SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
© IT Governance Ltd 2018
Presenter:StefanieRetfalvi,LearningDesign&SolutionsConsultant,ITGovernance
Creating an effective Cyber Security
Awareness Programme
© IT Governance Ltd 2018
Agenda
01
02
03
04
06
07
?
Q&A
05
Cyber Security
Awareness
Programme
About IT Governance
& Introduction
© IT Governance Ltd 2018
About IT Governance
© IT Governance Ltd 2018
Introduction
• Stefanie Ildiko RETFALVI
• Learning Design & Solutions Consultant
• International cross-sectorexperience
© IT Governance Ltd 2018
Why a Programme?
• Learner fatigue.
• The broader, the better.
• Stronger defence against threats / lower risk thanks to increased
awareness.
• Best ROI due to risk matrix and prioritisation.
• Credibility and trust.
• Empowering of employees to make informed decisions (size of security
function = as large as the organisation).
• The consequences of non-compliance.
© IT Governance Ltd 2018
© IT Governance Ltd 2018
Effective Planning
© IT Governance Ltd 2018
Effective Planning
Learning Needs Analysis
This should:
 Provide an overview of your employees’ level of awareness.
 Allow to identify any common gaps in knowledge.
 Give an indication of employee motivation and attitudes regarding
security.
 Pinpoint trends in learning style preferences of the workforce.
 Design structured learning path, mapping a number of suitable
interventions to recommended timescales.
 Identify business & learning objectives, as well as relevant KPIs for
annual evaluation.
MotivationMotivation
TimescalesTimescales
© IT Governance Ltd 2018
Sample Architecture
© IT Governance Ltd 2018
Sample Architecture
It is important to offer a modern
mix of different learning and
communications tools to
address individuals’ diverse
needs and preferences.
© IT Governance Ltd 2018
Raising Awareness
© IT Governance Ltd 2018
Why?
Winning Hearts and Minds
To attain the highest levels of
impact, it is important to generate
personal investment at the start of
the programme.
© IT Governance Ltd 2018
Why?
Sample Solution: An impactful opening Communications Piece
This should:
 Grab employees’ attention.
 Ensure that the audience views the training as more than just a ‘tick-box‘.
 Effectively convey an overview of key messages in a concise, highly visual
format.
 Help to overcome any potential resistance to the initiative.
 Encourage reflection.
 Serve as a versatile learning and communications piece that can not only be
used as an introduction to e-learning but also be deployed to internal
communications channels and be used as a standalone asset.
© IT Governance Ltd 2018
Example
© IT Governance Ltd 2018
Delivering Knowledge
& Skills
© IT Governance Ltd 2018
What?
Delivering relevant Knowledge & Skills
For optimal knowledge retention,
information needs to be clear,
accessible and easy to digest.
© IT Governance Ltd 2018
What?
Sample Solution: An online learning module
This should:
 Convey content in concise units, ensuring that key information
is accessible and easy to digest.
 Make effective use of visualisation techniques to optimise
knowledge retention.
 Provide a positive user experience.
 Be based on proven instructional design methods.
© IT Governance Ltd 2018
Example
© IT Governance Ltd 2018
Transfer to the Workplace
& Behaviour ChangeJT34
Slide 21
JT34 and
Jonathan Todd, 10/01/2018
© IT Governance Ltd 2018
How?
Encouraging transfer to the workplace
It is not enough to know what best
practice involves. Learners need to
apply their obtained knowledge in
their everyday activities.
© IT Governance Ltd 2018
How?
Sample Solution: Activities and Scenarios
These should:
 Be meaningful, encouraging deep reflection and the
transfer of acquired knowledge to the workplace.
 Make learners active participants by challenging them to
recall key information in relevant contexts.
 Prompt participants to identify risks and apply best
practice in situations that could arise in real life on the job.
© IT Governance Ltd 2018
Example
© IT Governance Ltd 2018
Evaluation &
Reinforcement
JT38
Slide 25
JT38 and
Jonathan Todd, 10/01/2018
© IT Governance Ltd 2018
Evaluation
Effectively measuring Success
Continual monitoring of progress will
ensure that learners have achieved
the required level of knowledge and
understanding.
© IT Governance Ltd 2018
Example
© IT Governance Ltd 2018
Reinforcement
Ensuring Key Messages stay alive
Once the programme is finished, it is
important to ensure that cyber
security remains at the forefront of
learners’ minds.
© IT Governance Ltd 2018
Example
© IT Governance Ltd 2018
Conclusion &
Your turn! Q&A
© IT Governance Ltd 2018
Conclusion
© IT Governance Ltd 2018
Stay in touch!
Call us
+44 (0)333 800 7000
Email us
servicecentre@itgovernance.co.uk
Visit our website
www.itgovernance.co.uk
Like us on Facebook
/ITGovernanceLtd
Follow us on Twitter
/itgovernance
Join us on LinkedIn
/company/it-governance
Read our blog
www.itgovernance.co.uk/blog
© IT Governance Ltd 2018
Q&A
Queries?
Understanding?
Clarification?

Weitere ähnliche Inhalte

Was ist angesagt?

It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001Iris Maaß
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsIgnyte Assurance Platform
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?PECB
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
Gdpr data p rotection
Gdpr data p rotectionGdpr data p rotection
Gdpr data p rotectionFileOM
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Goutama Bachtiar
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisRahul Neel Mani
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy James Deiotte
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...Global Business Events
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorMSpadea
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Benoît H. Dicaire
 

Was ist angesagt? (20)

It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?How to improve resilience and respond better to Cyber Attacks with ISO 22301?
How to improve resilience and respond better to Cyber Attacks with ISO 22301?
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
Gdpr data p rotection
Gdpr data p rotectionGdpr data p rotection
Gdpr data p rotection
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy
 
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdfIso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
Iso 28000 supply chain white paper lakshy rev02_17022015 low.pdf
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services SectorLegal And Regulatory Dp Challenges For The Financial Services Sector
Legal And Regulatory Dp Challenges For The Financial Services Sector
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
 

Ähnlich wie Creating Effective Cyber Security Awareness Program

Practical Use Case for Lean IT Kaizen
Practical Use Case for Lean IT KaizenPractical Use Case for Lean IT Kaizen
Practical Use Case for Lean IT KaizenLean IT Association
 
Building the Next Generation of Security Talent
Building the Next Generation of Security TalentBuilding the Next Generation of Security Talent
Building the Next Generation of Security TalentLorene Ryal
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessITpreneurs
 
[AIIM18] Does Your C-Suite Care about Information Governance? They will if yo...
[AIIM18] Does Your C-Suite Care about Information Governance? They will if yo...[AIIM18] Does Your C-Suite Care about Information Governance? They will if yo...
[AIIM18] Does Your C-Suite Care about Information Governance? They will if yo...AIIM International
 
UCISA Digital Futures Programme Presentation.pptx
UCISA Digital Futures Programme Presentation.pptxUCISA Digital Futures Programme Presentation.pptx
UCISA Digital Futures Programme Presentation.pptxucisa
 
How To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsHow To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsTerranova Security
 
Webinar for May 2020 - Putting people skills and cultural change at the heart...
Webinar for May 2020 - Putting people skills and cultural change at the heart...Webinar for May 2020 - Putting people skills and cultural change at the heart...
Webinar for May 2020 - Putting people skills and cultural change at the heart...The Digital Insurer
 
Efficient Courses for your Staff, Volunteers and Donor Management
Efficient Courses for your Staff, Volunteers and Donor ManagementEfficient Courses for your Staff, Volunteers and Donor Management
Efficient Courses for your Staff, Volunteers and Donor ManagementTechSoup
 
Digital transformation of the enterprise - how to achieve digital literacy in...
Digital transformation of the enterprise - how to achieve digital literacy in...Digital transformation of the enterprise - how to achieve digital literacy in...
Digital transformation of the enterprise - how to achieve digital literacy in...Digital Chameleon Learning
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Community IT Innovators
 
Mars Presentation at the Supply Chain Insights Global Summit 2018
Mars Presentation at the Supply Chain Insights Global Summit 2018Mars Presentation at the Supply Chain Insights Global Summit 2018
Mars Presentation at the Supply Chain Insights Global Summit 2018Lora Cecere
 
ISBA "Digital decision making and predicting spend"
ISBA "Digital decision making and predicting spend"ISBA "Digital decision making and predicting spend"
ISBA "Digital decision making and predicting spend"InspirEdu
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attranhcrowley
 
corporate-digital-learning-2015-KPMG
corporate-digital-learning-2015-KPMGcorporate-digital-learning-2015-KPMG
corporate-digital-learning-2015-KPMGChristian Walton
 
Embracing Digital Agility_ A Paradigm Shift For IT Consultants.pdf
Embracing Digital Agility_ A Paradigm Shift For IT Consultants.pdfEmbracing Digital Agility_ A Paradigm Shift For IT Consultants.pdf
Embracing Digital Agility_ A Paradigm Shift For IT Consultants.pdfjeyavel3
 
Testing Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTesting Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTechWell
 
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...Dr. Natalie Petouhoff
 
Digital Transformation Guide
Digital Transformation GuideDigital Transformation Guide
Digital Transformation GuideDigital Chameleon
 
Digital and agile transformation vision 2030 - blockchain event april 2019
Digital and agile transformation   vision 2030 - blockchain event april 2019Digital and agile transformation   vision 2030 - blockchain event april 2019
Digital and agile transformation vision 2030 - blockchain event april 2019Alejandro Debenedet
 
How to write a great digital strategy
How to write a great digital strategyHow to write a great digital strategy
How to write a great digital strategysimonwakeman
 

Ähnlich wie Creating Effective Cyber Security Awareness Program (20)

Practical Use Case for Lean IT Kaizen
Practical Use Case for Lean IT KaizenPractical Use Case for Lean IT Kaizen
Practical Use Case for Lean IT Kaizen
 
Building the Next Generation of Security Talent
Building the Next Generation of Security TalentBuilding the Next Generation of Security Talent
Building the Next Generation of Security Talent
 
Agile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky BusinessAgile and Risk Management: How Agile Becomes Risky Business
Agile and Risk Management: How Agile Becomes Risky Business
 
[AIIM18] Does Your C-Suite Care about Information Governance? They will if yo...
[AIIM18] Does Your C-Suite Care about Information Governance? They will if yo...[AIIM18] Does Your C-Suite Care about Information Governance? They will if yo...
[AIIM18] Does Your C-Suite Care about Information Governance? They will if yo...
 
UCISA Digital Futures Programme Presentation.pptx
UCISA Digital Futures Programme Presentation.pptxUCISA Digital Futures Programme Presentation.pptx
UCISA Digital Futures Programme Presentation.pptx
 
How To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsHow To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and Metrics
 
Webinar for May 2020 - Putting people skills and cultural change at the heart...
Webinar for May 2020 - Putting people skills and cultural change at the heart...Webinar for May 2020 - Putting people skills and cultural change at the heart...
Webinar for May 2020 - Putting people skills and cultural change at the heart...
 
Efficient Courses for your Staff, Volunteers and Donor Management
Efficient Courses for your Staff, Volunteers and Donor ManagementEfficient Courses for your Staff, Volunteers and Donor Management
Efficient Courses for your Staff, Volunteers and Donor Management
 
Digital transformation of the enterprise - how to achieve digital literacy in...
Digital transformation of the enterprise - how to achieve digital literacy in...Digital transformation of the enterprise - how to achieve digital literacy in...
Digital transformation of the enterprise - how to achieve digital literacy in...
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
Mars Presentation at the Supply Chain Insights Global Summit 2018
Mars Presentation at the Supply Chain Insights Global Summit 2018Mars Presentation at the Supply Chain Insights Global Summit 2018
Mars Presentation at the Supply Chain Insights Global Summit 2018
 
ISBA "Digital decision making and predicting spend"
ISBA "Digital decision making and predicting spend"ISBA "Digital decision making and predicting spend"
ISBA "Digital decision making and predicting spend"
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attr
 
corporate-digital-learning-2015-KPMG
corporate-digital-learning-2015-KPMGcorporate-digital-learning-2015-KPMG
corporate-digital-learning-2015-KPMG
 
Embracing Digital Agility_ A Paradigm Shift For IT Consultants.pdf
Embracing Digital Agility_ A Paradigm Shift For IT Consultants.pdfEmbracing Digital Agility_ A Paradigm Shift For IT Consultants.pdf
Embracing Digital Agility_ A Paradigm Shift For IT Consultants.pdf
 
Testing Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTesting Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for Success
 
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
 
Digital Transformation Guide
Digital Transformation GuideDigital Transformation Guide
Digital Transformation Guide
 
Digital and agile transformation vision 2030 - blockchain event april 2019
Digital and agile transformation   vision 2030 - blockchain event april 2019Digital and agile transformation   vision 2030 - blockchain event april 2019
Digital and agile transformation vision 2030 - blockchain event april 2019
 
How to write a great digital strategy
How to write a great digital strategyHow to write a great digital strategy
How to write a great digital strategy
 

Mehr von IT Governance Ltd

Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance IT Governance Ltd
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer IT Governance Ltd
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 

Mehr von IT Governance Ltd (20)

Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Preparing for EU GDPR
Preparing for EU GDPRPreparing for EU GDPR
Preparing for EU GDPR
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 

Kürzlich hochgeladen

Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 

Kürzlich hochgeladen (20)

Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 

Creating Effective Cyber Security Awareness Program

  • 1. © IT Governance Ltd 2018 Presenter:StefanieRetfalvi,LearningDesign&SolutionsConsultant,ITGovernance Creating an effective Cyber Security Awareness Programme
  • 2. © IT Governance Ltd 2018 Agenda 01 02 03 04 06 07 ? Q&A 05 Cyber Security Awareness Programme
  • 3. About IT Governance & Introduction
  • 4. © IT Governance Ltd 2018 About IT Governance
  • 5. © IT Governance Ltd 2018 Introduction • Stefanie Ildiko RETFALVI • Learning Design & Solutions Consultant • International cross-sectorexperience
  • 6. © IT Governance Ltd 2018 Why a Programme? • Learner fatigue. • The broader, the better. • Stronger defence against threats / lower risk thanks to increased awareness. • Best ROI due to risk matrix and prioritisation. • Credibility and trust. • Empowering of employees to make informed decisions (size of security function = as large as the organisation). • The consequences of non-compliance.
  • 7. © IT Governance Ltd 2018
  • 8. © IT Governance Ltd 2018 Effective Planning
  • 9. © IT Governance Ltd 2018 Effective Planning Learning Needs Analysis This should:  Provide an overview of your employees’ level of awareness.  Allow to identify any common gaps in knowledge.  Give an indication of employee motivation and attitudes regarding security.  Pinpoint trends in learning style preferences of the workforce.  Design structured learning path, mapping a number of suitable interventions to recommended timescales.  Identify business & learning objectives, as well as relevant KPIs for annual evaluation.
  • 11. © IT Governance Ltd 2018 Sample Architecture
  • 12. © IT Governance Ltd 2018 Sample Architecture It is important to offer a modern mix of different learning and communications tools to address individuals’ diverse needs and preferences.
  • 13. © IT Governance Ltd 2018 Raising Awareness
  • 14. © IT Governance Ltd 2018 Why? Winning Hearts and Minds To attain the highest levels of impact, it is important to generate personal investment at the start of the programme.
  • 15. © IT Governance Ltd 2018 Why? Sample Solution: An impactful opening Communications Piece This should:  Grab employees’ attention.  Ensure that the audience views the training as more than just a ‘tick-box‘.  Effectively convey an overview of key messages in a concise, highly visual format.  Help to overcome any potential resistance to the initiative.  Encourage reflection.  Serve as a versatile learning and communications piece that can not only be used as an introduction to e-learning but also be deployed to internal communications channels and be used as a standalone asset.
  • 16. © IT Governance Ltd 2018 Example
  • 17. © IT Governance Ltd 2018 Delivering Knowledge & Skills
  • 18. © IT Governance Ltd 2018 What? Delivering relevant Knowledge & Skills For optimal knowledge retention, information needs to be clear, accessible and easy to digest.
  • 19. © IT Governance Ltd 2018 What? Sample Solution: An online learning module This should:  Convey content in concise units, ensuring that key information is accessible and easy to digest.  Make effective use of visualisation techniques to optimise knowledge retention.  Provide a positive user experience.  Be based on proven instructional design methods.
  • 20. © IT Governance Ltd 2018 Example
  • 21. © IT Governance Ltd 2018 Transfer to the Workplace & Behaviour ChangeJT34
  • 22. Slide 21 JT34 and Jonathan Todd, 10/01/2018
  • 23. © IT Governance Ltd 2018 How? Encouraging transfer to the workplace It is not enough to know what best practice involves. Learners need to apply their obtained knowledge in their everyday activities.
  • 24. © IT Governance Ltd 2018 How? Sample Solution: Activities and Scenarios These should:  Be meaningful, encouraging deep reflection and the transfer of acquired knowledge to the workplace.  Make learners active participants by challenging them to recall key information in relevant contexts.  Prompt participants to identify risks and apply best practice in situations that could arise in real life on the job.
  • 25. © IT Governance Ltd 2018 Example
  • 26. © IT Governance Ltd 2018 Evaluation & Reinforcement JT38
  • 27. Slide 25 JT38 and Jonathan Todd, 10/01/2018
  • 28. © IT Governance Ltd 2018 Evaluation Effectively measuring Success Continual monitoring of progress will ensure that learners have achieved the required level of knowledge and understanding.
  • 29. © IT Governance Ltd 2018 Example
  • 30. © IT Governance Ltd 2018 Reinforcement Ensuring Key Messages stay alive Once the programme is finished, it is important to ensure that cyber security remains at the forefront of learners’ minds.
  • 31. © IT Governance Ltd 2018 Example
  • 32. © IT Governance Ltd 2018 Conclusion & Your turn! Q&A
  • 33. © IT Governance Ltd 2018 Conclusion
  • 34. © IT Governance Ltd 2018 Stay in touch! Call us +44 (0)333 800 7000 Email us servicecentre@itgovernance.co.uk Visit our website www.itgovernance.co.uk Like us on Facebook /ITGovernanceLtd Follow us on Twitter /itgovernance Join us on LinkedIn /company/it-governance Read our blog www.itgovernance.co.uk/blog
  • 35. © IT Governance Ltd 2018 Q&A Queries? Understanding? Clarification?