Text
Managing an information security and privacy awareness and training program
Table of Contents
1. Brief History of Corporate Information Security and Privacy Awareness and Training
Once Upon a Time
Welcome to the Information Age
Information Security and Privacy Education
Current Challenges Bring Changes in Professional Education
2. Why Training and Awareness Are Important
Regulatory Requirements Compliance
Customer Trust and Satisfaction
Compliance with Published Policies
Due Diligence
Corporate Reputation
Accountability
3. Legal and Regulatory Requirements for Training and Awareness
Awareness and Training Needs
Legal Considerations
Copyright Considerations
Specific Regulatory Education Requirements
4. Incorporating Training and Awareness into Job Responsibilities and Appraisals
Motivational Factors
Methods of Security and Privacy Objectives Assessments
Performance against Specific Privacy and Security Objectives
Using Appraisal Results
Considering Security and Privacy within Job Performance as a Whole
Paying for Performance
Additional Percentage Element Added to Pay
Challenges
5. Common Corporate Education Mistakes
Throwing Education Together Too Quickly
Not Fitting the Environment
Not Addressing Applicable Legal and Regulatory Requirements
No Leadership Support
Budget Mismanagement or No Budget
Using Unmodified Education Materials
Information Overload
No Consideration for the Learner
Poor Trainers
Information Dumping
No Motivation for Education
Inadequate Planning
Not Evaluating the Effectiveness of Education
Using Inappropriate or Politically Incorrect Language
6. Getting Started
Determine Your Organization’s Environment, Goals, and Mission
Identify Key Contacts
Review Current Training Activities
Review Current Awareness Activities
Conduct a Needs Assessment
Create Your Road Map
Elements of an Effective Education Program
7. Establish a Baseline
Hard Data
Soft Data
8. Get Executive Support and Sponsorship
Executive Security and Privacy Training and Awareness Strategy Briefing
Provide Examples of Security- and Privacy-Impacting Events
Case Studies
Key Business Leader Information Protection Responsibilities
9. Identify Training and Awareness Methods
Adult Learning
Training Delivery Methods
Auditorium Presentations to Large Groups
Remote Access Labs
Satellite or Fiber-Optic Long-Distance Learning
Web-Based Interactive Training (such as Webinars)
Audio Instruction
Video and DVD
Workbooks On-the-Job (OTJ)
Conference Calls
Outsourced Training and Awareness with Professional
Educational Services
Education Provided by Professional Societies
Government-Sponsored Training
Awareness Methods
10.Awareness and Training Topics and Audiences
Target Groups
Mapping Topics to Roles and Target Groups
Standards and Principles
11.Define Your Message
Customer Privacy
Laws and Regulations
Access Controls
Risk Management
12.Prepare Budget and Obtain Funding
Obtain Traditional Funding if You Can
Obtain Nontraditional Funding When Necessary
Final Budget and Funding Thoughts
13.Training Design and Development
Training Methods
Design and Development
Choosing Content
Job-Specific Content and Topics for Targeted Groups
Learning Activities
Training Design Objectives
14.Awareness Materials Design and Development
Contrasting Awareness and Training
Make Awareness Interesting
Awareness Methods
Awareness Is Ongoing
Developing Awareness Activities and Messages
Monthly Information Security and Privacy Newsletters
15.Communications
Step 1: Identify Where You Need to Improve, Update, or Create Information Security and
Privacy Training and Awareness
Step 2: Obtain Executive Sponsorship
Step 3: Communicate Information Security and Privacy Program Overview
Step 4: Send Target Groups Communications Outlining the Information Security and Privacy
Training and Awareness Schedules and Their Participation Expectations
16.Deliver In-Person Training
What to Avoid in Training
Multinational Training Considerations
Delivering Classroom Training
Tips for Trainers
Visual Aids
Training in Group Settings
Case Studies
17.Launch Awareness Activities
Step 1: Identify Areas in Which You Need to Improve, Update, or Create Awareness
Step 2: Obtain Executive Sponsorship
Step 3: Communicate the Information Security and Privacy Program Overview
Step 4: Identify Trigger Events
Step 5: Identify Target Groups
Step 6: Identify Your Awareness Methods and Messages
Step 7: Evaluate Changed Behavior
Step 8: Update and Perform Ongoing Awareness Plan for Specific Events
18.Evaluate Education Effectiveness
Evaluation Areas
Evaluation Methods
Evaluating the Effectiveness of Specific Awareness and Training Methods
Education Effectiveness Evaluation Framework Activities Checklist
19.Leading Practices
Setting the Standard for Data Privacy and Awareness
Establishing a Security Culture Through Security Awareness
Empirical Evaluations of Embedded Training for Antiphishing User Education
We Are Now the Targets of Thieves!
Risks from Advanced Malware and Blended Threats
Case Study: 1200 Users, 11 Cities in 7 Weeks … and They Wanted to Come to Security Awareness Training
Obtaining Executive Sponsorship for Awareness and Training
Education and Awareness for Security Personnel
Aetna’s Award-Winning Security Awareness Program
Security Awareness Case Study
No other version available