SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Chinatu Uzuegbu
CCISO, CISSP, CISM, CISA, CEH, ….
Managing Cyber Security Consultant
RoseTech CyberCrime Solutions Limited
Effectiveness of Cyber
Security Awareness
Chinatu Uzuegbu
https://www.linkedin.com/in/chinatu-uzuegbu-67593119/
https://de.slideshare.net/Chinatu
❖ Founder and Managing Security Consultant with RoseTech CyberCrime
Solutions Limited.
❖ Founding Past President of (ISC)2 Nigeria Chapter.
❖ Member of the global (ISC)2 Chapter Advisory Committee(CAC).
❖ Mentor with the Open Cyber Security Mentorship Program(OCMP).
❖ Top 50 Women in Cyber Security Finalist by Cyber in Africa, 2020
accolade.
❖ WomenTech Global Ambassador of WomenTech Network.
❖ Member of the Advisory board of VigiTrust, Ireland.
❖ Over 20 years wealth of experience in IT (2000 till date).
❖ Over 10 years in Cyber Security.
❖ Certifications(CCISO, CISSP, CISM, CISA, CEH, ITIL, MCSE, MCDBA and
others).
❖ London Graduate School with Common Wealth University,
2020(Leadership Summit).
❖ University of Liverpool, 2011; MSc. In Information Systems
Management(ISM).
❖ University of Port Harcourt,1998/1999; BSc. In Computer
Science/Mathematics.
❖ Professional membership with (ISC)2 and many other Information Security
Bodies and Associations.
❖ As Organizer, Speaker, Delegate or Volunteer during Technology or
Infosec Conferences.
Effectiveness of Cyber Security Awareness
• Introduction
• Our Obligations in Cyber Security.
• The Concepts of Cyber Security Awareness Month
• Statistical Report on Cyber Crimes.
• The Effective Cyber Security Awareness Program.
• Best Practices in Cyber Security Awareness.
• Conclusion
Introduction
The Digital Era
Internet of
Things
Evolvement of tech Network of Infrastructures Business Transformations Seamless flow of
Info
The Cybernetics
Mobile & Web Apps Social Media Internet Service Providers Cloud Tech
Artificial
Intelligence
Machine Learning Tech Providers
Global Village Cautious Trading
There is no Awareness without Cyber Security and no Cyber Security without the Digital Era.
Digital Identity
Metaverse
E-learning
Our Obligations in Securing the Digital Age
To assure to a reasonable extent that the Digital
workflow, processes and devices are secured and
protected from unauthorized Disclosures,
Modifications and destructions.
To connect with like-minded Professionals for
proactive collaborations, Knowledge-sharing, relevant
education and training that would inspire them to
assist others to protect their cyber space.
To ensure that the various communities and
the masses are getting enlightened and
altering their security culture accordingly
The Concepts of Cyber Security Awareness Month
Cyber security and Infrastructure Security Agency (CISA) and
National Cyber Security Alliance (NCSA) collaborated with the
concern that sensitive information of individuals could be
unduly exposed and tampered with.
The initiative was driven by the high rate of cyber related crimes
and Threats on daily basis, terribly affecting almost everyone
The high rise and evolvement of Technology especially from the
inception of the Covid-19 Pandemic , demands a high level of
security posture and consciousness.
Cyber Security Awareness is the process of impacting necessary
knowledge that would promote and alter the security culture of a
group or an individual
Statistical Report on Cyber Crimes.
Statistical report on Cyber Crimes
phishing attacks and cyber attacks now occurring
every 39 seconds
95% of all cyber attacks are caused by human error
64% of companies worldwide have experienced at least
one form of cyber attack
The global costs of cybercrime is expected to reach $10.5
trillion, annually by 2025
Ongoing Cyber Security Awareness Efforts
The growth curve is high
Impressive Awareness initiatives from both
individuals and groups of Cyber Security
Professionals .
Cyber Security Professionals take the Lead in
mobilising a security centric culture across all
departments in their organization
Impressive Collaborations among security
bodies too
But, we can do better with measurable
outcomes
Approach to Effective Cyber Security
Awareness
Drive your Awareness Program from the
Top to establish a buy-in.
Run with the SMART(Simple,
Measurable , Achievable, Realistic and
Timely) principle in mind. KPIs and KRAs
Narrow it down to a focused Audience
group, based on Job Roles and nature of
Business
Let the learning experience be more
interactive and practicable
Impromptu Campaigns driven from the
Top would be spot-on.
Outcomes could be measured from the
number of Incidents reported before and
after the Awareness program
Subject your training to align with the
Security Policies and Business Objectives of
your organization
Follow up on them with reinforcement of
knowledge through monitoring or Log-on
Banners
Do not streamline the Awareness training
to only Head Office Employees , carry
those in other remote locations along.
Employ a Risk-based Approach to tailor
the Cyber Security Awareness on high risk
areas.
Best Practices in Cyber Security Awareness.
Collaborate, Collaborate, Collaborate with
others such as NCSA, Knowbe4 .Enroll as a
Security Awareness Champion
Align with Best Practices and established
Standards such as ISO 27001 on Information
Security Management System(ISMS) and
NIST
Pay attention to Due Diligence
Align with both local and International
Regulatory bodies
Aim at the Business Value Chain of your
organisation(BIA and Risk Analysis)
Leverage on GAP Analysis to outline your
strengths and weak areas.
Make it resilient and cost-effective
Make it a regular affair, not just during the
Awareness Month
Always think outside the box for a more
productive outcome.
Carry everyone along as Cyber Security is
everyone’s responsibilities
Conclusion
To achieve an optimal level of effectiveness in Cyber
Security Awareness:
See yourself in the Cyber with a level of sensitivity and discernment
around your digital assets and those of your organization
Cyber Security Professionals should collaborate with others across all
states and local governments to evangelize Security Awareness.
we must achieve a Sustainable Digital Age without a sustainable Cyber
Security and Awareness around it.
we must be granular in our Security Awareness Outreaches, think for the
rural areas too.
Keep up the Mentee/Mentor/reverse mentoring relationships,.
Together, we can stay ahead of the Cyber Criminals
Thank You
Let’s Connect:
https://www.linkedin.com/in/chinatu-
uzuegbu-67593119/

Weitere ähnliche Inhalte

Ähnlich wie Effectiveness of Cyber Security Awareness.pdf

ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
guestc6f137f
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
pgpmikey
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
Daren Dunkel
 

Ähnlich wie Effectiveness of Cyber Security Awareness.pdf (20)

Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
 
Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015
 

Mehr von Chinatu Uzuegbu

Mehr von Chinatu Uzuegbu (19)

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Effectiveness of Cyber Security Awareness.pdf

  • 1. Chinatu Uzuegbu CCISO, CISSP, CISM, CISA, CEH, …. Managing Cyber Security Consultant RoseTech CyberCrime Solutions Limited Effectiveness of Cyber Security Awareness
  • 2. Chinatu Uzuegbu https://www.linkedin.com/in/chinatu-uzuegbu-67593119/ https://de.slideshare.net/Chinatu ❖ Founder and Managing Security Consultant with RoseTech CyberCrime Solutions Limited. ❖ Founding Past President of (ISC)2 Nigeria Chapter. ❖ Member of the global (ISC)2 Chapter Advisory Committee(CAC). ❖ Mentor with the Open Cyber Security Mentorship Program(OCMP). ❖ Top 50 Women in Cyber Security Finalist by Cyber in Africa, 2020 accolade. ❖ WomenTech Global Ambassador of WomenTech Network. ❖ Member of the Advisory board of VigiTrust, Ireland. ❖ Over 20 years wealth of experience in IT (2000 till date). ❖ Over 10 years in Cyber Security. ❖ Certifications(CCISO, CISSP, CISM, CISA, CEH, ITIL, MCSE, MCDBA and others). ❖ London Graduate School with Common Wealth University, 2020(Leadership Summit). ❖ University of Liverpool, 2011; MSc. In Information Systems Management(ISM). ❖ University of Port Harcourt,1998/1999; BSc. In Computer Science/Mathematics. ❖ Professional membership with (ISC)2 and many other Information Security Bodies and Associations. ❖ As Organizer, Speaker, Delegate or Volunteer during Technology or Infosec Conferences.
  • 3. Effectiveness of Cyber Security Awareness • Introduction • Our Obligations in Cyber Security. • The Concepts of Cyber Security Awareness Month • Statistical Report on Cyber Crimes. • The Effective Cyber Security Awareness Program. • Best Practices in Cyber Security Awareness. • Conclusion
  • 4. Introduction The Digital Era Internet of Things Evolvement of tech Network of Infrastructures Business Transformations Seamless flow of Info The Cybernetics Mobile & Web Apps Social Media Internet Service Providers Cloud Tech Artificial Intelligence Machine Learning Tech Providers Global Village Cautious Trading There is no Awareness without Cyber Security and no Cyber Security without the Digital Era. Digital Identity Metaverse E-learning
  • 5. Our Obligations in Securing the Digital Age To assure to a reasonable extent that the Digital workflow, processes and devices are secured and protected from unauthorized Disclosures, Modifications and destructions. To connect with like-minded Professionals for proactive collaborations, Knowledge-sharing, relevant education and training that would inspire them to assist others to protect their cyber space. To ensure that the various communities and the masses are getting enlightened and altering their security culture accordingly
  • 6. The Concepts of Cyber Security Awareness Month Cyber security and Infrastructure Security Agency (CISA) and National Cyber Security Alliance (NCSA) collaborated with the concern that sensitive information of individuals could be unduly exposed and tampered with. The initiative was driven by the high rate of cyber related crimes and Threats on daily basis, terribly affecting almost everyone The high rise and evolvement of Technology especially from the inception of the Covid-19 Pandemic , demands a high level of security posture and consciousness. Cyber Security Awareness is the process of impacting necessary knowledge that would promote and alter the security culture of a group or an individual
  • 7. Statistical Report on Cyber Crimes.
  • 8. Statistical report on Cyber Crimes phishing attacks and cyber attacks now occurring every 39 seconds 95% of all cyber attacks are caused by human error 64% of companies worldwide have experienced at least one form of cyber attack The global costs of cybercrime is expected to reach $10.5 trillion, annually by 2025
  • 9. Ongoing Cyber Security Awareness Efforts The growth curve is high Impressive Awareness initiatives from both individuals and groups of Cyber Security Professionals . Cyber Security Professionals take the Lead in mobilising a security centric culture across all departments in their organization Impressive Collaborations among security bodies too But, we can do better with measurable outcomes
  • 10. Approach to Effective Cyber Security Awareness Drive your Awareness Program from the Top to establish a buy-in. Run with the SMART(Simple, Measurable , Achievable, Realistic and Timely) principle in mind. KPIs and KRAs Narrow it down to a focused Audience group, based on Job Roles and nature of Business Let the learning experience be more interactive and practicable Impromptu Campaigns driven from the Top would be spot-on. Outcomes could be measured from the number of Incidents reported before and after the Awareness program Subject your training to align with the Security Policies and Business Objectives of your organization Follow up on them with reinforcement of knowledge through monitoring or Log-on Banners Do not streamline the Awareness training to only Head Office Employees , carry those in other remote locations along. Employ a Risk-based Approach to tailor the Cyber Security Awareness on high risk areas.
  • 11. Best Practices in Cyber Security Awareness. Collaborate, Collaborate, Collaborate with others such as NCSA, Knowbe4 .Enroll as a Security Awareness Champion Align with Best Practices and established Standards such as ISO 27001 on Information Security Management System(ISMS) and NIST Pay attention to Due Diligence Align with both local and International Regulatory bodies Aim at the Business Value Chain of your organisation(BIA and Risk Analysis) Leverage on GAP Analysis to outline your strengths and weak areas. Make it resilient and cost-effective Make it a regular affair, not just during the Awareness Month Always think outside the box for a more productive outcome. Carry everyone along as Cyber Security is everyone’s responsibilities
  • 12. Conclusion To achieve an optimal level of effectiveness in Cyber Security Awareness: See yourself in the Cyber with a level of sensitivity and discernment around your digital assets and those of your organization Cyber Security Professionals should collaborate with others across all states and local governments to evangelize Security Awareness. we must achieve a Sustainable Digital Age without a sustainable Cyber Security and Awareness around it. we must be granular in our Security Awareness Outreaches, think for the rural areas too. Keep up the Mentee/Mentor/reverse mentoring relationships,. Together, we can stay ahead of the Cyber Criminals