#113 Keeping Information Security Awareness Training Fresh
|
|
- Prosper Scott
- 8 years ago
- Views:
Transcription
1 #113 Keeping Information Security Awareness Training Fresh Peter R. Bitterli, CISA Principal, Bitterli Consulting AG Please observe the copyright: You are allowed to use and further distribute this presentation only with this copyright notice attached. If you use parts of this documentation in presentations or other diagrams you have to refer to the source. Any commercial use of this presentation is only allowed with written consent of the author.
2 Abstract Keeping information security awareness training fresh This session will provide insight into the tricks of running a successful information security awareness campaign. It will explain both a scientific and pragmatic means of analyzing the need for improvement and will help the information security manager recognize the importance of structuring the campaign for different target audiences (e.g., managers, employees, IT staff) and their specific cultural and professional backgrounds. The session will show typical unwanted behaviour of the target audiences and some of their special characteristics that can help in convincing them of something they may not initially be keen to implement
3 Learning Objectives The participants will learn about Developing and running an international awareness campaign Analyzing the needs for a campaign and its specific goals and objectives The advantages and disadvantages of typical campaign components (e.g., brochures, training, video, e-learning) Taking advantage of successful marketing and sales techniques Measuring the success of campaign elements
4 Content Keeping information security awareness training fresh Why is it so difficult to sell security? The basics of selling security Target audience analysis More scientific approaches How to use awareness tools Awareness video (Swiss Re) Wrap-up
5 Part 1: Introduction to Information Security Awareness
6 Need for a formal Program Security awareness is a combination of culture and behaviour It is a fact that the attitude and behaviour of staff have a high impact on the quality and security of any type of services It is therefore inevitable to prompt all persons involved to be careful when creating, processing, using or handling information and information systems
7 Target of any Campaign Only a longer lasting program will raise awareness to the necessary level high internalization low personal commitment contact understanding awareness adoption positive image acceptance Level 3 time Level 2 Level 1 The overall target of any awareness campaign should be to convey the correct security and quality aware behaviour so that a high level of personal commitment can be achieved.
8 Level 1: Basic Understanding The goal of level 1 is to introduce a basic understanding why quality and security are needed for the necessity to personally contribute through correct behaviour Level 1 typically addresses all employees (users of IT) and all levels of management
9 Level 2: Quality & Security Thinking The attitude of every member of staff must be changed sustainable. To do this, we must show them how they as affected person can contribute to a high level of quality and security Level 2 typically also addresses more specific target groups (e.g. software developers, system administrators, business managers responsible for internal controls)
10 Level 2: Quality & Security Thinking Level 2 can only be reached with the support of management and through the integrations of quality and security into their daily tasks, e.g. Fixed item on agenda of regular meetings Integration into strategy and planning processes Integration into objectives for subordinates Monitoring and compliance reviews of policies
11 Level 3: Towards Internalization Only where quality and security are considered automatically, an adequate level of security will be reached Level 3 means that any person involved considers quality and security aspects with every action or decision
12 Level 3: Towards Internalization An internalization will only be reached, where the following requirements can be met: Binding and understandable regulations for quality and security Incentives for correct conduct Sanctions for non-compliance, based on concise criteria Ongoing comparison between different areas using benchmarking
13 Part 2: Selling Information Security Awareness: the Basics
14 Selling Security is difficult Some of the most common reasons for failure of awareness campaigns Unsuccessful track record Failure to fulfil management s expectations Lack of organisational understanding by security staff Failure in coordination between the control functions Evolving organisation structures Lack of coordinated security sales program
15 Business Objectives How to sell (IT) security Know your organisation s primary business objectives Familiarise with industry / business operations: Annual reports Organisational charts Strategic plans Interviews of business managers Analyse business needs and what could threaten the objectives being met
16 Sales Strategy How to sell (IT) security Sell to more than one level of management Sell the security professional (yourself) first Avoid negative security messages Know sales techniques General marketing techniques Variety of approaches available Don t forget: Personal presentations One-to-one selling
17 Selling to Managers (I) How to sell (IT) security Security Policy, Baseline Control, Guidelines Present and discuss; ask for feedback Let the managers explain them to subordinates Awareness materials Present and discuss; ask for accompanying letter Have them talk about this during meetings Distribute articles about security With a commenting letter In person ( have you seen this?)
18 Selling to Managers (II) How to sell (IT) security Report on security matters In person once every month Fixed item on agenda for meetings Encourage managers to attend Meetings, seminars, conferences on security Be prepared before facing management Anticipate questions and objections (FAQ) Ask them for a decision Handout material Follow-up visit
19 More Marketing Aspects How to sell (IT) security Make people want to be secure Display high-level support Encourage people to be alert Point out the risks Be simple but comprehensive Be targeted and never assume knowledge Be entertaining and amusing Be two-way
20 Part 3: Analyse the Target Audiences
21 Select your Target Groups (I) Whom do you want to address with your awareness campaign? Users Normal With access to sensitive data Home office Travelling users With laptop, PDA, agenda, handy Temps New joiners Management Your boss Business managers Executive management Control related Legal Compliance Human Resources Controlling Data Protection Officer
22 Select your Target Groups (II) Whom do you want to address with your awareness campaign? IT Manager(s) Developers Operations Administrators Help Desk External Clients Business partners Audit committee Outsourcing providers
23 Analyse your Target Groups Know your enemy if you want to be successful For every target group collect: Description Major (security) concerns of target group members Unwanted behaviour Expected behaviour Possible delivery mechanisms (marketing ideas) You will find examples on the following slides for three of the many target groups: managers, users, IT staff
24 Target Group: Management (I) Typical example of the results of target group analysis Description Persons responsible for a department a (large) team a specific area/topic (e.g. Data Protection Officer, Compliance) Hierarchically senior Better paid (Often) better educated Career oriented Major (security) concerns Unavailability of data and computing resources Unauthorised access to data (e.g. sensitive or confidential data) Too high a level of access for temps etc. Internet & third party access
25 Target Group: Management (II) Typical example of the results of target group analysis Unwanted behaviour Are not all concerned about (IT) security See no need to provide resources for quality and/or security Do not monitor their area of responsibility Are often under high pressure to perform Keep problems to themselves Unwanted behaviour (cont) Set bad examples Pass on their passwords to secretaries Grant too much access to 3 rd parties (consultants, business partners)
26 Target Group: Management (III) Typical example of the results of target group analysis Expected behaviour Really care about security Provide resources for quality and/or security Check back whether their orders have been met Possible delivery mechanisms Security is part of agenda in all regular meetings MbO and will impact bonus standard management trainings Train-the-trainers Quarterly security management report
27 Part 4: Analyse the Target Audiences a more Scientific Approach
28 Behaviorism can help Many different scientific approaches Behaviorism shows, how persons really behave what persons really think Scientific approach Questionnaires Interviews Observation (video, measuring brain currents, ) Supports effectiveness Problems/concerns Behaviour Motivation You know what makes them tick Supports efficiency Focus on target group(s) Focus on important issues
29 Behaviorism can help Two of the many approaches explained 4ways of Life Analysis Grouping based on predefined criteria Supports focussing on most common types, e.g. Hierarchists Individualists Risk & Security Perceptions Grouping based on common criteria Supports focussing on just a few factors Will produce highly valuable starting-points for campaign
30 4ways of life analysis Prof. Dake Systematic and scientific assessment of cultural biases Fatalist Emphasise gains and losses Views Nature is a lottery, capricious Outcomes are a function of chance Preferences Weigh gains against losses Low degree of social contact Individualist High degree of social regulation Views Nature is resilient Outcomes are a personal responsibility Preferences Personal responsibility Free of control Oppose top down intervention Dislike organised societal learning Emphasise responsibility Low degree of social regulation Hierarchist Emphasise risk assessment Views Nature is tolerant if treated with care Outcomes can be managed to be sustainable Preferences Regulators/contract to facilitate commerce Voluntary arrangements brokered by markets and prices High degree of social contact Views Nature is vulnerable Outcomes require altruism and common effort Preferences Precaution (irresponsible to take action which could harm the current or future state) Emphasise impact Egalitarian
31 4ways of life analysis Prof. Dake Using the results of such a scientific analysis to our advantage We can/should focus on most frequent types Hierarchists Emphasize importance of technology for decision making Focus on rules and expected norms of behaviour Message must be delivered by, or jointly, with line management Individualists Appeal to personal responsibility Do not emphasize strict rules, policies and procedures Use other distribution channels than organized training Use MbO and appraisal processes to reward desired behaviour
32 Risk and Security Perceptions Scientific background All persons simplify information to enable decisions Using questionnaires and mathematical methods to find out how persons perceive and simplify complex information The different ways of combining information can provide insights into thinking, blind spots,
33 Risk and Security Perceptions Assessment methodology 18 risk scenarios (stimuli) 13 risk elements (attributes) 7-point bipolar scale (yardstick) Overall risk Frequency Likelihood Stress Accidental/deliberate Recovery Technology/human cause Costs Individual/ organizational effects Effects contained within/outside organisation Embarrassment Reputation Major/minor consequences Employee uses p/w Data entry error Coffee damages equip Y2k failure Slow machines No training Power cut Credit cards stole Internet use in work Hacker steals Payroll data lost Disc stolen Computer virus Disclose personal data Eye strain Software fault Poor software Obsolete system
34 Risk and Security Perceptions Presenting the results (UK Financial Sector) Frequency Likelihood Probability payroll data lost disc stolen hacker steals y2k failure computer virus disclose personal data employee uses p/w credit cards stolen coffee damages equip obsolete system s/w fault Recovery Reputation Consequences Effects in/out Overall risk Costs Tech/Human causes Seriousness poor s/w slow machines power cut data entry error no training eye strain internet use in work Technology/Human causes
35 Security Perceptions Survey Results of such a survey give valuable insight (managers) Managers concentrate for their personal risk evaluation on: impact on themselves (embarrassment) and organization (reputation) past events (frequency) and not likelihood of an event happening in future Managers should (also) observe: Recoverability Overall consequences (impact) Causes of possible problems Probability not freqency
36 Security Perceptions Survey Results of such a survey give valuable insight (IT staff) IT staff think about: whom they can blame (human cause or technical failure) how to manage risks costs alone (don t use other factors i.e. reputation, embarrassment, ) IT staff should focus more on: Individual and/or organizational effects Accidental/deliberate causes Embarrassment and stress
37 Part 5: How to use Awareness Tools
38 Awareness Tool Set (I) Wide range of possible marketing elements Paper based Articles Brochures Hand books Posters, mini-posters Stickers Ads Tips & tricks Electronic CBT Videos Intranet web site E-learning / E-lab Others 1-to-1 marketing Security training Security reps
39 Awareness Tool Set (II) Wide range of possible marketing elements Useful things Mouse mat Screen saver Calendar Office material Note pads Post-it Pencils Others Table stand Magnetic signs Napkins, mugs Toilet paper Security calculator Security games Other give-aways
40 Security Brochures Marketing and communication elements for awareness: Example A Advantages Highly attractive Can really raise understanding for security Can be produced to appeal reader Disadvantages Difficult to ensure, that they are read by everybody completely Tendency to contain too much text and be too long winded Outdated when printed One-way communication
41 Security Brochures Marketing and communication elements for awareness
42 Articles in Magazines Marketing and communication elements for awareness: Example B Advantages High attentiveness Interesting and attractive messages Disadvantages Not personalised Need to be done very professional Articles soon loose attractiveness One-way communication
43 Videos Marketing and communication elements for awareness: Example C Advantages Simple short messages Can be easily integrated into other events Huge variety possible Many highly professional videos available for sale Disadvantages Very expensive, esp. if individually produced Have a tendency to be exaggerated Boring for trainers that use videos One-way communication
44 Posters, Mini-posters Marketing and communication elements for awareness: Example D Advantages Highly visible Memorable Concentration on most important messages Disadvantages Distribution often difficult or costly Need space to hang One-way communication
45 Security Trainings Marketing and communication elements for awareness: Example E Advantages Easily tailored Personal Participation can be fun Intensive knowledge transfer Opportunity for questions Highly satisfactory for security officers Disadvantage Time consuming Needs highly sophisticated approach Needs highly qualified trainers Rollout can be organisationally demanding
46 Visualisation Define the corporate identity of the awareness campaign Logos define a security logo Brand / CI define a recognisable brand B/W or colour not just a matter of cost Photographs of people of negative scenes? Cartoons not at all? for specific elements, e.g. e-learning posters in brochures?
47 Cross-linking Elements (II) Some successful examples Example C (2002) Slogan Logo (inofficial) Articles Brochure Posters Training End users Laptop users Give-aways Example C (cont) E-learning for IT Regulations Developer Operations/Admin E-lab Developer Operations/Admin
48 Awareness Life Cycle Complacency unconscious competence Experience Level 3 unconscious incompetence Level 0 conscious competence Level 2 conscious incompetence Awareness Level 1 Training
49 The optimal Campaign My personal experiences of the last 13 years Do a proper project Project leader Steering committee Detailed time plan Set of deliverables Budget for 2-3 years Address campaign to different target audiences A good campaign: Goals defined Target audience analysed Staged over a longer period Multi-channel approach Highly cross-linked
50 If you have any awareness material for my collection
Your Internal Marketing Program
(And Personal Internal Recognition Program) Healthcare Marketing Dr. Umbach & Partner Page 2 of 8 Why should you mastermind an internal marketing program? Your internal marketing programme has the objective
More informationMaking information security awareness and training more effective
Making information security awareness and training more effective Mark Thomson Port Elizabeth Technikon, South Africa Key words: Abstract: Information security, awareness, education, training This paper
More informationHow to gather and evaluate information
09 May 2016 How to gather and evaluate information Chartered Institute of Internal Auditors Information is central to the role of an internal auditor. Gathering and evaluating information is the basic
More informationTHE 360 DEGREE FEEDBACK POCKETBOOK. By Tony Peacock Drawings by Phil Hailstone
THE 360 DEGREE FEEDBACK POCKETBOOK By Tony Peacock Drawings by Phil Hailstone CONTENTS INTRODUCTION 5 The basic concept, link to traditional appraisal, revealing the blind spot, benefits and uses GETTING
More informationPrinciples of Inclusive Communication. An information and self-assessment tool for public authorities
Principles of Inclusive Communication An information and self-assessment tool for public authorities Principles of Inclusive Communication An information and self-assessment tool for public authorities
More informationGroup Onboarding & Rollout Game Plan
Group Onboarding & Rollout Game Plan AllyHealth Client Services September 4th 2014 Prepared for New Group Rollout Plan The AllyHealth New Group Onboarding and Rollout Game Plan At AllyHealth,
More informationSolutions overview. Inspiring talent management. Solutions insight. Inspiring talent management
Solutions overview Inspiring talent management Solutions insight Inspiring talent management Inspiring talent management Intuitive technology that people love to use Lumesse is the only global company
More informationGuide to marketing. www.glasgow.ac.uk/corporatecommunications. University of Glasgow Corporate Communications 3 The Square Glasgow G12 8QQ
Guide to marketing www.glasgow.ac.uk/corporatecommunications University of Glasgow Corporate Communications 3 The Square Glasgow G12 8QQ 0141 330 4919 2 Introduction One of the easiest mistakes to make
More information18 Fresh Ideas for Lawyers. frahanblonde`
18 Fresh Ideas for Lawyers frahanblonde` 18 Fresh Ideas for Lawyers Training Ideas for Law Firms, Legal Departments and Law Professionals Overview At FrahanBlondé, we help our clients in the legal sector
More informationMiddlesbrough Manager Competency Framework. Behaviours Business Skills Middlesbrough Manager
Middlesbrough Manager Competency Framework + = Behaviours Business Skills Middlesbrough Manager Middlesbrough Manager Competency Framework Background Middlesbrough Council is going through significant
More informationAngard Acceptable Use Policy
Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants
More informationBest practices for maximizing uptake of your Employee Share Plan
Best practices for maximizing uptake of your Employee Share Plan Computershare Plan ManAgers EXECUTIVE SUMMARY Employee Share Plans (ESPs) not only allow employees to own part of the company they work
More informationDevelopment trend 3: Cultivating an Information Security Culture
Chapter 6 Development trend 3: Cultivating an Information Security Culture 6.1 Introduction This chapter will investigate the third development trend of the institutional wave as described by Von Solms.
More informationMANAGING PERFORMANCE @ OLD MUTUAL
MANAGING PERFORMANCE @ OLD MUTUAL A guide to the ACT NOW! Multi-Rater process Updated September 2014 MANAGING PERFORMANCE 02 Contents Introduction 03 Overview of process 04 The Welcome page 05 Changing
More informationDestatis' experience in conducting staff opinion surveys
Destatis' experience in conducting staff opinion surveys Heinz-Christoph Herbertz, Katrin Dorka Statistisches Bundesamt Division Human Resources Development Gustav-Stresemann-Ring 11 D-65189 Wiesbaden,
More informationMaximize your sales teams performance to ensure they exceed their targets
Maximize your sales teams performance to ensure they exceed their targets Strategic Sales Team Development Programme Carlene Jackson Carlene@vantage-strategies.com (44) 1273 778 505 www.vantage-strategies.com
More informationTOWARDS PREVENTING VIOLENT RADICALISATION
TOWARDS PREVENTING VIOLENT RADICALISATION PRACTICE GUIDELINES WORKING WITH VIOLENT EXTREMISTS With support from the Prevention of and Fight against Crime Programme of the European Union, European Commission
More informationSecurity Organization & Awareness. Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke
Security Organization & Awareness Januari, 28/29th 2014 6th CENTR Security Workshop Brussels Bert ten Brinke Goals Creating a awareness plan Describing the security organization What is necessary regarding
More informationMarketing at McDonald s
at McDonald s Careers McDonald s is one of the best known brands worldwide. This case study shows how McDonald s aims to continually build its brand by listening to its customers. It also identifies the
More informationBen Tiggelaar about change and personal growth
FREE TEST INCLUDED Ben Tiggelaar about change and personal growth Why is it so hard to maintain change? What is responsible for 95% of your behavior (that you do not even know about)? How can you successfully
More informationICC/ESOMAR INTERNATIONAL CODE ON MARKET AND SOCIAL RESEARCH
ICC/ESOMAR INTERNATIONAL CODE ON MARKET AND SOCIAL RESEARCH INTRODUCTION The first Code of Marketing and Social Research Practice was published by ESOMAR in 1948. This was followed by a number of codes
More informationCustomer Service Programme
10 Minute Guide Customer Service Programme Membership Services Moor Hall, Cookham Maidenhead Berkshire, SL6 9QH, UK Telephone: 01628 427500 www.cim.co.uk/marketingresources The Chartered Institute of Marketing,
More informationPARTNERSHIP OVERVIEW. Business Marketing and Design Services
PARTNERSHIP OVERVIEW Marketing and Design Services C BU S I N E S S M A R K E T I N G 1 QUALIFIED COMMUNICATION SERVICES C Qualified Communication Services is a content provider and training organization.
More informationTurn the benefits of Performance Management into reality. part of our Practical Steps series
Turn the benefits of Performance Management into reality part of our Practical Steps series Contents Contents 2 Introduction 3 1. Be clear about the purpose and benefits 3 2. Engage and train managers
More informationElements Of An Effective Export Compliance Program
Elements Of An Effective Export Compliance Program Renee Osborne Export Management & Compliance Division Office of Exporter Services Bureau of Industry and Security U.S. Department of Commerce Effective
More informationThe Security Overview section describes the FDA Information Security program, consisting of several focus areas whose objectives are to keep FDA
The FDA Intranet Information Security Program Website is a resource where employees can find the most current information on IT security, the FDA awareness program, who to contact with questions and more.
More informationEmail testing EFFECTIVE TESTS FOR EVERY METRIC OF AN EMAIL CAMPAIGN
Email testing guide EFFECTIVE TESTS FOR EVERY METRIC OF AN EMAIL CAMPAIGN GUIDE TO TESTING YOUR EMAIL MARKETING CAMPAIGNS The savvy email marketer knows that to maximize email marketing ROI, testing is
More informationHow to Start a Worksite Wellness Program. A Wellness Tool Kit. Designed by. PeaceHealth St. John Medical Center Wellness Program
How to Start a Worksite Wellness Program A Wellness Tool Kit Designed by PeaceHealth St. John Medical Center Wellness Program 1. Develop Upper Level Management Support Goal: Establish a worksite wellness
More informationTOP TIPS TO A TIP TOP EMAIL
TOP TIPS TO A TIP TOP EMAIL EMAIL MOBILE SOCIAL WEB CONTENTS PAGE Introduction... 3 My Top 10 Tips... 4 Tip 1 - Super, Super Subject Lines... 4 Tip 2 - Make Your Call To Action Count... 5 Tip 3 - The Power
More information3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database
3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS
More informationPER PRACTICAL EXPERIENCE REQUIREMENT
PER PRACTICAL EXPERIENCE REQUIREMENT Contents 1 THE BASICS > What is ACCA s practical experience requirement (PER)? > Why is the PER important? 2 Meeting the requirements > How do I get the right type
More informationMAKING SECURITY AWARENESS HAPPEN
82-01-02 DATA SECURITY MANAGEMENT MAKING SECURITY AWARENESS HAPPEN Susan Hansche INSIDE Setting the Goal; Deciding on the Content; Implementation (Delivery) Options; Overcoming Obstacles; Evaluation INTRODUCTION
More informationThe Future of Community Nursing - Chapter 10
Transition to Community Nursing Practice Contents Section A - Thinking about working in the community Chapter 1 - What is community nursing Chapter 2 - Making the transition Section B - Working in the
More informationTop 10 best practices that savvy marketers know about
Top 10 best practices that savvy marketers know about Includes your three FREE bonus exercises courtesy of Sherry Prescott-Willis, author, Market This! www.marketthisbook.com Top 10 best practices that
More informationIT Risk Closing the Gap
IT Risk Closing the Gap Giving the Board what it needs to understand, manage and challenge IT risk PWC Contents Foreword 1 Executive summary 3 Survey findings Does the Board fully understand the impact
More informationClaims Analytics Case Study: BI Claims Representation
Claims Analytics Case Study: BI Claims Representation The All-Too-Familiar Trend BI Claims Costs 1 The All-Too-Familiar BI Cost Driver BI Claims Legal Representation Rate BI Claims Costs 2 3 Analyzing
More informationMARKETING KUNG FU: 25 Things. Every Marketing Department Needs. Use this checklist as a guide or as a starting point for your complete marketing plan.
MARKETING KUNG FU: 25 Things Every Marketing Department Needs Use this checklist as a guide or as a starting point for your complete marketing plan. 1 Your Business Plan How big is your market opportunity?
More informationVolunteer Managers National Occupational Standards
Volunteer Managers National Occupational Standards Contents 00 Forward 00 Section 1 Introduction 00 Who are these standards for? 00 Why should you use them? 00 How can you use them? 00 What s in a Standard?
More informationMaximising the Effectiveness of Information Security Awareness
Maximising the Effectiveness of Information Security Awareness This thesis offers a fresh look at information security awareness using research from marketing and psychology. By Geordie Stewart and John
More informationAddressing Cultural Distinctions to Maximize Effectiveness
Employee Insights HOT TOPIC GLOBAL EMPLOYEE ENGAGEMENT SURVEYS IN CHINA Addressing Cultural Distinctions to Maximize Effectiveness The exploding growth of the Chinese economy and the drive to build new
More informationWebsite Marketing Questionnaire
A series of questions designed to help us understand your business in relation to website design & marketing. 1 January 2011 Tony McCreath Page 1 of 5 Table of Contents 1 Introduction... 3 2 The Questionnaire...
More information2015 Information Security Awareness Catalogue
Contents 2015 Catalogue Wolfpack Engagement Model 4 Campaign Drivers 6 Offerings 8 Approach 9 Engaging Content 10 Stakeholder Change Management 12 Bundles 13 Content 14 Grey Wolf -Track compliance with
More informationPublic Participation and Communications in Latin American Disease Control Programs
Public Participation and Communications in Latin American Disease Control Programs P. Chain Pan-American Foot-and-Mouth Disease Center, Caixa Postal 589 ZC-00, Rio de Janeiro, Brazil Summary This paper
More informationTraining Products Portfolio
Training Products Portfolio Supporting learning, development and change Training and Consultancy Chapel House are a UK based, accredited, professional training and consultancy organisation with programmes,
More informationMeasuring Return On Investment with Promotional Products
What is ROI? ROI is defined as the total profit or savings less the original investment. It also acts as a measurement of the effectiveness of promotional products in achieving a desired result. ROI =
More informationThe People Factor in Change Management
The People Factor in Change Management Content Introduction... 3 Know your audience... 3 Address your audience...4 Train your audience... 5 Support your audience... 7 Future trends...8 2 Introduction Have
More informationHOW TO START, GROW, AND MANAGE A LEARNING COMMUNITY OF PRACTICE
HOW TO START, GROW, AND MANAGE A LEARNING COMMUNITY OF PRACTICE Daniel Jones Training Solutions Manager Zurich Insurance Company Austrasse 44 W609 8045 Zurich Switzerland Email: Twitter: daniel.jones@zurich.com
More informationPlus, although B2B marketing budgets have increased, the number of channels may far surpass what you can do with your budget.
1 CNBC s list of the Top 10 Most Stressful Jobs of 2011 revealed that the sixth most stressful job was that of an advertising account executive. The reason today s account executives are so stressed is
More informationSimulator Training Emergency Vehicles Exclusion Criteria (T1)
Exclusion (T1) Exclusion (T1) A) This programme is limited to skills training only. The driving activities are practiced until they are carried out perfectly. B) The programme is clearly aimed at sporting
More informationAPES 320 Quality Control for Firms
APES 320 Quality Control for Firms APES 320 Quality Control for Firms is based on International Standard on Quality Control (ISQC 1) (as published in the Handbook of International Auditing, Assurance,
More informationCommunications Council Best Practice Guide
Communications Council Best Practice Guide Social Media Code of Conduct social media code of conduct Purpose In the past few years social media has become an important and integral part of the marketing
More informationOregon Secretary of State Security Awareness Program Strategic Plan Recommendation
Oregon Secretary of State Security Awareness Program Prepared by: Information Systems Division On: July 31, 2008 - Focused on Security. Dedicated to Success. - Revised 9/4/2008 4:30 PM Document History...
More informationKea Influencer Relations and Marketing for High-Tech & Technology Providers
Kea Analyst Relations Industry analysts play a key role in defining markets and educating buyers. We work with clients to identify and track the most influential and relevant industry analysts, and advise
More informationThe Janus Performance Management System
The Janus Management System The Janus Management System Everything you need to make the appraisal process the most positive experience possible The Janus Management System is a fully integrated suite of
More information5 Reasons Why Your Security Education Program isn t Working (and how to fix it)
5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda Importance of Secure End User Behavior 5 Reasons Your Program isn t Working 10 Learning
More informationStrategies to Optimize Call Center Performance
Strategies to Optimize Call Center Performance Financial services customers demand superior service and support as the price of their ongoing loyalty and patronage. In today s experience-driven economy,
More informationASSESSMENT CENTRE BROCHURE LIST OF CONTENTS
ASSESSMENT CENTRE BROCHURE LIST OF CONTENTS 1. INTRODUCTION... 2 2. EPSO ASSESSMENT CENTRE... 2 3. COMPETENCIES TESTED... 3 4. EXERCISES USED... 4 4.1 CASE STUDY... 4 4.2 STRUCTURED INTERVIEW... 4 4.3
More informationEmployee Assistance Programmes Manager s Guide
March 2012 Employee Assistance Programmes Manager s Guide Support and assistance when you need it Vhi Corporate Solutions Employee Assistance Programme Confidential Professional Help Support Communicate
More informationMARKETING AND CORPORATE COMMUNICATION STRATEGY 2011-2014
MARKETING AND CORPORATE COMMUNICATION STRATEGY 2011-2014 Author: George Hotchkiss, Assistant Principal, Enterprise & Organisational Development Impact Assessment Date: 2 September 2010 Date: August 2011
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationpractical experience requirements your practical experience requirements [SECTION TITLE]
practical experience your practical experience [SECTION TITLE] 1 CONTENTS 1 The basics What is ACCA s practical experience requirement (PER)? What do I have to do? Why is the PER important? 2 Meeting the
More informationMillennials Invading: Building Training for Today s Admissions Counselors
Millennials Invading: Building Training for Today s Admissions Counselors By Kent Barnds A few years ago, while talking to my admissions staff at Augustana College, I realized that the antiquated way in
More informationGuide for Clinical Audit Leads
Guide for Clinical Audit Leads Nancy Dixon and Mary Pearce Healthcare Quality Quest March 2011 Clinical audit tool to promote quality for better health services Contents 1 Introduction 1 1.1 Who this
More informationWHAT A MARKETING MANAGER NEEDS TO KNOW. WHEN PLANNING FOR AN EXHIBITION
WHAT A MARKETING MANAGER NEEDS TO KNOW. WHEN PLANNING FOR AN EXHIBITION Welcome I knew that, but I didn t know this. This document is designed for marketing managers who are familiar with the strategies
More informationHow Web-to-Print Optimizes Brand Management
How Web-to-Print Optimizes Brand Management Author: G. David Dodd Point Balance Presented by: Why Read This Paper Napoleon Bonaparte once said that his army moved on its stomach. What he meant, of course,
More information2016 The global ABB integrity program. www.abb.com/integrity
2016 The global ABB integrity program www.abb.com/integrity Tone from the Top Don t Look the Other Way A culture of integrity is a prerequisite for a world-class business. Many valuable customers choose
More informationHow to launch new employees to success
White Paper How to launch new employees to success with behavioral onboarding techniques Executive summary Launch or no launch is the most important decision a hiring manager can make when looking for
More informationFamily Focused Therapy for Bipolar Disorder (Clinical Case Series) Participant Information Sheet
Family Focused Therapy for Bipolar Disorder (Clinical Case Series) Participant Information Sheet Study Title: Family Focused Therapy for Bipolar Disorder: A Clinical Case Series) We would like to invite
More informationPACB One-Day Cybersecurity Workshop
PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance
More informationDiSC CERTIFICATION PROGRAM 5 BCT QUALIFICATION. Consultant certification Trainer certification. Five Behaviors of a Cohesive Team Qualification
DiSC CERTIFICATION PROGRAM Consultant certification Trainer certification 5 BCT QUALIFICATION Five Behaviors of a Cohesive Team Qualification DiSC CERTIFICATION PROGRAM Human insight is often cited as
More informationData Collection - Current Conditions and Review
IQCS Working Forum 26 th June 2009 1 IQCS Standards 2009 International Standards Update MRS Initiatives Update Employment Legislation Update Website 2 Interviewer Quality Control Scheme IQCS Standards
More informationBasic Marketing Principles. Author: Mickey Smith, RPh, PhD Director, Center for Pharmaceutical Marketing and Management University of Mississippi
Basic Marketing Principles Author: Mickey Smith, RPh, PhD Director, Center for Pharmaceutical Marketing and Management University of Mississippi Learning Objectives Define marketing in official and real
More informationContents. Acknowledgments. 1 Introduction: Why Study Technical Sales? 1. 2 An Overview of the Sales Process 7
Contents Acknowledgments xvii 1 Introduction: Why Study Technical Sales? 1 New SE 4 Experienced SE 5 Sales Manager or Sales Trainer 5 Sales Representative 6 Marketing and Product Management 6 Technical
More informationGetting the most from customer data a key asset for franchising growth
Getting the most from customer data a key asset for franchising growth December 2013 1 Getting the most from customer data a key asset for franchising growth Introduction Increasingly in the future, when
More informationSupervisor s Performance Management Guide
Supervisor s Performance Management Guide 1. Introduction... 2 2. Duties and Job Descriptions... 2 3. Supervisor s Role... 2 4. Goals & Employee Development... 3 5. Annual Performance Evaluation Process...
More informationCyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
More informationPerformance Appraisal
* Performance Appraisal Presented by Setiono Winardi http://www.linkedin.com/pub/setiono-winardi/22/7a/7a5 What is performance appraisal? Describe the uses or benefits of performance appraisal. Explain
More informationINTERNAL AUDIT CHARTER AND TERMS OF REFERENCE
INTERNAL AUDIT CHARTER AND TERMS OF REFERENCE CHARTERED INSTITUTE OF INTERNAL AUDIT DEFINITION OF INTERNAL AUDIT Internal auditing is an independent, objective assurance and consulting activity designed
More informationIf s Ethics Policy main principles
If s Ethics Policy main principles The Ethics Policy has been decided by the Boards of Directors in the If Group and is valid from 1 January 2013. It is reviewed on a yearly basis. 1 PREFACE... 1 2 IF
More informationFour Reasons To Use A Marketing Asset Management Solution
Four Reasons To Use A Marketing Asset Management Solution Creativity. Execution. Results. Why Read this Paper? Prompted by growing demands from CEO s and CFO s, marketers have been working to improve the
More informationElements Of An Effective Export Compliance Program
Elements Of An Effective Export Compliance Program Tom Andrukonis, Director Export Management & Compliance Division Office of Exporter Services Bureau of Industry and Security U.S. Department of Commerce
More informationNorth Cumbria University Hospitals NHS Trust - FoI 000999 Enclosure 01. Job Description
1. JOB DETAILS Job Description Job title: Head of Communications and Reputation Management Accountable to: Director of Strategic Planning and Clinical Governance Location: Trust-wide across both hospital
More informationPeople at Work Project An Assessment of Psychosocial Hazards in the Workplace Pre-Survey Communication Plan
People at Work Project An Assessment of Psychosocial Hazards in the Workplace Pre-Survey Communication Plan This guiding document is targeted at organisations participating in the People at Work Project.
More informationLEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
More informationApplies from 1 April 2007 Revised April 2008. Core Competence Framework Guidance booklet
Applies from 1 April 2007 Revised April 2008 Core Competence Framework Guidance booklet - Core Competence Framework - Core Competence Framework Core Competence Framework Foreword Introduction to competences
More informationPRCA Communications Management Standard (CMS) for In-House Teams
PRCA Communications Management Standard (CMS) for In-House Teams PRCA Communications Management Standard (CMS) for In-House Teams Contents Introduction 4 The Communications Management Standard for In-House
More informationObjectives & Ideas to create Unique Compelling Propositions (UCP's)
Objectives & Ideas to create Unique Compelling Propositions (UCP's) 1. Demonstrate proven results 2. Offer a proposition to the first prospects (eg. business health check) 3. Provide information
More informationMRS Regulations for Administering Incentives and Free Prize Draws. February 2012
MRS Regulations for Administering Incentives and Free Prize Draws February 2012 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research,
More informationEducation as a defense strategy. Jeannette Jarvis Group Program Manager PSS Security Microsoft
Education as a defense strategy Jeannette Jarvis Group Program Manager PSS Security Microsoft Introduction to End User Security Awareness End User Security Awareness Challenges Understanding End User
More informationOrganisational Change Management. Fusing People, Process and Technology www.h3partners.co.uk
Organisational Change Management Fusing People, Process and Technology www.h3partners.co.uk 3 OUR CREDENTIALS At H3 Partners, our mission is to provide clients with improved systems and processes to meet
More informationEUROPEAN RESPONSIBLE GAMING STANDARDS
EUROPEAN RESPONSIBLE GAMING STANDARDS 1. INTRODUCTION European lotteries are committed to address illegal gaming and related criminal activities while at the same time minimising any potential harm on
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Developing the Security Program Jan 27, 2005 Introduction Some organizations use security programs to describe the entire set of personnel, plans, policies, and initiatives
More informationWHO GLOBAL COMPETENCY MODEL
1. Core Competencies WHO GLOBAL COMPETENCY MODEL 1) COMMUNICATING IN A CREDIBLE AND EFFECTIVE WAY Definition: Expresses oneself clearly in conversations and interactions with others; listens actively.
More informationInItIatIves for IndustrIal Customers employee energy awareness PlannInG GuIde
Initiatives for Industrial Customers EMPLOYEE ENERGY AWARENESS PLANNING GUIDE 2 STEPS TO SUCCESS The following six steps can help you build your own Power Smart Employee Energy Awareness program. These
More informationChesterfield Borough Council. Internal Communications Strategy. April 2014 - April 2017.
Appendix 1 Chesterfield Borough Council Internal Communications Strategy April 2014 - April 2017. Section 1: Introduction 1.1 Chesterfield Borough Council s single biggest asset is its employees. 1.2 It
More informationApple Pay and loyalty
Author: Peter Ballard December: 2015 Foolproof 2015 London Norwich Singapore Apple Pay s adoption Early signs from both the US and UK indicate that Apple Pay s adoption has been lacklustre. However, Foolproof
More informationInvestors in People 2013 - Communications Plan. Introduction What is IiP?
Investors in People 2013 - Communications Plan Introduction What is IiP? Investors in People specialises in transforming business performance through our employees. It is designed to help the Council achieve
More informationA simple, low cost but innovative approach to end-to-end service reporting (Winner of the itsmf International Whitepaper Competition for 2010)
A simple, low cost but innovative approach to end-to-end service reporting (Winner of the itsmf International Whitepaper Competition for 2010) By Ian MacDonald of the Co-operative Financial Services In
More informationBest Practice in Customer Experience Management
Best Practice in Customer Experience Management This report looks at best practice in implementing voice of the customer programmes to help retail businesses understand what their customers want and how
More informationGWP PUBLIC RELATIONS & COMMUNICATIONS PLAN AND PROCEDURES. GWP Commission April 2, 2012
1 GWP PUBLIC RELATIONS & COMMUNICATIONS PLAN AND PROCEDURES GWP Commission April 2, 2012 Purpose of the Plan 2 Serves as a resource for management and various employees so that they are aware of the public
More information