SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Security Awareness
The Challenge of Security Awareness Why? Nobody cares about Security… And how do we get their attention and support?
Types of Risk ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual Risk ,[object Object],[object Object],[object Object],[object Object]
Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS…
 
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9.  Have a Mascot
 
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9.  Have a Mascot 8.  Dress Up
 
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9.  Have a Mascot 8.  Dress Up 7.  1-on-1 Executive Briefings
10.  Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9.  Have a Mascot 8.  Dress Up 7.  1-on-1 Executive Briefings 6.  The Screensaver
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day – comics and greeting cards
 
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day 4.  Publish or Perish
 
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day 4.  Publish or Perish 3.  Continually reinvent
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day 4.  Publish or Perish 3.  Continually reinvent 2.  Get others to play
Top 10 The Top 10 things we do for Security Awareness at DHS… 5.  Computer Security Day 4.  Publish or Perish 3.  Continually reinvent 2.  Get others to play 1.  Have Fun!

Weitere ähnliche Inhalte

Ähnlich wie Elements of an Information Security Awareness Program

SG Module #188 - Technology and Happiness.pdf
SG Module #188 - Technology and Happiness.pdfSG Module #188 - Technology and Happiness.pdf
SG Module #188 - Technology and Happiness.pdf
CarolinaMirnawati
 
Ignite your possibilities ppt
Ignite your possibilities pptIgnite your possibilities ppt
Ignite your possibilities ppt
Roy Ollis
 
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
David Minch
 
Ipad mea trade day
Ipad mea trade dayIpad mea trade day
Ipad mea trade day
stantons
 

Ähnlich wie Elements of an Information Security Awareness Program (20)

Made to stick: the science of adult learning.
Made to stick: the science of adult learning.Made to stick: the science of adult learning.
Made to stick: the science of adult learning.
 
Psychology understanding individuals and teams v4
Psychology  understanding individuals and teams v4Psychology  understanding individuals and teams v4
Psychology understanding individuals and teams v4
 
How to Make Sense of Any Mess
How to Make Sense of Any MessHow to Make Sense of Any Mess
How to Make Sense of Any Mess
 
SG Module #188 - Technology and Happiness.pdf
SG Module #188 - Technology and Happiness.pdfSG Module #188 - Technology and Happiness.pdf
SG Module #188 - Technology and Happiness.pdf
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3S
 
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
ISSA-OC and Webster University Cybersecurity Seminar Series PresentationISSA-OC and Webster University Cybersecurity Seminar Series Presentation
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
 
People Committed to Solving our Information Security Language Problem
People Committed to Solving our Information Security Language ProblemPeople Committed to Solving our Information Security Language Problem
People Committed to Solving our Information Security Language Problem
 
How To face Crowds
How To face CrowdsHow To face Crowds
How To face Crowds
 
Explaining Persuasion API
Explaining Persuasion APIExplaining Persuasion API
Explaining Persuasion API
 
Making decisions under uncertainty and under pressure in projects
Making decisions under uncertainty and under pressure in projectsMaking decisions under uncertainty and under pressure in projects
Making decisions under uncertainty and under pressure in projects
 
Excel is dead!
Excel is dead!Excel is dead!
Excel is dead!
 
Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219
 
Helping technologists communicate - pyramid principle and personal impact
Helping technologists communicate - pyramid principle and personal impactHelping technologists communicate - pyramid principle and personal impact
Helping technologists communicate - pyramid principle and personal impact
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
Ignite your possibilities ppt
Ignite your possibilities pptIgnite your possibilities ppt
Ignite your possibilities ppt
 
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
Watch Out For That Bus! (Personal Disaster Recovery Planning) - BSidesLV 2018
 
Zero Privilege Architectures v1.1_for distribution.pdf
Zero Privilege Architectures v1.1_for distribution.pdfZero Privilege Architectures v1.1_for distribution.pdf
Zero Privilege Architectures v1.1_for distribution.pdf
 
Keynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasKeynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware Dallas
 
Ipad mea trade day
Ipad mea trade dayIpad mea trade day
Ipad mea trade day
 
7 pasos para la defensa personal
7 pasos para la defensa personal7 pasos para la defensa personal
7 pasos para la defensa personal
 

Mehr von Barry Caplin

Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 

Mehr von Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 

Elements of an Information Security Awareness Program

  • 2. The Challenge of Security Awareness Why? Nobody cares about Security… And how do we get their attention and support?
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS…
  • 8.  
  • 9. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9. Have a Mascot
  • 10.  
  • 11. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9. Have a Mascot 8. Dress Up
  • 12.  
  • 13. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9. Have a Mascot 8. Dress Up 7. 1-on-1 Executive Briefings
  • 14. 10. Make Top 10 lists! Top 10 The Top 10 things we do for Security Awareness at DHS… 9. Have a Mascot 8. Dress Up 7. 1-on-1 Executive Briefings 6. The Screensaver
  • 15. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day – comics and greeting cards
  • 16.  
  • 17. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day 4. Publish or Perish
  • 18.  
  • 19. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day 4. Publish or Perish 3. Continually reinvent
  • 20. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day 4. Publish or Perish 3. Continually reinvent 2. Get others to play
  • 21. Top 10 The Top 10 things we do for Security Awareness at DHS… 5. Computer Security Day 4. Publish or Perish 3. Continually reinvent 2. Get others to play 1. Have Fun!