Implementing a Security Awareness Program
K. Rudolph, Native Intelligence, Inc.
Awareness as a Survival Technique
IT Security Is a People Problem
In-Place Information Security Policy
Senior-Level Management Support
Visibility and Audience Appeal
Overcoming Audience Resistance
Addressing the Diffusion of Responsibility
Why Am I Important to Security?
What Do Security Incidents Look Like?
Start with a Bang—Make It Attention-Getting and Memorable
Address Personality and Learning Styles (Provide Options)
Keep It Simple—Awareness Is Not Training
Use Stories and Examples—Current and Credible
Involve the Audience—Buy-In Is Better Than Coercion
Be Surprising (The Unexpected Is Memorable)
Incorporate User Acknowledgment and Sign-Off
Take Advantage of Circumstances
Web-Based Courses (Lessons Learned)
In-Person Briefings (and Brown Bag Lunches)
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.