2026-05-24·5 min read·sota.io Team

EU Security Awareness Training Comparison Finale 2026: KnowBe4 vs Cofense vs SANS vs Terranova

Post #1272 in the sota.io EU Cyber Compliance Series

EU Security Awareness Training Comparison Finale 2026

Security awareness training platforms sit at the most sensitive intersection of any EU organisation's data landscape: they store employee behavioural profiles, track who clicks phishing links, and map organisational vulnerability patterns over time. When those platforms are incorporated in Delaware under US law — and subject to the CLOUD Act — every drill you run becomes a potential intelligence asset for US government requests.

This finale compares all four vendors in the EU Security Awareness Training Series under a unified five-dimension CLOUD Act exposure framework, maps the regulatory exposure under GDPR Articles 28, 44–49, NIS2, and DORA, and presents three EU-native vendors with zero US jurisdiction risk.


The EU-SAT Compliance Problem

Security awareness training generates data that is fundamentally different from other SaaS categories:

Under GDPR Article 88 and national employment laws (§ 26 BDSG in Germany, equivalent provisions in France, Netherlands), this data is subject to works council consultation requirements and cannot be transferred to third-country processors without explicit Article 46 safeguards. When the processor itself is subject to US CLOUD Act jurisdiction, those safeguards become structurally unenforceable.

NIS2 Article 21(2)(d) mandates supply chain security and human resources security training for all essential and important entities. The regulation requires training, but never anticipated that training delivery platforms would create their own CLOUD Act supply chain risk.


CLOUD Act Exposure Matrix — All Four Vendors

DimensionKnowBe4CofenseSANSTerranova
D1: Corporate Jurisdiction4/55/54/54/5
D2: Intelligence Partnerships3/54/55/54/5
D3: Data Sensitivity3/54/53/55/5
D4: Infrastructure4/54/54/53/5
D5: Mitigation Measures3/52/52/52/5
Total CLOUD Act Score17/2519/2518/2518/25
EU-native AlternativeSoSafeHoxhuntPhished

Higher score = higher CLOUD Act risk. EU-native vendors: 0/25.


Vendor Analysis

KnowBe4 — 17/25

Corporate Structure: Wilmington, Delaware C-Corp. Owned by Vista Equity Partners (Austin TX, PE firm managing $100B+ AUM, portfolio of 85+ software companies). NASDAQ-listed until 2023 take-private by Vista.

D1 (4/5): Delaware incorporation gives US federal courts jurisdiction over company records. Vista Equity's PE structure adds a second layer: fund-level CLOUD Act requests can reach portfolio company data.

D2 (3/5): KnowBe4 maintains partnerships with FBI IC3 and CISA for threat intelligence but lacks direct NSA/DoD affiliation. Lower intelligence partnership risk relative to SANS and Cofense.

D3 (3/5): Phishing simulation results, training completion rates, and department-level vulnerability scores are collected. The data is sensitive but does not include the cross-organisation benchmarks or government-partnership datasets that elevate Cofense and SANS.

D4 (4/5): Primary infrastructure on AWS US-EAST with EU regions available (Frankfurt). EU data residency is an option but not the default.

D5 (3/5): KnowBe4 offers DPA templates, EU SCCs, and EU hosting options — marginally better mitigation than the other three vendors. The Vista PE ownership layer is not addressed in standard DPAs.

Key Risk — NIS2 Training Paradox: NIS2 Article 21(2)(d) requires cybersecurity training for essential entities. KnowBe4 is the dominant training platform for EU NIS2 compliance programmes — meaning the very tool used to demonstrate NIS2 compliance creates its own CLOUD Act supply chain risk under NIS2 Article 21(2)(d). Training providers are supply chain vendors; their US CLOUD Act exposure is a NIS2 Article 21 supply chain risk item.

Key Risk — DSGVO § 26 Betriebsrat Paradox: German data protection law (§ 26 BDSG) requires works council consultation for employee monitoring. Phishing simulation data — tracking who clicked — qualifies as employee monitoring data. US CLOUD Act requests for phishing click data bypass the Betriebsrat consultation requirement entirely, since US law does not recognise German codetermination rights.


Cofense — 19/25 (Highest Score in SAT Series)

Corporate Structure: Leesburg, Virginia, Delaware C-Corp. Owned by Pamplona Capital Management (London-registered but US-focused PE) and Veritas Capital (Arlington, Virginia — specialises in government/defence technology). Co-CEO leadership with ex-DoD background.

D1 (5/5): Delaware C-Corp (highest D1). Veritas Capital's explicit government/defence technology focus creates an unusually direct link between the PE ownership structure and US national security interests. Most PE-owned tech companies are indirectly risk; Veritas is structurally aligned with US government procurement.

D2 (4/5): Cofense's PhishMe heritage (rebranded 2018) includes FBI and DoD phishing awareness partnerships. The company maintains active partnerships with federal agencies for threat intelligence sharing, including through the Anti-Phishing Working Group (APWG).

D3 (4/5): Cofense processes phishing simulation click data, reporter analytics (who uses Cofense Reporter add-in and when), and real-incident response data from email security integrations. The reporter analytics create a secondary behavioural dataset: employees who do not use the reporter button become visible through absence patterns.

D4 (4/5): US-primary infrastructure. EU data residency options exist but are marketed primarily to US federal customers under FedRAMP requirements, not EU GDPR customers.

D5 (2/5): Weakest mitigation profile in the series. Cofense's DPA documentation does not adequately address the Veritas Capital ownership layer, and EU customers have limited leverage to negotiate PE-related CLOUD Act provisions.

Key Risk — Veritas Capital Ownership Paradox: Veritas Capital describes itself as investing in companies providing "mission-critical" services to US government agencies. A CLOUD Act request targeting Veritas Capital portfolio companies is legally plausible under 18 U.S.C. § 2703. EU organisations running phishing simulations through Cofense are, structurally, running simulations through a US defence-adjacent PE portfolio — with no adequate information disclosure to EU data subjects or works councils.

Key Risk — Reporter Analytics Cross-Organisation Aggregation: Cofense's reporter analytics aggregate behavioural data across customer organisations in the same threat intelligence feeds. A CLOUD Act request for Cofense's threat intelligence database could yield cross-organisation EU employee data as a side effect, without targeting any individual EU customer specifically.


SANS Institute — 18/25

Corporate Structure: Bethesda, Maryland, incorporated as a Delaware non-profit (501(c)(3)). Governance includes significant NSA and DoD-affiliated advisors.

D1 (4/5): Delaware non-profit, but US federal CLOUD Act jurisdiction applies equally to non-profits. The non-profit structure does not create any GDPR adequacy benefit.

D2 (5/5): Highest intelligence partnership score in the SAT Series. SANS holds NSA Center of Academic Excellence in Cyber Defense (CAE-CD) and Cyber Research (CAE-R) designations, operates DoD CyberTalent programmes, maintains FBI InfraGard membership, and produces the CISA NICE (National Initiative for Cybersecurity Education) Workforce Framework. SANS is structurally embedded in US national cybersecurity infrastructure in a way that no other SAT vendor approaches.

D3 (3/5): SANS primarily delivers training content (GIAC certifications, course completions) rather than behavioural simulation data. The data sensitivity is lower than Cofense or Terranova — but certification records and training completion data for EU employees are still subject to GDPR Article 88 and employment law.

D4 (4/5): US-headquartered, no dedicated EU data centre. Training delivery uses CDN infrastructure with US primary storage.

D5 (2/5): Standard SCCs available but SANS's non-profit status creates DPA negotiation challenges: the standard DPA templates are designed for commercial vendors, and SANS's unusual structure means custom DPA negotiation is required for adequate GDPR Article 28 compliance.

Key Risk — NSA CAE Partnership Paradox: SANS Security Awareness (formerly known as SANS Securing The Human) holds NSA designation as a Centre of Academic Excellence. EU organisations mandating NIS2 Article 21(2)(d) cybersecurity training while using SANS are effectively using NSA-designated training content, delivered through a platform subject to NSA-affiliated CLOUD Act jurisdiction. This is the highest institutional-partnership risk in the SAT Series.

Key Risk — GIAC Certification Data Sovereignty: GIAC certifications are increasingly required for EU critical infrastructure roles (NIS2 essential entity security staff). Certification records, exam performance data, and renewal schedules for EU employees holding GIAC credentials are stored in SANS/GIAC systems under US CLOUD Act jurisdiction. A CLOUD Act request targeting SANS could yield a complete roster of EU critical infrastructure security professionals, their certification status, and their employer affiliations.

Key Risk — NICE Framework Sovereignty Paradox: SANS produces and delivers training aligned with the CISA NICE Workforce Framework — a US government workforce development programme. EU organisations adopting NICE Framework competencies for NIS2 compliance are structurally aligning their workforce development with a US government framework administered by a US-subject entity.


Terranova Security — 18/25

Corporate Structure: Originally Terranova Corporation (Montreal, Quebec, Canada — founded 2002, Dafydd Stuttard). Acquired by Proofpoint (Sunnyvale, California, Delaware C-Corp) in July 2022. Proofpoint is owned by Thoma Bravo (Chicago PE, managed by Delaware entities) following its 2021 $12.3B take-private.

D1 (4/5): Post-acquisition, Terranova's data controller is Proofpoint Inc. (Delaware C-Corp), not the Canadian entity. The acquisition dissolved the GDPR Article 45 adequacy pathway — Canada's PIPEDA was the original legal basis for trans-border data flows with EU customers; that basis became invalid when control transferred to a US Delaware corporation.

D2 (4/5): Proofpoint maintains partnerships with FBI IC3, CISA STOP. THINK. CONNECT. Campaign, and the Anti-Phishing Working Group. Post-acquisition, Terranova inherits Proofpoint's intelligence partnership network.

D3 (5/5): Highest data sensitivity score in the SAT Series. Terranova's annual World's Biggest Phish benchmark aggregates phishing susceptibility results from thousands of organisations globally. This creates a cross-organisation employee vulnerability map under US CLOUD Act jurisdiction. A CLOUD Act request targeting Proofpoint/Terranova's benchmark database would yield comparative EU employee vulnerability data across industries and geographies — not as customer-specific data, but as an aggregated dataset that can be reverse-indexed to individual organisations.

D4 (3/5): Proofpoint's cloud infrastructure is primarily US-based (AWS US with some EU regions). Post-acquisition, Terranova's EU customers may have their data processed through Proofpoint's global infrastructure rather than the Canadian infrastructure originally contracted.

D5 (2/5): The PIPEDA adequacy gap is the critical mitigation failure. DPAs signed before July 2022 reference Canadian adequacy as the transfer mechanism. Those DPAs are legally invalid as of acquisition completion. Article 30 Records of Processing entries citing Canadian adequacy as the transfer basis are inaccurate and create audit exposure for EU controllers.

Key Risk — PIPEDA Adequacy Lapse Paradox: Pre-2022 Terranova DPAs cited Canada's PIPEDA adequacy decision (Council Decision 2002/2) as the legal basis for EU-Canada data transfers. Post-acquisition by Proofpoint (Delaware C-Corp), those transfers are now EU-US transfers under CLOUD Act jurisdiction. EU organisations have not been systematically notified of this change in legal basis — a potential GDPR Article 13/14 notification violation. Data Protection Officers at EU organisations that contracted Terranova before 2022 have a compliance action item.

Key Risk — Microsoft-Exclusive Partnership Dual Exposure: Terranova is Microsoft's exclusive global Security Awareness Training partner. EU organisations using Microsoft 365 (itself a Delaware C-Corp under CLOUD Act jurisdiction) and Terranova for SAT have created a dual CLOUD Act exposure: both the productivity platform and the training platform are under separate US jurisdiction. GDPR Article 26 joint-controller obligations are not addressed in either standard DPA template.

Key Risk — World's Biggest Phish Benchmark: Terranova's annual benchmark (running since 2012) aggregates phishing simulation results from participating organisations. Benchmark participation involves contributing anonymised but technically linkable employee click data to a centrally held dataset. Under Proofpoint ownership, this dataset is subject to US CLOUD Act jurisdiction — creating cross-organisation EU employee vulnerability intelligence under US government access authority.


Regulatory Exposure Summary

GDPR Article 28 — Data Processing Agreements

All four vendors offer GDPR Article 28 DPA templates. Key compliance gaps:

VendorCritical DPA Gap
KnowBe4Vista Equity PE layer not covered in standard DPA
CofenseVeritas Capital government-tech focus not disclosed as CLOUD Act risk
SANSNSA CAE partnership not disclosed as intelligence-partnership risk
TerranovaPIPEDA adequacy lapsed post-acquisition (July 2022) — Article 30 records invalid for pre-2022 contracts

GDPR Articles 44–49 — International Data Transfers

Standard Contractual Clauses (SCCs) are the transfer mechanism for all four vendors, following the invalidation of Privacy Shield (Schrems II, 2020) and the establishment of the EU-US Data Privacy Framework (DPF, 2023). The DPF does not address CLOUD Act requests — it governs voluntary commercial data transfers, not compelled governmental access.

Transfer Impact Assessments (TIAs) under EDPB guidance require assessment of the likelihood of government access requests. For Cofense (Veritas Capital), SANS (NSA CAE designation), and Terranova (Proofpoint/Thoma Bravo), the TIA risk assessment should reflect elevated D2 intelligence partnership scores.

NIS2 Article 21(2)(d) — Supply Chain Security

Security awareness training is explicitly a supply chain dependency under NIS2. The circular risk: training required for NIS2 compliance, delivered through platforms that create their own NIS2 supply chain risk. Essential and important entities should document this dependency in their Article 21 supply chain risk assessment.

DORA Article 28 — ICT Third-Party Risk

Financial entities subject to DORA must maintain an ICT third-party register and conduct risk assessments for critical ICT third-party providers. Security awareness training platforms accessed by staff with access to financial systems qualify as ICT third-party dependencies. Cofense (19/25) and the Veritas Capital ownership structure represents a material ICT risk item for DORA-subject EU financial institutions.


EU-Native Alternatives: 0/25 CLOUD Act Exposure

SoSafe GmbH — Cologne, Germany

Hoxhunt Oy — Helsinki, Finland

Phished — Ghent, Belgium


Decision Framework for EU DPOs and CISOs

Critical Question: When Did You Sign the DPA?

Terranova customers who signed before July 2022: Your DPA references Canadian PIPEDA adequacy as the transfer mechanism. That mechanism ceased to apply when Proofpoint (Delaware C-Corp) completed acquisition. You have a live GDPR Article 30 compliance gap. Action required: renegotiate DPA with Proofpoint as the data processor, citing SCCs as transfer mechanism. Notify your DPA if the transfer has been ongoing without valid legal basis.

All four vendors — TIA requirement: Under Schrems II and EDPB guidance, Transfer Impact Assessments must account for the "laws and practices" of the destination country, including compelled government access. The D2 scores above (SANS 5/5, Cofense 4/5, Terranova 4/5, KnowBe4 3/5) should inform your TIA risk matrix directly.

When to Escalate to EU-Native

Consider migration to SoSafe, Hoxhunt, or Phished when:

  1. NIS2 essential entity designation — CLOUD Act supply chain risk in your Article 21 assessment is flagged as critical
  2. DORA-subject financial entity — ICT third-party register requires elevated risk justification for Cofense/Veritas structure
  3. German workforce — BDSG § 26 Betriebsrat requirements for phishing simulation data make US-jurisdiction platforms legally complex
  4. Existing Microsoft 365 + Terranova dual exposure — GDPR Article 26 joint-controller obligations unresolved; migration to single EU-jurisdiction training platform simplifies compliance
  5. Pre-2022 Terranova DPA — Legal basis for transfers invalid; migration to EU-native eliminates exposure rather than requiring DPA renegotiation

When US Vendors May Be Acceptable

If your organisation has:

Then residual risk may be acceptable under your organisation's documented risk tolerance — provided SCCs and TIA are kept current as ownership structures change (see Terranova example above).


EU-SAT Series Summary

PostVendorCLOUD Act ScoreKey Risk
#1268KnowBe417/25Vista PE + DSGVO § 26 Betriebsrat
#1269Cofense19/25Veritas Capital defence-tech PE
#1270SANS18/25NSA CAE-CD/CAE-R designation
#1271Terranova18/25PIPEDA adequacy lapsed 2022

EU-native alternatives: SoSafe (DE), Hoxhunt (FI), Phished (BE) — all 0/25.


Key Takeaways

  1. Cofense carries the highest structural risk (19/25) due to Veritas Capital's explicit US government/defence alignment — the PE ownership layer is not merely incidental but mission-aligned.

  2. SANS carries the highest intelligence partnership risk (D2: 5/5) due to NSA CAE designation, DoD CyberTalent, FBI InfraGard, and CISA NICE Framework — the most institutionally embedded vendor in US national cybersecurity infrastructure.

  3. Terranova carries the highest data sensitivity risk (D3: 5/5) due to the World's Biggest Phish benchmark — cross-organisation EU vulnerability data aggregated under Proofpoint/Delaware C-Corp jurisdiction. Pre-2022 DPAs have a live validity gap.

  4. The NIS2 training paradox affects all four vendors: the regulation that mandates awareness training does not protect against the CLOUD Act risks created by US-jurisdiction training platforms.

  5. EU-native vendors eliminate the risk entirely: SoSafe, Hoxhunt, and Phished offer equivalent or superior functionality with zero US jurisdiction exposure.


This analysis covers CLOUD Act exposure under 18 U.S.C. § 2703, GDPR Articles 28/44–49/88, NIS2 Article 21(2)(d), DORA Article 28, and BDSG § 26. It does not constitute legal advice. EU organisations should obtain independent legal assessment for their specific contracts and transfer mechanisms.

EU-Native Hosting

Ready to move to EU-sovereign infrastructure?

sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.