LimitedView
Research17 April 20266 min read

How Quickly Does Security Training Fade? What the Retention Curve Tells Us About Programme Design

Security knowledge decays faster than most training programmes account for, and the timing of reinforcement matters more than the volume of content delivered.

How quickly does security training knowledge actually fade?

Security training knowledge fades quickly. Measurable retention drops sharply within two to four weeks of delivery, and by 90 days the majority of employees retain less than 20% of what they were taught in a standard compliance training session. This is not a failure of motivation or attention. It is a predictable consequence of how human memory consolidates information.

The decay curve is not new science. The forgetting curve was documented in the 1880s, and the pattern has been replicated consistently across educational and clinical research ever since. What is less well understood inside security functions is how steep it is for content delivered in a single block, without context, and without reinforcement that connects it to the employee's day-to-day experience. Annual security training sessions are almost perfectly designed to maximise forgetting.

LimitedView's research across 847 organisations, covering 650,000 employees, puts numbers on this. At 90 days after standard annual training, measurable knowledge retention sits at 12%. At 90 days after incident-triggered training, that figure is 73%. The content is not the differentiating variable. The timing and context are.

Why does the format of training affect how long knowledge lasts?

Memories consolidate through repetition and emotional salience. A 45-minute module completed on a laptop, with a multiple-choice quiz at the end, generates neither in any lasting way. The employee passes the quiz because the answers are proximate in time to the content. They are tested before forgetting has had the chance to do its work. The organisation ticks a compliance box. The knowledge disappears.

Contrast this with training delivered immediately after a phishing email is reported internally, or within 48 hours of a ransomware incident affecting a peer organisation in the same sector. The emotional context is different. The employee is already alert, already asking questions, already associating the content with something that feels real and proximate. That association is what consolidation requires. It is why LimitedView's data shows a 6x behaviour change effect for incident-triggered training compared to scheduled compliance delivery.

The spacing effect compounds this. Training delivered in multiple shorter sessions, distributed over time, produces stronger retention than equivalent content delivered in a single block. This is well evidenced in cognitive science. It is also consistently ignored by security awareness programmes that prioritise delivery efficiency over retention outcomes. Efficiency in delivery is not the same as efficiency in risk reduction.

What does poor retention actually cost an organisation?

It costs repeat incidents. LimitedView's analysis shows a 64% reduction in repeat incidents among organisations using incident-triggered training compared to those relying on annual programmes. When the same incident type recurs within 12 months, a credential phishing attack, a misconfigured file share, a social engineering attempt targeting a new employee, the training programme has not produced durable behaviour change. It has produced a completed record.

The cost is not only in breach recovery. It is in the credibility of the security function. When CISOs cannot demonstrate that training investment has changed behaviour rather than simply satisfied compliance requirements, the programme becomes a cost centre. Budget conversations become harder. The function loses the evidence base it needs to justify its existence as a risk reduction mechanism rather than an administrative overhead.

There is also a cumulative exposure problem. If employees forget 80% of what they learned within 90 days, they spend most of the year operating at a knowledge level that does not reflect current threats. The training calendar creates a brief window of elevated awareness followed by a prolonged period of decay. Attackers do not observe the same calendar.

How should organisations structure training to work with the retention curve rather than against it?

Training should follow events, not calendars. The strongest predictor of retention is temporal proximity to a relevant incident or threat event. This does not require waiting for a breach. Threat intelligence feeds, sector-specific incident reports, and internal near-misses all provide triggers that can be used to time targeted training to moments when employees are already engaged.

Reinforcement intervals matter. Content introduced at the point of a trigger should be revisited at two weeks, six weeks, and three months. These are the intervals at which the forgetting curve reaches its steepest decline, and where a brief reinforcement message, a short exercise, or a targeted reminder does the most work. The reinforcement does not need to be long. Five minutes of well-timed recall practice outperforms a fresh 45-minute module delivered a year later.

Role specificity also improves retention. Employees remember content that maps to their actual work. A finance team member will retain more from a session using realistic payment fraud scenarios than from a generic module about password hygiene. This seems obvious. Most training programmes do not reflect it.

The retention curve is not a problem that better content solves. It is a scheduling and context problem. Organisations that treat training as continuous infrastructure, tied to the actual threat environment their employees face, consistently outperform those that treat it as an annual compliance requirement. The difference shows up in incident rates, not completion metrics.

More Insights

Incident Analysis

Business Email Compromise: What a Successful Attack Reveals About Training Failure

17 April 2026Read →
Industry

Legal Sector Cybersecurity Training: Why Law Firms Face a Different Threat Profile Than Their Clients

17 April 2026Read →
AI Governance

AI Data Sovereignty: Managing Jurisdictional Risk When Models Process Sensitive Data

16 April 2026Read →

Ready to Move from 12% to 73%?

See how incident-triggered training delivers measurable behaviour change — not compliance theatre.