readiness.
Here’s what you’ll find:
Vulnerability Score
The vulnerability score is a central metric displayed prominently on the dashboard. It helps you track your organization’s overall cyber exposure and its change over time.
Definition: The vulnerability score is based on all your employee metrics, such as course completion, digital footprint size, and simulations results. It is measured on a scale from 0–100, where 0–25 is low, 25–50 is medium, 50–75 is high, and 75–100 is critical.
You can customize the score display based on a selected time frame—weekly, monthly, or yearly—making it easy to measure progress and spot negative trends before they escalate.
Simulation Status
This section summarizes recent simulations, including:
Whether phishing, vishing, or deepfake simulations were delivered
If they were opened, clicked, or responded to
Whether sensitive information was submitted
This live feedback loop helps you quickly understand how your employees are responding to training and what kind of threats are resonating with them.
Employee Exposure Overview
See a breakdown of the publicly available data found on your employees:
Emails
Locations
Dates of birth
IP addresses
Passwords
Phone numbers
This isn’t just a list—it’s actionable intelligence showing you how visible and vulnerable your people are on the open web.
Security Champions vs. Security Laggards
This comparison highlights:
Employees most likely to be targeted based on their data and behavior
Employees who consistently succeed in simulations and course completion
Each individual’s vulnerability score is displayed, making it easy to recognize top performers and those who may need additional training.
“Pay Attention” Section
Stay on top of training recommendations, new course releases, or urgent security tips. This section keeps cybersecurity awareness fresh and relevant.
2. Employees: Know Your People, Protect Your People
The Employees section provides a granular view of every individual in your organization. It’s your go-to space for tracking employee readiness, identifying high-risk users, and personalizing support.
Key Metrics Per Employee
Vulnerability Score
Number of simulations that caught the employee
Number of courses completed
Last activity and changes to their vulnerability score
Employee Profile View
Each employee has a detailed profile, including:
Email address and associated data points
List of vulnerabilities and exposure level
Courses completed or in progress
Specific simulations the employee interacted with (e.g., clicked a phishing link or responded to a deepfake request)
Group memberships such as “New Employees,” “Completed Training,” or “Critical Risk”
This visibility lets you tailor your training and communication strategies—focusing on the people who need it most.
3. Simulations: Test Reality Before Reality Tests You
The Simulations section allows you to review past training events and launch new, highly-targeted attack simulations based on real employee data.
Overview of Previous Simulations
For each campaign, you’ll see:
Date of launch
Audience size and profile
Type of simulation (phishing, vishing, or deepfake)
Percentage of users who were compromised
Specific actions users took (clicked, submitted data, reported it, etc.)
You’ll quickly identify which tactics were most effective at exposing vulnerabilities—and which employees are improving.
Create New Simulations
When you’re ready to launch a new attack simulation, you can choose between:
Phishing – Emails customized with OSINT data, mimicking real business communications.
Vishing – AI-generated phone calls using cloned voices and real context.
Deepfakes – Video messages that impersonate company leaders or colleagues with shocking accuracy.
All simulations are hyper-personalized, using publicly available personal data, like social media content, job titles, leaked credentials, and online presence to create realistic attack vectors. Learn more about types of simulations here.
You can set:
Custom audiences
Difficulty levels
Attack goals (e.g., click rate, submission, urgency response)
Each simulation helps your team build real-world reflexes—without the real-world consequences.

4. Courses: Build Knowledge, Build Defense
Education is just as important as testing. That’s why Brightside AI’s Courses hub helps you assign, monitor, and track cybersecurity training.
Course Library
Browse an expanding list of employee-ready training content covering topics like:
Phishing and spear phishing awareness
AI-generated threats
Password security
Social engineering
Identifying fake media
Each course is designed to be short, interactive, and engaging.
Assigned vs. Unassigned Courses
See which courses are currently deployed to your team—and who still needs to be enrolled.
Each course has:
Completion rates
Participation numbers
Integration with the vulnerability score
Progress is automatically tracked, and completion leads to real-time score improvement.
This section ensures that your security program is not only proactive—but accountable.
5. Profile Settings: Customize Brightside AI for Your Organization
Every organization is different. The Profile Settings section allows you to tailor Brightside AI to fit your structure, policies, and brand.
Workspace Configuration
Edit your organization name
Adjust time zone to align simulation schedules
Upload company logo
Set language and industry focus
Members & Access Control
Manage who has administrative access to the platform and their permission levels.
Domains & Whitelisting
Add your organization’s domains to ensure training simulations are properly configured and not blocked by internal filters.
Brightside AI is designed to be flexible—from small teams to global enterprises.
Final Thoughts: Why This Platform Matters
Modern cyberattacks are no longer brute-force—they're nuanced, intelligent, and personalized. Employees are not just targets; they are also the last line of defense.
Brightside AI offers a full-spectrum cybersecurity awareness system:
A powerful dashboard for visibility and control
Deep insights into employee readiness
Realistic simulations that reflect the evolving threat landscape
Interactive courses that build actual knowledge
Customizable settings to make it truly yours
This isn’t just about reducing click rates. It’s about creating a culture of security, powered by real-world data and AI.
If you’re ready to transform your team from vulnerable to vigilant, Brightside AI is the platform to do it.
Explore the features, try a simulation, assign your first course—and stay on the Brightside.
Visit brside.com or reach out to see Brightside AI in action today.
Subscribe to our newsletter to receive a quick overview of the latest news on human risk and the ever-changing landscape of phishing threats.