Sushma V
Sushma V
"Transforming learning experiences through innovation, interactivity, and instructional excellence."
In today’s high-risk digital landscape, employee negligence remains the top cause of cybersecurity breaches. Traditional compliance trainings often fail to drive retention or behavior change, leading to:
Increased vulnerability to phishing, malware, and data breaches
Costly remediation efforts and legal liabilities
Low learner engagement and poor completion rates
This project addressed a critical business risk by reimagining cybersecurity awareness as a gamified, scenario-driven learning experience — built to improve compliance, increase threat detection accuracy, and foster a proactive security culture.
This module was designed for employees of a large IT organization, including both technical and non-technical staff, to raise awareness of cybersecurity best practices and ensure compliance with organizational security protocols.
I developed a gamified micro-learning program focused on cybersecurity awareness, targeting employees across departments. The program was designed to:
Increase engagement and completion through interactive gameplay
Simulate real-world cyber risks using branching decision paths
Reinforce correct behaviors through immediate feedback and score tracking
The result: a scalable training asset that doesn’t just inform — it transforms behavior at scale.
For this cybersecurity module, the primary goal was to move beyond passive awareness training and instead create an engaging, high-impact learning experience that resonates with employees at all levels of a large IT organization.
Given the critical nature of cybersecurity—and the fact that many breaches occur due to human error—I designed the course to be practical, relatable, and immersive, focusing on real-world consequences and proactive behavior.
Why real scenarios?
I included realistic workplace scenarios to help learners connect abstract security protocols to everyday actions—such as handling suspicious emails, managing passwords, and securing personal devices in remote work environments. This helped bridge the gap between policy and practice.
Why gamification?
To drive engagement and knowledge retention, I incorporated gamified elements like points, badges, and decision-based challenges. These elements encouraged active participation while reinforcing the importance of correct cyber hygiene behaviors.
Why case studies?
Real-world breach case studies were added to show the tangible impact of cybersecurity failures—from global incidents to industry-specific breaches. This not only added credibility but also created a sense of urgency and accountability among learners.
Tone and Structure
The module was carefully structured to maintain a balance between urgency and approachability—ensuring that learners understood the risks without feeling overwhelmed or blamed. Visual cues, micro-assessments, and instant feedback helped maintain flow and focus throughout the course
Stakeholder Consultation & Risk Alignment
Partnered with cybersecurity SMEs, IT, and compliance teams to identify critical threat vectors and align content with corporate risk mitigation goals and data protection policies.
Learning Objectives Mapping
Translated cybersecurity risks into actionable learning outcomes, ensuring every module addressed a measurable employee behavior (e.g., email scrutiny, password hygiene, remote access protocols).
Instructional Storyboarding & Scriptwriting
Designed interactive storyboards with real-world incident simulations. Each path included varied learner decisions, feedback loops, and behavior modeling aligned with adult learning theory.
Agile Development Sprints
Followed a sprint-based approach using rapid prototyping in Articulate Storyline 360. Each sprint was reviewed by stakeholders for alignment, tone, and technical accuracy.
Audio & Visual Production
Created voice-overs, animations, and sound effects using Camtasia and Audacity to enhance realism and emotional impact.
User Testing & QA
Conducted alpha testing with internal employees across departments. Collected usability feedback, monitored engagement metrics, and made refinements in beta.
LMS Deployment & Analytics Setup
Published SCORM packages to Talent LMS with role-based access and automated reporting. Configured dashboards to track module-wise completion, quiz performance, and behavioral risk flags.
Articulate Storyline 360 – For building branching scenarios, interactive challenges, and scoreboards
Talent LMS – For deployment, learner segmentation, progress tracking, and analytics dashboards
Camtasia & Audacity – For video walkthroughs, audio narration, and sound design
SCORM/xAPI Compliant – Ensuring seamless LMS integration and advanced reporting
Threat Simulation Engine – Learners navigate phishing attacks, suspicious links, and data handling protocols
Gamified Assessment – Points awarded for safe behavior and fast decision-making
Branching Logic – Every learner choice leads to different outcomes, reinforcing critical thinking
Performance Feedback – Real-time alerts and dashboards to show learning progress and risks
Micro Modules – Each lesson delivers 1 key behavior in under 5 minutes, reducing cognitive overload
85% Increase in Course Completion Rates compared to previous compliance modules
Reduction in Risky Email Clicks (measured via post-training phishing simulations)
Decrease in Repeat Offenders – Fewer employees flagged for repeated non-compliance behaviors
Stronger Cross-Functional Engagement – Even non-tech teams became active participants in cyber hygiene
This project repositioned cybersecurity training from a check-the-box compliance task to a behavioral change engine. It helped build:
A security-first mindset across departments
A culture of accountability for digital safety
A measurable reduction in insider threats and preventable breaches
A scalable solution that aligns with ISO and internal audit protocols
Have a project or want to collaborate?
Let’s connect!