The Need for Security Awareness Programs. Agenda 1)The Need for Security Awareness Programs 2)Security Awareness as a Product 3)Phase 1 – Identify Target.

Slides:



Advertisements
Similar presentations
Information Technologies Page 1 Information Technologies Page 1 Information Technologies Page 1 Information Technologies Page 1Information Technologies.
Advertisements

Supervisor Orientation
Technovation Lesson: Business Plan Week 6. Check-in: Business model You should have completed the business model page in your workbook. You’ll need this.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3.1.
The Human Firewall Creating a security aware workforce APPLIED INFORMATION SERVICES Andrew Breakwell Business Development Director Compliance Division.
ACT Integrated Managed Support 2013 ITSMF USA Project of the Year Assurant’s Unconventional Approach, Uncommon Results AIMS.
© 2012 Ariba, Inc. All rights reserved. Ariba Network Best Practices Defining the Buyer Compliance Policy Leigh Tangretti, Director Network Services.
Security Controls – What Works
Specializing in Search Excellence Click the arrows to advance to the next slide.
THE UNIVERSITY OF WASHINGTON DEMONSTRATION TEAM & OUR DEMONSTRATION PARTNERS SDM CONFERENCE SESSION 4 MAY 26, Washington Shared Decision Making.
Global Procurement Solutions (GPS) Manager of Business Development Final Project, Fall semester December 16, 2000.
Business Communication
Weaving Marketing into the Fabric of the Firm
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
By Saurabh Sardesai October 2014.
First Practice - Information Security Management System Implementation and ISO Certification.
Business Careers & Practices Week 1 Careers and Jobs in Accounting and Management Work Functions of Accounting and Management Technicians Business Functions.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
DevLP I-Serv International Pvt Ltd Committed to Quality, Assurance & Growth 1Content Subject to DevLP I-Serv International Private Limited.
Implementing Disaster Recovery Plans
CHAPTER 9 TRAINING AND DEVELOPMENT. Training and Development Training and DevelopmentTraining and Development –Represents an ongoing investment in employees.
Change Advisory Board COIN v1.ppt Change Advisory Board ITIL COIN June 20, 2007.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Chapter 5 Training Discuss how training can contribute to companies’ business strategy. Explain the role of the manager in identifying training needs and.
President Elect & Business Management 4Q2004 Status Report Gina L. Billings 1Q2005 National Board of Directors Meeting February 5, 2005.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Systems Analysis and Design: The Big Picture
Project Management Process Overview
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
9 Closing the Project Teaching Strategies
ISMMMO, Antalya April Internal Audit, Best Practices Özlem Aykaç, CIA,CCSA CAE Coca-Cola İçecek.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
OSF/ISD Project Portfolio Management Framework January 17, 2011.
Copyright © 2007 by South-Western, a division of Thomson Learning. All rights reserved. Global Promotional Strategies Chapter 18.
Performance Development at The Cathedral of the Incarnation A Supervisor’s Guide.
By Alia Zafar Head HR Relationship Management& OD (North) HBL Satisfaction Surveys for the Effectiveness of the Organization.
Project Post-Mortem University of California Berkeley Extension Copyright © 2008 Patrick McDermott From an AutoContent Wizard 10/27/2007.
© 2008 IBM Corporation Challenges for Infrastructure Outsourcing July 29, 2011 Atul Gupta Vice President, Strategic Outsourcing, IBM.
My.umich.edu Partial Integration of Dynamic Services with Visual Design.
SEVESO II transposition and implementation – possible approaches and lessons learned from MS/NMS SEVESO II transposition and implementation – possible.
© 2003 CCI. All rights reserved. Marketing Planning & Execution Marketing Sales.
Where We Are Now 14–2. Where We Are Now 14–2 Major Tasks of Project Closure Evaluate if the project delivered the expected benefits to all stakeholders.
BENCHMARKING BENCHMARKING. What is Benchmarking ? It is a continuous process of comparing a company’s strategy, products, and processes with those of.
1 EMS Fundamentals An Introduction to the EMS Process Roadmap AASHTO EMS Workshop.
Audrey Tucker AET560 October 13, 2014 Professor Charity Jennings.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Lynn Schmidt, PhD ATD Puget Sound October 21, 2014.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Slide 1 FastFacts Feature Presentation November 18, 2015 To dial in, use this phone number and participant code… Phone number: Participant.
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
PLANNING AND DECISION- MAKING IN AN ORGANIZATION Business Management Copyright © Texas Education Agency, All rights reserved.
Pharmaceutical companies put forth great effort when identifying their customer needs and wants They then invest in R & D hoping to discover and launch.
The Second Annual Medical Device Regulatory, Reimbursement and Compliance Congress Presented by J. Glenn George Thursday, March 29, 2007 Day II – Track.
Fluent in all the World's Business Languages.. Merging Content Development with the Localization Process. November 19, 2003 Integrating with Language.
Student Support at the Service Desk Presented to UCSF Education Committee September 8, 2011 Julie Cox Director, IT Customer Services and Service Desk.
Classification September 2003© Peltier and Associates, all rights reserved Creating an Asset Classification Methodology ISIG & ISSA September, 2003.
Change Management A process for process change by Cory R. Peters Exelon PowerLabs.
3 rd ANNUAL VENDOR ADVISORY COUNCILSeptember 2012 exploring the future of vendor credentialing MORE ENGAGED REPS = MORE CREDENTIALED REPS PRESENTED BY:Adrienne.
CHAPTER 3 Management Systems. Learning Objectives Describe the basic business activities and tools necessary to implement successful industrial hygiene.
1 Chapter 9 Implementing Six Sigma. Top 8 Reasons for Six Sigma Project Failure 8. The training was not practical. 7. The project was too small for DMAIC.
Overview – Guide to Developing Safety Improvement Plan
Overview – Guide to Developing Safety Improvement Plan
RECORDS AND INFORMATION
By Jeff Burklo, Director
OneDrive Adoption Campaign Project Plan Template
Facilitating Change (AET 560)
{Project Name} Organizational Chart, Roles and Responsibilities
Wide Ideas Idea Management Software Idea Management Process
Presentation transcript:

The Need for Security Awareness Programs

Agenda 1)The Need for Security Awareness Programs 2)Security Awareness as a Product 3)Phase 1 – Identify Target Audiences and Product 4)Phase 2 – Identify Product Distribution Methods 5)Phase 3 – Obtain Management Support 6)Phase 4 – Product Launch 7)Phase 5 – Effectiveness Assessment 8)Ongoing Enhancements 9)Ideas for Customized Campaigns 10)Conclusion

The Need for Security Awareness Programs Implementing a strong information security awareness program (ISAP) can be a very cost-effective methods of protecting critical information assets. An effective ISAP is needed to help all employees understand:  Why they need to take information security seriously  What they gain from active participation and support  How a secure environment helps them complete their assigned tasks

The Need for Security Awareness Programs Like any other marketing or sales organization, the CISO (Corporate Security Officer/Organization/Office) needs to develop, market, support, and improve a product – in this case, the product is awareness:  Disseminated in several formats  Structured by specific campaigns  Provided by diverse delivery techniques. To bring this product to the customer –employees and management – several phases must occur.

Phase 1- Identify Target Audiences and Product

Phase 1 – Identify Target Audiences and Product The awareness program’s messages (product) must be prioritized and segmented by target audience (general, management, technical, etc.). During this phase:  Campaign themes will be established  Customer audiences will be defined and targeted  The product will be defined ( , mascots, desktop systems, posters, gadgets, others)  Delivery schedules will be defined  Specification for ongoing support will be defined

Phase 1 – Identify Target Audiences and Product (cont) Also during this phase:  Benchmark statistics will be captured (help desk calls, trouble tickets, logs, system level availability, system service calls, incident post-mortem reports)  Success criteria will be defined  Roles and responsibilities for ownership and stewardship will be defined  A pilot group will be selected and informed of their role

Phase 1 – Identify Target Audiences and Product (cont) Budgets must be discussed in this phase!!!!!!

Phase 2 – Identify Product Distribution Methods

In order to bring the product to the target customer in a cost- effective and timely manner, proper distribution channels must be established and schedules developed. The product must be culturally acceptable to the organization, and may be distributed formally or informally. Some distribution will be mandated by management (new-hire orientations, quarterly meetings, or management review processes). In other cases, the product distribution may depend on the target audience (surveys, or drawings). Product may also be distributed by “drop” mechanisms.

Phase 2 – Identify Product Distribution Methods (cont) Potential channels for distribution include:  Audio (voice mail, help center recordings)  Video (kiosks, CCTV, customized or purchased)  Formal Training (scheduled or one-time)  Orientations (new hire, mergers and acquisitions)  Posters (humorous or serious)  “Lunch & Learn” (full cafeteria or special sessions)  Desktop Systems (calendars, Web-based reminders)

Phase 3 – Obtain Management Support

The most successful ISAPs have full management endorsement and enthusiastic support from the highest levels of the company. During this phase:  You will need to be motivator, cheerleader, and politician  Management will receive progress reports and product samples  Schedules for product launch will be formalized  Messages from management announcing the ISAP will be issued

Phase 3 – Obtain Management Support (cont) Also during this phase, certain I/T traditional functions should be noted and executed:  Take the traditional “test” to ”quality assurance (QA)” to ”production” stance  Ensure that activities are listed as formal projects on change control proceedings and/or production schedules  Obtain support and authorization from Legal, Public Relations, or Corporate Security departments

Phase 4 – Product Launch

The ISAP has (hopefully) already been publicized in Phase 3. When the launch date is selected, activities in this phase include:  Distribution channels will be established as identified in Phase 2  Support processes will be enabled  Distribution schedules will be finalized  The project moves from “test” status to “QA” status

Phase 4 – Product Launch (continued) Several points to consider during the product launch:  Follow-up meetings may be scheduled (“test panels”)  Survey forms and evaluations should be provided  “Thank-you” tokens for pilot participants may be in order  Feedback to pilot participants is important!!!!

Phase 5 – Effectiveness Assessment

The implementation should now be considered in “production” status at this time, based on the following results: The ISAP should show results in tangible measurements based on Phase 1 benchmarking:  Fewer help center calls  Closer adherence to standards  Fewer incidents requiring response  Improved SLA metrics

Phase 5 – Effectiveness Assessment The ISAP should also show results in intangible measurements based on Phase 4 follow-up:  Increased employee enablement  Employee pride in ownership  Increased understanding of organizational goals  Increased productivity  Improved performance

Ongoing Enhancements

The ISAP should be evaluated at the end of every campaign (or at least quarterly) to assess impact and benefit to the organization.

Ideas for Customized Programs

Ideas for Customized Campaigns  AntiVirus  Data Classification  Business Cycle (sales, R&D)  Laptop Safety  Physical Security  Privacy  Regulatory (HIPAA, GLB, 21CFR11)

Conclusion Hopefully, you now have a fresh approach to building a security program that delivers meaning and value to the entire organization. Questions and comments are welcome at this point!