5 Reasons Why Your Security Education Program isn t Working (and how to fix it)
|
|
|
- Emily Howard
- 10 years ago
- Views:
Transcription
1 5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015
2 Presentation Agenda 5 Reasons Your Program isn t Working 10 Learning Science Principles Continuous Training Methodology Case Studies
3 95% of security incidents investigated in 2013 were attributed to Human Error IBM Security Services, 2014 Cyber Security Intelligence Index
4 5 Reasons Security Awareness Doesn t Work 1. Happens once per year 2. Relies on video or slides 3. Tells the end user what to do but not why 4. Training sessions are longer than 15 minutes 5. Focuses on awareness of threats but not behavior change Informational not Educational
5 Keys to Effective Security Training Program
6 Conceptual and Procedural Knowledge Conceptual knowledge provides the big picture Procedural knowledge focuses on specific actions to solve the problem How to apply this principle: Training should always describe why something is a threat before telling the trainee what to do Give actionable information. Specific steps they should take to protect themselves.
7 Serve Small Bites People learn better when they can focus on small pieces of information. How to apply this principle: Limit the time a lesson takes to 10 minutes or less Keep the lesson concepts very simple Don t train on all cyber threats at once
8 Reinforce Lessons Without frequent feedback and practice, even well-learned abilities go away. Security training should be ongoing, not a one-off. How to apply this principle: Have the users practice concepts immediately after learning them Repeat the same lessons throughout the year Repetition increases retention
9 Train in Context Present lessons in the context which the person is most likely to be attacked. How to apply this principle: Create a situation that users can relate to - You re sitting at your desk and an comes in - You receive an SMS from a number you don t recognize Simulate the user interface when possible
10 Give Immediate Feedback Calling it at the point of foul creates teachable moments and increases impact. How to apply this principle: After each practice exercise explain why an answer is correct or incorrect to reinforce the lesson.
11 Let Them Set the Pace Different baseline knowledge requires a different learning pace How to apply this principle: Web-based training enables trainees to go at their own pace Allow users to take the training over and over again
12 Tell a Story People remember stories much better than facts and data How to apply this principle: Keep one set of characters in a particular scenario throughout training
13 Involve Your Students Being actively involved in learning helps students remember things better. How to apply this principle: Immediately after each lesson give trainees opportunity to practice what they ve learned multiple times. Use multiple realistic scenarios
14 Measure Results Collecting baseline data, and new data after each training campaign, provides positive reinforcement to trainees How to apply this principle: Ensure that your training program supports more than just collection of completion data Perform annual, or more regular, assessments to measure knowledge, not to train
15 Continuous Training Methodology Detailed reports show progress Knowledge assessments Mock attacks Analyze and Repeat Posters, articles, newsletters, gifts Interactive training modules & games
16 Assessments & Mock Attacks Assess knowledge and vulnerability Gather baseline results Intelligence for planning Motivate users
17 Leveraging Teachable Moments Intervention training seconds Immediate feedback Provides context
18 In-Depth Education Bite-sized education Learn by doing Stories & scenarios Provide immediate feedback Collect valuable data
19 Reinforce & Repeat Reinforce educational messages & imagery Review results Repeat and refine
20 Results that Prove out the Model 20
21 Case Study: Manufacturing Company International manufacturer had phishing s infecting machines despite strict authentication program Baseline Data More than 70 malware infections/day worldwide Average of 32 calls a month related to spyware, virus, and malware concerns
22 Manufacturing Company Goals Increase awareness of phishing attacks Reduce the number of malware infections Prove to the board that security awareness and training could achieve these results Any company that is not taking awareness seriously is hedging its bets. In my opinion, the single most important thing an organization can do is create a security awareness program.
23 Manufacturing Company Education Program 5000 employees in countries around the world Voluntary training -- Safer Web Browsing, Security, and URL Training Mock phishing attacks using Random Scheduling I think the reason we re getting such great support from our Board is because we re able to show results on the things we re doing, but the potential for cost reductions isn t really the driver here. To me, it s rooted in awareness. I feel this kind of work is essential to a secure work environment, and the Board concurs with that.
24 Manufacturing Company Methodology Reports show results for Board level discussions Mock Phishing attacks Analyze and Repeat Positive response Safer Web Browsing Security URL Training
25 Manufacturing Company Results 46% reduction in malware infections from 72 per day to 39 per day (Europe 69% reduction) 40% reduction in help desk calls from 32 to 20 per month More than 700% return on investment based on cost to remediate infections Positive user feedback on the interactive nature of the training modules
26 Future Program Enhancement Move to mandatory training 4-6 additional training modules Targeted phishing to particular departments Broad knowledge assessments We ve developed a healthy sense of paranoia throughout the organization. I think that s the best result that can come out of the awareness training we re doing.
27 Conclusions Using the right approach end users can learn secure behaviors Continuous training methodology yields significant results to your bottom line There s more than one way to achieve positive results if you have the right ingredients Increase awareness of security issues with employees, executives and your Board Education can reduce overall organization risk
28 Wombat Security is a Leader in the NEW Gartner Magic Quadrant for Security Awareness Computer-Based Training (CBT) Vendors. Access the full Magic Quadrant report here:
5 Reasons Why Your Security Education Program isn t Working (and how to fix it)
5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda Importance of Secure End User Behavior 5 Reasons Your Program isn t Working 10 Learning
TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING
Ralph Massaro VP of Operations TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING 10/26/2012 1 Humans - The Weakest Link? 82% of large organizations had staff driven security breaches(1) 47% had
Training Employees to Recognise & Avoid Advanced Threats
Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session
Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.
Developing a Successful Security Awareness Training Program Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc. Agenda The human element of cyber security Building your case Building
Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks
Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks Improve Phishing Knowledge and Reduce Susceptibility to Attack Do you already have some form of
Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices
Deploying Continuous and Measurable Security Education for Employees Security awareness and training methodology and best practices June 2015 Executive Summary Knowing that end users are the last line
Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices
Deploying Continuous and Measurable Security Education for Employees Security awareness and training methodology and best practices February 2015 Executive Summary Knowing that end users are the last line
SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS
SIMULATED ATTACKS Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru Technical safeguards like firewalls, antivirus software, and email filters are critical for defending your infrastructure,
How to Deploy the Survey Below are some ideas and elements to consider when deploying this survey.
SECURITY AWARENESS SURVEY Is a survey necessary A survey will give you insight into information security awareness within your company. The industry has increasingly realized that people are at least as
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
Social Engineering & How to Counteract Advanced Attacks. Ralph Massaro, VP of Sales Wombat Security Technologies, Inc.
Social Engineering & How to Counteract Advanced Attacks Ralph Massaro, VP of Sales Wombat Security Technologies, Inc. Agenda Social Engineering DEFCON Competition Source of Problem Countermeasures Social
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
Gartner Magic Quadrant Sources and Disclaimer
Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
THE THREE Es OF MODERN EMAIL SECURITY FOR PHISHING
THE THREE Es OF MODERN EMAIL SECURITY FOR PHISHING AN ACCUVANT VIEWPOINT By James Robinson, Director, Office of the CISO Attempting to keep up with the ever-changing world of cyber security threats can
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
The webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
Jumpstarting Your Security Awareness Program
Jumpstarting Your Security Awareness Program Michael Holcomb Director, Information Security HO20110473 1 Jumpstarting Your Security Awareness Program Classification: Confidential Owner: Michael Holcomb
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE
KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE Global threat intelligence for local implementation www.kaspersky.com 2 A CLOUD-BASED THREAT LABORATORY
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
ERP. Key Initiative Overview
Jeff Woods Research Managing Vice President This overview provides a high-level description of the ERP Key Initiative. IT leaders can use this overview to better understand what they need to do to prepare
McAfee Phishing Quiz. Partner Enablement Guide
McAfee Phishing Quiz Partner Enablement Guide Use the Phishing Quiz to educate your own organization, prospects, and existing customers about phishing and how McAfee security solutions can help. This guide
Elearning: Building an Effective and Engaging Solution Online
PERSPECTIVES Elearning: Building an Effective and Engaging Solution Online There s a lot of buzz about elearning, and with good reason. When done effectively, organizations find it can reduce time away
Cyber Security Competency Center
Cyber Security Competency Center Overview February 2014 1 Overview As data and information have become intertwined with our daily life; they can be fairly regarded as the top asset of companies around
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
Best value security report
Best value security report Getting the balance right between cost and quality Do more with less IT security for Local Government and the Emergency Services Thank you for downloading the best value security
Is security awareness a waste of time?
Is security awareness a waste of time? New York State Cyber Security Conference June 5, 2013 Scott Gréaux Vice President Product Management and Services, PhishMe, Inc. They are exploiting human vulnerabilities
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Guide to Preventing Social Engineering Fraud
Guide to Preventing Social Engineering Fraud GUIDE TO PREVENTING SOCIAL ENGINEERING FRAUD CONTENTS Social Engineering Fraud Fundamentals and Fraud Strategies... 4 The Psychology of Social Engineering (And
Zak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
TO AN EFFECTIVE BUSINESS CONTINUITY PLAN
5 STEPS TO AN EFFECTIVE BUSINESS CONTINUITY PLAN Introduction The Snowpocalypse of 2015 brought one winter storm after another, paralyzing the eastern half of the United States. It knocked out power for
Global IT Security Risks
Global IT Security Risks June 17, 2011 Kaspersky Lab leverages the leading expertise in IT security risks, malware and vulnerabilities to protect its customers in the best possible way. To ensure the most
Braindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Gamification of Compliance and Ethics Training
Gamification of Compliance and Ethics Training Presented by: Sara Hurley and Susie Wagner February 23, 2014 1 Agenda What is Gamification? Definition What it is and what it is not Benefits of Gamification
Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper
A Phishnix White Paper Shield Your Business - Combat Phishing Attacks Aujas Information Risk Services 19925 Steven s Creek Blvd, Suite 100, Cupertino, CA 95014-2358 Phone: 1.855.PHISHNX Fax : +1 408 973
Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Information Security Awareness: How to Get Users Asking for More
Information Security Awareness: How to Get Users Asking for More Kelley J. Bogart, CISSP Senior Information Security Analyst, University of Arizona Synopsis Any effective information security program has
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
A New Approach to Assessing Advanced Threat Solutions
A New Approach to Assessing Advanced Threat Solutions December 4, 2014 A New Approach to Assessing Advanced Threat Solutions How Well Does Your Advanced Threat Solution Work? The cyber threats facing enterprises
Phishing Attacks Methodology and Response GridSecCon 2012
Phishing Attacks Methodology and Response Agenda Survey Questions Spear Phishing Current State Case Study - Methodology Countermeasures And Lessons Learned Question 1 If you had to guess, what percentage
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
The Business Benefits of Logging
WHITEPAPER The Business Benefits of Logging Copyright 2000-2011 BalaBit IT Security All rights reserved. www.balabit.com 1 Table of Content Introduction 3 The Business Benefits of Logging 4 Security as
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
Security Awareness Program Learning Objectives. By Aron Warren Last Update 6/29/2012
Security Awareness Program Learning Objectives By Aron Warren Last Update 6/29/2012 Module 1: You are a target You are a target Explain how employees are a target from both domestic and foreign threats.
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
A Love Affair: Cyber Security, Big-data and Risk
A Love Affair: Cyber Security, Big-data and Risk Mark Seward, Senior Director Security and Compliance, Splunk Inc. Professional Techniques - Session 31 Security what s at stake On average, organizations
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES
WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Cloud Computing. Key Initiative Overview
David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they
Selecting the right cybercrime-prevention solution
IBM Software Thought Leadership White Paper Selecting the right cybercrime-prevention solution Key considerations and best practices for achieving effective, sustainable cybercrime prevention Contents
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Maximizing Configuration Management IT Security Benefits with Puppet
White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops
So you want to create an Email a Friend action
So you want to create an Email a Friend action This help file will take you through all the steps on how to create a simple and effective email a friend action. It doesn t cover the advanced features;
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
What did I learn from participating in the career fair, and how did my presentation contribute to my classmates knowledge?
Career Fair Reflection 10 CAREERS The BIG Idea What did I learn from participating in the career fair, and how did my presentation contribute to my classmates knowledge? AGENDA Approx. 45 minutes I. Warm
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Thomas J. Schlagel Chief Information Officer, BNL
Thomas J. Schlagel Chief Information Officer, BNL PhD in Nuclear Physics from the University of Illinois at Urbana-Champaign in 1990 Joined BNL in 1990 as a Postdoctoral Associate in the Nuclear Theory
