Skip to main content
This guide walks you through the complete setup process for your organization on the Living Security Platform. By the end, you’ll have a fully configured Human Risk Management environment ready to provide actionable insights.

Overview

Onboarding typically involves:
  1. Initial platform access and authentication
  2. Organization setup and preferences
  3. Data source integrations
  4. Workforce data import
  5. Platform configuration
  6. First insights and actions
Livvy, your AI assistant, will guide you through many of these steps when you first access the platform. She can answer questions and help configure settings along the way.

Prerequisites

Before you begin, ensure you have:
  • Admin access to your organization’s Living Security tenant
  • Credentials for data sources you plan to integrate (HR systems, identity providers, etc.)
  • Understanding of your organization’s structure (departments, locations)
  • List of key stakeholders who may need platform access

Step 1: Initial Access

When you first access the platform, you’ll be guided through an initial setup wizard:
1

Authenticate

Log in using your organization’s SSO provider or the credentials provided during account creation.
2

Meet Livvy

Livvy will introduce herself and ask a few questions about your organization and goals. This helps her personalize recommendations.
3

Set Preferences

Configure your language, time zone, and notification preferences. These can be changed later in Settings.

Step 2: Configure Integrations

Integrations bring data into the platform to power your Human Risk Index and insights. The more data sources you connect, the more comprehensive your risk picture becomes.

Required Integrations

At minimum, you’ll need:
  • Identity Provider - User authentication and basic attributes
  • HR System - Org structure, departments, job titles
For comprehensive HRM, consider:
  • Security Tools - SIEM, DLP, endpoint protection for threat signals
  • Communication Platforms - Slack, Microsoft Teams for nudge delivery
  • Email - For training assignments and notifications

Setting Up Integrations

Detailed guide to connecting your first integration.

Integration Steps

1

Navigate to Settings

Go to SettingsIntegrations in the main navigation.
2

Select Integration Type

Browse available integrations by category (HR, Identity, Security, Communication).
3

Enter Credentials

Provide the required API keys, OAuth credentials, or configuration details.
4

Test Connection

Verify the integration is working and data is flowing correctly.
5

Review Data Mapping

Check that fields are mapped correctly to platform attributes. Adjust if needed.
If you need someone else to complete an integration setup (like an IT admin), you can invite them via SettingsUser Management.

Step 3: Import Workforce Data

Once integrations are connected, your workforce data will begin flowing into the platform:
  • People - Individual user records with attributes
  • Org Structure - Departments, teams, reporting relationships
  • Access Levels - Roles and permissions from identity providers

Migrating from Unify

If you’re an existing Living Security Unify customer:

Migration Guide

Step-by-step guide to migrating your data from Unify to the new platform.
Your historical data can be imported to maintain trend analysis and reporting continuity.

Step 4: Configure Platform Settings

With data flowing, configure additional settings to match your organization’s needs:

Policies

Set up messaging policies that control how and when communications are sent:
  • Quiet hours
  • Frequency caps
  • Channel preferences

Policy Configuration

Learn about policy options and configuration.

Branding

Customize the platform and communications with your organization’s branding:
  • Logo and colors
  • Email templates
  • Training content styling

User Access

Configure who can access the platform and what they can do:
  • Admin roles
  • Viewer permissions
  • SCIM provisioning

User Management

Manage user access and permissions.

Step 5: Review Your First Insights

Once data is flowing (typically within 24-48 hours), you’ll start seeing:

Dashboard Insights

  • HRI Score - Your organization’s overall risk score
  • Cohort Breakdown - Risk distribution across departments and locations
  • Initial Recommendations - Suggested actions based on your data

Ask Livvy

Try asking Livvy:
  • “What’s my organization’s biggest risk area?”
  • “Which department needs the most attention?”
  • “What should I focus on first?”

Getting Insights from Livvy

Learn how to ask Livvy about your organization’s risk patterns.

Step 6: Create Your First Action

Now that you understand your risk posture, take action:
Let your workforce know about the new security program. Livvy can help you draft the message.
Deploy baseline training to establish a foundation of security awareness.
Test your organization’s susceptibility to phishing with a simulated campaign.
Enable transparency by letting employees see their own security posture.

Creating Your First Campaign

Step-by-step guide to launching your first security campaign.

Onboarding Checklist

Track your progress through onboarding:
  • Initial access and authentication configured
  • Preferences set (language, time zone, notifications)
  • Identity provider connected
  • HR system integrated
  • Workforce data imported
  • Policies configured
  • Branding customized
  • User access set up
  • First insights reviewed
  • First action created

Getting Help

If you need assistance during onboarding:
Our Customer Success team is available to help you through onboarding and ensure you’re getting value from the platform quickly.

Next Steps

Quick Start Guide

Quick reference for platform navigation and features.

Introduction to Livvy

Learn how to leverage AI throughout your HRM program.

Creating Campaigns

Launch your first security awareness campaign.

Understanding Cohorts

Segment your workforce for targeted interventions.