SlideShare una empresa de Scribd logo
1 de 21
© Terranova Worldwide Corporation 2019. All rights reserved.
5 Steps To Masterminding An
Effective Security Awareness Program
The Human Fix to Human Risk™
Lise Lapointe – Author and CEO
Anastasia Tsimiklis - CMO
© Terranova Worldwide Corporation 2019. All rights reserved.
Security Awareness 5-Step Framework
© Terranova Worldwide Corporation 2019. All rights reserved.
Step 1 – Analyze: An Important Step!
© Terranova Worldwide Corporation 2019. All rights reserved.
Define Strategic Goals
Why are you deploying a security awareness program?
What are you trying to achieve?
• Strategic goals must clearly identify what you aim to achieve with your
Be Aware program
• Goals must be identified so a plan can be laid out with all the steps
required to get there
• Goals must be aligned with the Information Security program and
even the business strategy of the organization
• Clearly defined goals will help decision makers approve and support
your program
© Terranova Worldwide Corporation 2019. All rights reserved.
Your security awareness goals can be in
any or all of these three categories:
• Risks and Behaviors
• to reduce risk and foster behavioral
changes
• Security Culture
• to instill or reinforce a culture of
security
• Compliance Obligations
• to ensure compliance with your
organization’s security obligations
Setting Strategic Goals Will Help Ensure Your Awareness Program Delivers Results
© Terranova Worldwide Corporation 2019. All rights reserved.
Step 2 – Plan: Define Your Objectives
© Terranova Worldwide Corporation 2019. All rights reserved.
Objectives, KPIs & Metrics Program/ Campaign Results
Participation Rates
Metrics and KPIs DataMetrics and KPIsMetrics and KPIs
Participation RatesParticipation Rates
DataData
Program/ Campaign ResultsProgram/ Campaign Results
© Terranova Worldwide Corporation 2019. All rights reserved.
Objective – Train Users to Defend Themselves Against Phishing
Users are aware of cyber
security risks and controls
Percentage of participants
who have completed
training
Increase in attendance
Compliance Behavior Culture
KPI
All employees have
received training on the
Phishing attack method
Reduction in the number
of incidents that result
from an email attack
Increase in number of
employees report phishing
activity to the Service Desk
Metric Training participation rates
Recorded malware
infections or other
incidents as a result of
phishing
Reported phishing attacks
(e.g. simulations)
Effectiveness
Indicator
Increase in the number of
users that participate to
online training
Reduction in the number
of users that opened
attachments in real or
simulated phishing
attempts
Increase in the number of
users who reported real or
simulated phishing
attempts
© Terranova Worldwide Corporation 2019. All rights reserved.
Establishing a Cyber Security
Ambassador Program
© Terranova Worldwide Corporation 2019. All rights reserved.
Awareness Challenges Opportunity with Ambassador Program
Cyber Security Ambassadors Help Promote and Reinforce Importance of
Security Awareness
Elevate Visibility
of Security
Awareness
Ability To Share
Key and Common
Messages
Increase in
Interest and
Participation
Key Contact and
Local
Representation
Lack of Security
Resources
Difficult To Extend
Common Message
Promote
Awareness
Activities in All
Locations
Time Constraints
To Achieve
Security Culture
© Terranova Worldwide Corporation 2019. All rights reserved.
Ambassador Applications and Nominations: Identify expectations, responsibilities and benefits
Review and Select Applicants: Good representation across departments and geography
Training and Mentorship Program: Training, workshops and materials
Ceremony and Acknowledgment: Main point of contact / communication point for security awareness
Manage and Track Success of Ambassador Program: Frequent touch points and metrics to gauge
success
5 Key Steps To Set Up A Successful Cyber Security Ambassador Program
© Terranova Worldwide Corporation 2019. All rights reserved.
Step 3 – Deploy: Launch An Effective Security Awareness Campaign
© Terranova Worldwide Corporation 2019. All rights reserved.
Types of Online Training
• Information Security Awareness
Modules
• Microlearnings and Nanolearnings
• Role-based Awareness Modules
• Privacy, Compliance and
Governance Courses
© Terranova Worldwide Corporation 2019. All rights reserved.
Integrated Approach to Change User Behavior
MicrolearningRole-Based Course
Ie: manager
End User Topics
Newsletters
Newsletters
End User Topics
Nanolearning
Communication Plan Deployment
KnowledgeRetention
© Terranova Worldwide Corporation 2019. All rights reserved.
Automated Results-based Learning Path Promotes The Right Security Behaviors
FOUNDATIONAL TRAINING
E-Learning Modules
MICROLEARNING - Introducing RISK #1
i.e. Business Email Compromise
JOINER #2JOINER #1 JOINER #3
PHISHING #1
PASSED
PHISHING #1
PASSED
PHISHING #1
FAILED
Move to Champion Group Move to Champion Group Move to First Time Clicker Group
MICROLEARNING - Introducing RISK #2
i.e. Spear Phishing
Remain in Champion Group Move to First Time Clicker Group Move to Repeat Clicker Group
Just in Time Training
Just in Time TrainingJust in Time Training
PHISHING #2
PASSED
PHISHING #2
FAILED
PHISHING #2
FAILED
Use Case:
New Joiners
MANAGER
ESCALATION
BASELINE: Quiz and Phishing Simulation
© Terranova Worldwide Corporation 2019. All rights reserved.
Step 4 – Measure: Evaluate The Success Of Your Security Awareness Campaign
© Terranova Worldwide Corporation 2019. All rights reserved.
Report Results
Effective reporting is required to
provide management valuable
information on the program to
assist with decision making and
future investment and direction.
© Terranova Worldwide Corporation 2019. All rights reserved.
Step 5 – Measure: Increase Effectiveness
© Terranova Worldwide Corporation 2019. All rights reserved.
Lessons Learned
Sharing what has been learned from what worked and
what didn't work should be included in the post-
campaign process.
We recommend you:
Compare objectives with results after a campaign or on a
yearly basis.
• Pick the top three items to address (don't try to resolve
all the issues at the same time).
• After a major activity, we will schedule some time with
key players.
© Terranova Worldwide Corporation 2019. All rights reserved.
Please join us at Booth #416
to get your book signed and
for more discussions on:
5 Steps to Masterminding An
Effective Security Awareness
Program
Proud To Be A Recognised Leader in the Gartner Magic Quadrant for Security Awareness CBT
Magic Quadrant for Security Awareness Computer-Based Training, November 2018. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise
technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be
construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
© Terranova Worldwide Corporation 2019. All rights reserved.

Más contenido relacionado

La actualidad más candente

SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Maganathin Veeraragaloo
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development pathsChelsea Jarvie
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Anshu Gupta
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCPriyanka Aash
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Isaca crisc-courseware
Isaca crisc-coursewareIsaca crisc-courseware
Isaca crisc-coursewareLaxmi Bank
 

La actualidad más candente (20)

Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Cyber security career development paths
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Isaca crisc-courseware
Isaca crisc-coursewareIsaca crisc-courseware
Isaca crisc-courseware
 

Similar a 5 Steps To Masterminding An Effective Security Awareness Program

KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfahmad661583
 
2018 sans security awareness report
2018 sans security awareness report2018 sans security awareness report
2018 sans security awareness reportJohn Martens
 
CISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE
 
Mentoring-Business-Case-Template-v4 (1).pptx
Mentoring-Business-Case-Template-v4 (1).pptxMentoring-Business-Case-Template-v4 (1).pptx
Mentoring-Business-Case-Template-v4 (1).pptxShree Shree
 
Wp 2019 security_awareness_report
Wp 2019 security_awareness_reportWp 2019 security_awareness_report
Wp 2019 security_awareness_reportMohamedAlYemani1
 
wkshp26mar19_presentation.pdf
wkshp26mar19_presentation.pdfwkshp26mar19_presentation.pdf
wkshp26mar19_presentation.pdfMeirZushnov1
 
BBA In Marketing Management.pptx
BBA In Marketing Management.pptxBBA In Marketing Management.pptx
BBA In Marketing Management.pptxIIBMSMumbai1
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Reaching your true (email) potential
Reaching your true (email) potential Reaching your true (email) potential
Reaching your true (email) potential Adestra
 
Making Market Development Funds Work for You
Making Market Development Funds Work for YouMaking Market Development Funds Work for You
Making Market Development Funds Work for YouZINFI Technologies, Inc.
 
Sales Leadership Series: Better Sales Coaching Through Performance Metrics
Sales Leadership Series: Better Sales Coaching Through Performance MetricsSales Leadership Series: Better Sales Coaching Through Performance Metrics
Sales Leadership Series: Better Sales Coaching Through Performance MetricsValueSelling Associates, Inc.
 
Marketo Summit 2012 SF- Lead Follow Up
Marketo Summit 2012 SF- Lead Follow UpMarketo Summit 2012 SF- Lead Follow Up
Marketo Summit 2012 SF- Lead Follow UpMelissa McCready
 
What Can You Do to Drive Your Market Development Funds Utilization?
What Can You Do to Drive Your Market Development Funds Utilization?What Can You Do to Drive Your Market Development Funds Utilization?
What Can You Do to Drive Your Market Development Funds Utilization?ZINFI Technologies, Inc.
 
Benchmarking Jive Customer Communities
Benchmarking Jive Customer CommunitiesBenchmarking Jive Customer Communities
Benchmarking Jive Customer CommunitiesClaire Flanagan, MBA
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Craig Taggart MBA
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk managementInfosys
 
SunGard's Marketing Secrets for Revenue and Sales Alignment
SunGard's Marketing Secrets for Revenue and Sales AlignmentSunGard's Marketing Secrets for Revenue and Sales Alignment
SunGard's Marketing Secrets for Revenue and Sales AlignmentMarketo
 
Level up - First SDGs accelerator in CEE
Level up  - First SDGs accelerator in CEELevel up  - First SDGs accelerator in CEE
Level up - First SDGs accelerator in CEEEmanuele Musa
 

Similar a 5 Steps To Masterminding An Effective Security Awareness Program (20)

KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdf
 
2018 sans security awareness report
2018 sans security awareness report2018 sans security awareness report
2018 sans security awareness report
 
CISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programsCISOSHARE's approach to designing effective cyber security programs
CISOSHARE's approach to designing effective cyber security programs
 
Mentoring-Business-Case-Template-v4 (1).pptx
Mentoring-Business-Case-Template-v4 (1).pptxMentoring-Business-Case-Template-v4 (1).pptx
Mentoring-Business-Case-Template-v4 (1).pptx
 
Wp 2019 security_awareness_report
Wp 2019 security_awareness_reportWp 2019 security_awareness_report
Wp 2019 security_awareness_report
 
wkshp26mar19_presentation.pdf
wkshp26mar19_presentation.pdfwkshp26mar19_presentation.pdf
wkshp26mar19_presentation.pdf
 
BBA In Marketing Management.pptx
BBA In Marketing Management.pptxBBA In Marketing Management.pptx
BBA In Marketing Management.pptx
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Reaching your true (email) potential
Reaching your true (email) potential Reaching your true (email) potential
Reaching your true (email) potential
 
Making Market Development Funds Work for You
Making Market Development Funds Work for YouMaking Market Development Funds Work for You
Making Market Development Funds Work for You
 
Sales Leadership Series: Better Sales Coaching Through Performance Metrics
Sales Leadership Series: Better Sales Coaching Through Performance MetricsSales Leadership Series: Better Sales Coaching Through Performance Metrics
Sales Leadership Series: Better Sales Coaching Through Performance Metrics
 
Marketo Summit 2012 SF- Lead Follow Up
Marketo Summit 2012 SF- Lead Follow UpMarketo Summit 2012 SF- Lead Follow Up
Marketo Summit 2012 SF- Lead Follow Up
 
What Can You Do to Drive Your Market Development Funds Utilization?
What Can You Do to Drive Your Market Development Funds Utilization?What Can You Do to Drive Your Market Development Funds Utilization?
What Can You Do to Drive Your Market Development Funds Utilization?
 
Benchmarking Jive Customer Communities
Benchmarking Jive Customer CommunitiesBenchmarking Jive Customer Communities
Benchmarking Jive Customer Communities
 
Growth Strategies Presentation
Growth Strategies PresentationGrowth Strategies Presentation
Growth Strategies Presentation
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
 
Mobile Learning Case Study
Mobile Learning Case StudyMobile Learning Case Study
Mobile Learning Case Study
 
Enterprise 360 degree risk management
Enterprise 360 degree risk managementEnterprise 360 degree risk management
Enterprise 360 degree risk management
 
SunGard's Marketing Secrets for Revenue and Sales Alignment
SunGard's Marketing Secrets for Revenue and Sales AlignmentSunGard's Marketing Secrets for Revenue and Sales Alignment
SunGard's Marketing Secrets for Revenue and Sales Alignment
 
Level up - First SDGs accelerator in CEE
Level up  - First SDGs accelerator in CEELevel up  - First SDGs accelerator in CEE
Level up - First SDGs accelerator in CEE
 

Último

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 

Último (20)

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 

5 Steps To Masterminding An Effective Security Awareness Program

  • 1. © Terranova Worldwide Corporation 2019. All rights reserved. 5 Steps To Masterminding An Effective Security Awareness Program The Human Fix to Human Risk™ Lise Lapointe – Author and CEO Anastasia Tsimiklis - CMO
  • 2. © Terranova Worldwide Corporation 2019. All rights reserved. Security Awareness 5-Step Framework
  • 3. © Terranova Worldwide Corporation 2019. All rights reserved. Step 1 – Analyze: An Important Step!
  • 4. © Terranova Worldwide Corporation 2019. All rights reserved. Define Strategic Goals Why are you deploying a security awareness program? What are you trying to achieve? • Strategic goals must clearly identify what you aim to achieve with your Be Aware program • Goals must be identified so a plan can be laid out with all the steps required to get there • Goals must be aligned with the Information Security program and even the business strategy of the organization • Clearly defined goals will help decision makers approve and support your program
  • 5. © Terranova Worldwide Corporation 2019. All rights reserved. Your security awareness goals can be in any or all of these three categories: • Risks and Behaviors • to reduce risk and foster behavioral changes • Security Culture • to instill or reinforce a culture of security • Compliance Obligations • to ensure compliance with your organization’s security obligations Setting Strategic Goals Will Help Ensure Your Awareness Program Delivers Results
  • 6. © Terranova Worldwide Corporation 2019. All rights reserved. Step 2 – Plan: Define Your Objectives
  • 7. © Terranova Worldwide Corporation 2019. All rights reserved. Objectives, KPIs & Metrics Program/ Campaign Results Participation Rates Metrics and KPIs DataMetrics and KPIsMetrics and KPIs Participation RatesParticipation Rates DataData Program/ Campaign ResultsProgram/ Campaign Results
  • 8. © Terranova Worldwide Corporation 2019. All rights reserved. Objective – Train Users to Defend Themselves Against Phishing Users are aware of cyber security risks and controls Percentage of participants who have completed training Increase in attendance Compliance Behavior Culture KPI All employees have received training on the Phishing attack method Reduction in the number of incidents that result from an email attack Increase in number of employees report phishing activity to the Service Desk Metric Training participation rates Recorded malware infections or other incidents as a result of phishing Reported phishing attacks (e.g. simulations) Effectiveness Indicator Increase in the number of users that participate to online training Reduction in the number of users that opened attachments in real or simulated phishing attempts Increase in the number of users who reported real or simulated phishing attempts
  • 9. © Terranova Worldwide Corporation 2019. All rights reserved. Establishing a Cyber Security Ambassador Program
  • 10. © Terranova Worldwide Corporation 2019. All rights reserved. Awareness Challenges Opportunity with Ambassador Program Cyber Security Ambassadors Help Promote and Reinforce Importance of Security Awareness Elevate Visibility of Security Awareness Ability To Share Key and Common Messages Increase in Interest and Participation Key Contact and Local Representation Lack of Security Resources Difficult To Extend Common Message Promote Awareness Activities in All Locations Time Constraints To Achieve Security Culture
  • 11. © Terranova Worldwide Corporation 2019. All rights reserved. Ambassador Applications and Nominations: Identify expectations, responsibilities and benefits Review and Select Applicants: Good representation across departments and geography Training and Mentorship Program: Training, workshops and materials Ceremony and Acknowledgment: Main point of contact / communication point for security awareness Manage and Track Success of Ambassador Program: Frequent touch points and metrics to gauge success 5 Key Steps To Set Up A Successful Cyber Security Ambassador Program
  • 12. © Terranova Worldwide Corporation 2019. All rights reserved. Step 3 – Deploy: Launch An Effective Security Awareness Campaign
  • 13. © Terranova Worldwide Corporation 2019. All rights reserved. Types of Online Training • Information Security Awareness Modules • Microlearnings and Nanolearnings • Role-based Awareness Modules • Privacy, Compliance and Governance Courses
  • 14. © Terranova Worldwide Corporation 2019. All rights reserved. Integrated Approach to Change User Behavior MicrolearningRole-Based Course Ie: manager End User Topics Newsletters Newsletters End User Topics Nanolearning Communication Plan Deployment KnowledgeRetention
  • 15. © Terranova Worldwide Corporation 2019. All rights reserved. Automated Results-based Learning Path Promotes The Right Security Behaviors FOUNDATIONAL TRAINING E-Learning Modules MICROLEARNING - Introducing RISK #1 i.e. Business Email Compromise JOINER #2JOINER #1 JOINER #3 PHISHING #1 PASSED PHISHING #1 PASSED PHISHING #1 FAILED Move to Champion Group Move to Champion Group Move to First Time Clicker Group MICROLEARNING - Introducing RISK #2 i.e. Spear Phishing Remain in Champion Group Move to First Time Clicker Group Move to Repeat Clicker Group Just in Time Training Just in Time TrainingJust in Time Training PHISHING #2 PASSED PHISHING #2 FAILED PHISHING #2 FAILED Use Case: New Joiners MANAGER ESCALATION BASELINE: Quiz and Phishing Simulation
  • 16. © Terranova Worldwide Corporation 2019. All rights reserved. Step 4 – Measure: Evaluate The Success Of Your Security Awareness Campaign
  • 17. © Terranova Worldwide Corporation 2019. All rights reserved. Report Results Effective reporting is required to provide management valuable information on the program to assist with decision making and future investment and direction.
  • 18. © Terranova Worldwide Corporation 2019. All rights reserved. Step 5 – Measure: Increase Effectiveness
  • 19. © Terranova Worldwide Corporation 2019. All rights reserved. Lessons Learned Sharing what has been learned from what worked and what didn't work should be included in the post- campaign process. We recommend you: Compare objectives with results after a campaign or on a yearly basis. • Pick the top three items to address (don't try to resolve all the issues at the same time). • After a major activity, we will schedule some time with key players.
  • 20. © Terranova Worldwide Corporation 2019. All rights reserved. Please join us at Booth #416 to get your book signed and for more discussions on: 5 Steps to Masterminding An Effective Security Awareness Program Proud To Be A Recognised Leader in the Gartner Magic Quadrant for Security Awareness CBT Magic Quadrant for Security Awareness Computer-Based Training, November 2018. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
  • 21. © Terranova Worldwide Corporation 2019. All rights reserved.