Security Awareness & Securing the Human. By: Chandos J. Carrow, CISSP System Office - Information Security Officer Virginia Community College System
|
|
|
- Albert Rice
- 10 years ago
- Views:
Transcription
1 Security Awareness & Securing the Human By: Chandos J. Carrow, CISSP System Office - Information Security Officer Virginia Community College System
2 I am not John Popper nor do I play the harmonica
3 Question Why is October important for Information Security Awareness and Training? October is National Cyber Security Awareness Month Started 10 years ago Sponsored by Department of Homeland Security in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center
4 VCCS and Security Awareness 23 colleges and a system office with 40+ locations ~15,000 faculty and staff Running two programs: MOAT and STH 11 colleges and the SO on STH ~5,400 seats in STH
5 Basic Information Security Awareness and Training Program Four level approach: Awareness Designed to be presented to all users to focus their attention on security Intended to allow individuals to recognize IT security concerns and respond accordingly Training Strives to produce relevant and needed security skills and competencies Builds upon the information gathered from awareness presentations Education Integrates all of the security skills and competencies of the various functional specialties into a common body of knowledge Strives to produce IT security specialists and professionals capable of vision and proactive response Professional Development Intended to ensure that users possess a required level of knowledge and competence necessary for their roles Validation of skills typically through certification
6 Where Do Companies Go Wrong The Information Security Awareness and Training program was thrown together to meet a requirement No planning went into the implementation There was no specific budget provided Mostly considered an IT Security issue and not very well supported in other departments No one is designated as the program administrator or is typically assigned to someone as an additional duty Program only consists of an annual presentation that users review and there is nothing throughout the rest of the year to reinforce what they were presented
7 Awareness VS Training In order to have a good Information Security Awareness and Training program you must have a great foundation Awareness is that foundation An annual presentation is a great start to awareness, but without constant reinforcement that information obtained by users will not set in Training should focus more on the specifics of your company and the systems you use, and it does not supersede awareness for any position
8 Security Awareness Programs and Marketing End goal of any security awareness program is to have the end users follow the messages delivered in the program and act in a secure manner Awareness programs should not be boring and repetitive Marketing focuses on grabbing the attention of the consumer and getting them excited about a product Security Awareness Program = Product
9 STEPPS March 2013, Dr. Jonah Berger published a book Contagious: Why Things Catch On Intrigued by why some videos go viral while some s and posts that seem important do not Six principles of contagiousness that helps define whether or not content will go viral STEPPS Social Currency, Triggers or Cues, Emotion, Public, Practical Value, and Stories
10 Social Currency Resolves around sharing information that makes the individual look smart, contemporary, and upto-speed on current issues In security, social currency can be gained by sharing stories about current cybersecurity news, and then explaining how that news can affect both the company as a whole, individual employees, and their families Example: Breach announcements Shows how information security affects both their livelihoods and their personal lives
11 Triggers or Cues Can be used to make people think about a product or idea, but within security triggers can be used for following good security practices The messages of security awareness should be designed so it is top of everyone s mind Example: A nice polo to an employee who wins a security contest may stimulate more focus on following security
12 Emotion Emotional content often gets shared, so focus on feelings Ask whether talking about the company s security program generates any emotion or energy Craft the messaging so that it brings out some sort of emotion, whether it is laughter or anger Example: Send out a story about an elderly lady that is affected by identity theft
13 Public How can you make the action of following the company security program advertise itself? Can people see when others are properly following security protocols? If not, try to make the security practices more apparent so that they are easier to imitate Example: No piggybacking and clean desk policies can be implemented and those good practitioners can be publicly rewarded
14 Practical Value People are more likely to utilize the content of a message if it has some practical value for their lives How does complying with corporate security help people to help others and themselves? How can the security awareness program be configured so that others want to talk about it and the good practices within? Give your users the carrot rather than the stick, emphasize the benefits of security rather that the penalties.
15 Stories How can a security program expand so that it is advertised through stories and viral means that people want to share? Use stories to share lesson learned or morals, but make it interesting not boring police blotter narratives Instead, build in characters and fun elements that make the employees want to tell the stories again at work and at home
16 Creating/Redesigning an Information Security Awareness and Training Program Many companies already have a program, but the steps for creating a new program can be used to redesign your current program as well 1. Ensure you have upper management support a. Resources b. Commitment 2. Create an Information Security Awareness and Training program team a. Most influential members of each department b. Members should be dedicated to the cause and will be active participants c. Do not have to be technically/security savvy to be part of the team d. If team members are not active, they are reported to management and a replacement requested
17 3. Define the roles and responsibilities that each person/department will play within this program a. Create policies, standards, guidelines, and procedures 4. Determine what type of program management model you will use for your company a. Centralized, Partially Decentralized, or Fully Decentralized 5. Conduct a Needs Assessment a. Complete interviews, surveys, review resource material, etc. 6. Have a clear mission and directives
18 7. Listen and analyze the user feedback 8. Determine where are the gaps between what is currently being done and what is required 9. Explore your options for deploying your program a. Company generated material, third-party generated material hosted on internal Learning Management System (LMS), or third-party hosted solution 10.Develop the strategy and plan of the program a. Current regulations, scope, goals, target audience, learning objectives, topics, mandatory/optional courses, evidence of learning, frequency
19 11. Implementation Schedule a. Establish your priorities especially if this implementation is to be done in a phased approach 1. Availability of material/resources 2. Role and organizational impact 3. State of current compliance 4. Critical project dependencies 12. Setting the bar a. Determine the complexity of the material presented based on the target audience 13. Funding the program a. Percent of overall training budget b. Allocation per user by role c. Percent of overall IT budget d. Explicit dollar allocation by component based on overall implementation costs
20 Delivering Awareness Materials Messages on awareness tools Pens, key fobs, notepads, bookmarks, etc. Posters Screensavers Popup messages when people log into their computers Newsletters Company wide messages
21 Videotapes (YouTube videos) Web-based sessions IT security days Changing the IT security webpage Current awareness theme Helpful information and tips Brown bag seminars Mascots Crossword puzzles and other games Award program Do and Don t list In-person instructor-led sessions
22 Keeping Your Program Up-to-date A program is never complete Always listen for and read about new threats Policies and standards do change Always be open for feedback from users The program is designed for them If they do not like it then they will not take it seriously On at least a semi-annual basis the team should review the materials and presentations of the program If materials/presentations come from a third-party then they should have some review/update process
23 Surveys Benchmarking Technology Shifts Focus Groups Interviews Status Reports Independent Observations Evaluation Forms
24 Success Indicators Sufficient funding to implement the agreed-upon strategy Appropriate organization placement to enable those with key responsibilities to effectively implement the strategy Support for broad distribution and posting of security awareness items Executive/senior level messages to staff regarding security Use of metrics Decline in security incidents or violations, gap between existing awareness and training coverage and identified needs is shrinking, etc. Managers do not use their status in the organization to avoid security controls Increase in the level of attendance at mandatory security forums/briefings Recognition of security contributions Motivation is demonstrated by those playing key roles in managing/coordinating the security program
25 Helpful Tips Keep your awareness material interesting and up-to-date Repeating an awareness message and using different ways to present that information will increase the retention by the users Make sure that the delivery of the awareness material is easy to use and understand, is scalable, and does not impact the work production of the users Deliver updates on a monthly/quarterly basis to your Senior Leadership and/or Board of Directors After implementation of the program, continue having at least monthly meetings of your team because a program is never finished it should be continually modified to meet the needs of your company and addresses the new threats on cyber security
26 Resources
27 Questions
28 Thank You Contact info: Chandos Carrow
Role of Awareness and Training for Successful InfoSec Security Program 1
Role of Awareness and Training for Successful InfoSec Security Program 1 Role of Awareness and Training for Successful Information Systems Security Program Venkata Siva, Jose R Velez Saint Leo University
Information Security Awareness Program Proposal
Information Security Awareness Program Proposal Michael E. Whitman, Ph.D. Purpose The purpose of information security awareness is improving coherence of the need to protect information and system resources,
LMS Maximizing the Return on Your LMS Investment
Maximizing the Return on Your LMS Investment White Paper Dwayne Cotti, Director, Managed Learning Services , Recipe for Success After investing significant money and time in your Learning Management System
Company Pages and Followers
Company Pages and Followers Relationships That Drive Results 5 steps to engaging followers on LinkedIn linkedin.com.companies 1 Table of contents Intro 03 03 Engage followers 07 01 Establish your presence
It s more fun than fundraising and participating alone. Getting fit and fundraising are easier as a Team
1 Welcome to TeamMS TeamMS is the best team you ll ever be on! Here s why... TeamMS Provides inspiration and competition for other participants Team energy is contagious It s more fun than fundraising
5 Reasons Why Your Security Education Program isn t Working (and how to fix it)
5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda 5 Reasons Your Program isn t Working 10 Learning Science Principles Continuous Training
TEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Developing the Security Program Jan 27, 2005 Introduction Some organizations use security programs to describe the entire set of personnel, plans, policies, and initiatives
10 tips for running successful competitions on facebook
White paper 10 tips for running successful competitions on facebook 07/ 2014 www.kontestapp.com Introduction Facebook has undoubtedly become the largest social network in the world. With over 1.23 billion
Employee Campaign Coordinator Manual. Tips, Tools, Techniques
Employee Campaign Coordinator Manual Tips, Tools, Techniques United Way of Greater Moncton and Southeastern New Brunswick History of the United Way The United Way of Greater Moncton and Southeastern New
Communities of Practice (CoP): Five Tips for Engagement
Communities of Practice (CoP): Five Tips for Engagement Maintaining a Community of Practice (CoP) is a lot like planting a delicate tree. At first the tree requires intensive care, patient cultivation,
Your Club,Your Way! Customizing Your Club Meeting
Your Club,Your Way! Customizing Your Club Meeting Your Club, Your Way! Customizing Your Club Meeting Are your club s meetings all that they can be? It is easy to recruit new members when you invite them
DISCUSSION AND STUDY GUIDE
DISCUSSION AND STUDY GUIDE FOREWORD Welcome to the Cyber-Seniors Discussion and Activity Guide. The Cyber-Seniors Discussion and Activity Guide is designed to guide any group through discussions and activities
5 Reasons Why Your Security Education Program isn t Working (and how to fix it)
5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda Importance of Secure End User Behavior 5 Reasons Your Program isn t Working 10 Learning
Thank You! Contents. Promoting SmartDollar... 3. Implementing SmartDollar... 4. SmartDollar Resource Center... 6. Internal Communications...
Promotion Guide Thank You! Thank you for adding SmartDollar to your benefits program. You are changing lives by helping your employees take control of their money and get on track for retirement! SmartDollar
Role-Based Security Training
Role-Based Security Training Training and Policy Management Service Rosa C Ayer, MBA, CISSP Table Of Contents Background Overview of the Program Choosing Roles Designing the Message Shared Topics and Themes
InItIatIves for IndustrIal Customers employee energy awareness PlannInG GuIde
Initiatives for Industrial Customers EMPLOYEE ENERGY AWARENESS PLANNING GUIDE 2 STEPS TO SUCCESS The following six steps can help you build your own Power Smart Employee Energy Awareness program. These
Advertising Research
Advertising Research By Jerry W. Thomas A growing share of consumergoods media spending is shifting away from traditional advertising media (television, radio, print, and outdoor). The proliferation of
EMAIL MARKETING TIPS. From Our InfoUSA Email Experts
EMAIL MARKETING TIPS From Our InfoUSA Email Experts In order to assist you every step of the way while creating an Email Marketing Campaign, our InfoUSA Email Experts have compiled lists of their best
The University of Texas at San Antonio. Business Affairs 2016 STRATEGIC PLAN 2007-2016 December 2007
The University of Texas at San Antonio Business Affairs 2016 STRATEGIC PLAN 2007-2016 December 2007 Table of Contents Page 1. Introduction... 3 2. Business Affairs Mission, Vision and Core Values 3 3.
Content, Connectivity & Convergence. A Shared Strategy For Your Nonprofit Organization
Content, Connectivity & Convergence A Shared Strategy For Your Nonprofit Organization No matter the size or budget of your organization, content is powerful enough to level the playing field. Ubiquitous
PROFESSIONAL BACKGROUND
Statement of Benjamin S. Fernandez, MSEd, Lead School Psychologist Loudon County Public Schools, Virginia NASP Briefing: Effective Discipline Policies and Practices Thursday, April 18, 2013 My name is
COMMUNITY IMPACT PROGRAM Communications tools for grantees
COMMUNITY IMPACT PROGRAM Communications tools for grantees CREATING A SOCIAL MEDIA FRAMEWORK Your social media framework is the roadmap for social media activity related to the Community Impact project.
Overview of Performance Management. Taking Steps to Enhance Individual & Organizational Effectiveness
Overview of Performance Management Taking Steps to Enhance Individual & Organizational Effectiveness Performance Management Performance management is the process through which supervisors and those they
This report provides the project s findings, including its three practical, actionable products:
Executive Summary Security metrics support the value proposition of an organization s security operation. Without compelling metrics, security professionals and their budgets continue largely on the intuition
Cyber Security Training and Awareness Through Game Play
Cyber Security Training and Awareness Through Game Play Benjamin D. Cone, Michael F. Thompson, Cynthia E. Irvine, and Thuy D. Nguyen Naval Postgraduate School, Monterey, CA 93943, USA {bdcone,mfthomps,irvine,tdnguyen}@nps.edu
How to Catch em, How to Keep em
How to Catch em, How to Keep em IPMAAC Conference 2000 Rich Moonblatt AMG/RecruitCom Chevy Chase, MD Recruiters and Retention Should recruiters be involved in retention? Should recruiters focus on bringing
Mohamed ElHarras CIIP Strategies and Policies Executive Director
EGYPT National Telecom Regulatory Authority Integrating The Information Security Awareness in Critical Infrastructure Firms Mohamed ElHarras CIIP Strategies and Policies Executive Director Agenda The Connectivity
November 2-6, 2015. Celebrate Your Eye Care Team. Ophthalmic Medical Technicians Week
Ophthalmic Medical Technicians Week November 2-6, 2015 Celebrate Your Eye Care Team Providing Certification and Education for Eye Care Excellence Since 1969 6th ANNUAL OPHTHALMIC MEDICAL TECHNICIANS WEEK
Using Gamification in Reward and Recognition to improve Employee Engagement
Using Gamification in Reward and Recognition to improve Employee Engagement 02 WHAT IS GAMIFICATION? It is the use of use of game design elements in a non-game context It is a common misconception that
OE COMMUNICATIONS PLAN
OE COMMUNICATIONS PLAN [Project Name] Communications Plan [Date] 1 PROJECT COMMUNICATIONS AT UC BERKELEY A key component of successful project management at UC Berkeley is clear, concise communications.
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
10/21/2010. Overview. The Purpose of Compliance Training. Your Stay Out of Jail Free Card : Best Practices in Business Ethics and Compliance Programs
Your Stay Out of Jail Free Card : Best Practices in Business Ethics and Compliance Programs JOEL KATZ VICE PRESIDENT, ASSOCIATE GENERAL COUNSEL & CHIEF ETHICS OFFICER CA TECHNOLOGIES Overview The compliance
HOW TO START, GROW, AND MANAGE A LEARNING COMMUNITY OF PRACTICE
HOW TO START, GROW, AND MANAGE A LEARNING COMMUNITY OF PRACTICE Daniel Jones Training Solutions Manager Zurich Insurance Company Austrasse 44 W609 8045 Zurich Switzerland Email: Twitter: [email protected]
National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work
National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to
Creating the Ask: Red Cross Clubs: Recruit, Retain and Recognize Club Members
s: Recruit, Retain and Recognize Club Members There are many different stages in the life of a club. Some of you might just be starting a while others have a well-established program. Regardless of how
Information Technology Strategic Plan and Review Colorado State University Pueblo 2013-2018
Information Technology Strategic Plan and Review Colorado State University Pueblo 2013-2018 Table of Contents Table of Contents... 2 Introduction... 5 Mission... 5 Vision Statement... 5 Organizational
1. Link Building 2. Site Content 3. Advertising 4. Email Marketing 5. Viral Marketing 6. Affiliate Marketing 7. Search Engine Optimization 8.
1. Link Building 2. Site Content 3. Advertising 4. Email Marketing 5. Viral Marketing 6. Affiliate Marketing 7. Search Engine Optimization 8. Landing Page Optimization LINK BUILDING & SITE CONTENT I m
50 Must-Have Content Ideas for Your Email Newsletter
50 Must-Have Content Ideas for Your Email Newsletter 50 Must-Have Content Ideas for Your Email Newsletter Email newsletters are a win-win. They benefit companies and consumers alike. Why? Email newsletters
M Matters: What s (Social) Marketing and Media Got to Do with It?
M Matters: What s (Social) Marketing and Media Got to Do with It? Pattie Yu Karen Waller GYMR Public Relations Washington, DC www.gymr.com October 4, 2007 Why Social Marketing? Use the principles of marketing
Achieving Results Through Genuine Leadership TM
Achieving Results Through Genuine Leadership TM T R A I N I N G Struggling daily with tough business issues and essential goals, organizations are prepared when genuine leaders are eager to live out the
Successfully Market your PMO
Successfully Market your PMO Tom Mochal President, TenStep, Inc 1 Agenda Background PMO Communication Plan Marketing the value 2 High-level Value Proposition Companies define goals/strategies toward a
IT Service Desk Health Check & Action Plan
IT Service Desk Health Check & Action Plan Version: 1.0 Date: April, 2003 Authors: Fatima Cabral, Gary Case, David Ratcliffe Pink Elephant Leading the Way in IT Management Best Practices www.pinkelephant.com
Crisis Management Guide
Crisis Management Guide The Crisis Management Guide has been designed to help your company effectively respond to a crisis situation. Crises, large and small can be minimized if a thorough Crisis Management
PERFORMANCE MANAGEMENT SYSTEM
WHITE PAPER BY PATRICIA DAVIS LEADER, PERFORMANCE MANAGEMENT ROBERT W. ROGERS PRESIDENT, DDI WHITE PAPER GETTING THE MOST FROM YOUR 1 GETTING THE MOST FROM YOUR PERFORMANCE MANAGEMENT SYSTEM Is your organization
Welcome to Marketeach! Here is the sample lesson plan that you requested be sent to you. The next page is a summary of the entire set of lesson plans.
Dear Educator, Welcome to! Here is the sample lesson plan that you requested be sent to you. The next page is a summary of the entire set of lesson plans. We at created this program to allow teachers to
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
SEO 2.0 ADVANCED SEO TIPS & TECHNIQUES ABSTRACT»
2.0 ADVANCED TIPS & TECHNIQUES ABSTRACT» Savvy online marketers know that their website is a great tool for branding, content promotion and demand generation. And they realize that search engine optimization
Performance Measurement, Rewards and Recognition: Aligning Incentives with Strategic and Operational Goals
Performance Measurement, Rewards and Recognition: Aligning Incentives with Strategic and Operational Goals Copyright Best Practices, LLC (919) 403-0251 1 ABOUT BEST PRACTICES, LLC Best Practices, LLC is
Chapter 17 Customer Service
Chapter 17 Customer Service There is only one boss: the customer. And he can fire everybody from the chairman on down, simply by spending his money elsewhere. -Sam Walton The old adage used to be that
customer experiences Delivering exceptional Customer Service Excellence
Delivering exceptional customer experiences Customer Service QA can work with you to create customer experiences that consistently reflect the aims, values and aspirations of your organisation. Every organisation
Increasing Participation in Employee Engagement Survey Feedback Meetings
Increasing Participation in Employee Engagement Survey Feedback Meetings Dr. Chris Reilly, Ph.D., & Lyndsay B. Wrensen, M.S. [email protected], [email protected] www.sperduto.com 404.577.1178
How To Keep Up Awareness Of Compliance
Charlotte, North Carolina Corporate Compliance Department Compliance -- Keeping up Awareness Sherri De Shazo, RN MBA MHA Director, CHS Corporate Compliance Facility Compliance Director, Carolinas Medical
CREATIVE S SKETCHBOOK
Session Plan for Creative Directors CREATIVE S SKETCHBOOK THIS SKETCHBOOK BELONGS TO: @OfficialSYP 1 WELCOME YOUNG CREATIVE If you re reading this, it means you ve accepted the We-CTV challenge and are
The Power of Social Media in Marketing
The Power of Social Media in Marketing 1 Contents Executive Summary...3 What is Social Media Marketing?...3 Importance of Social Media Marketing...4 Promoting Through Social Media...5 Social Media Channels/
Organizational Culture Transformation: Leveraging Culture to Enhance Performance
Organizational Culture Transformation: Leveraging Culture to Enhance Performance Allison Laks, PsyD Organization Development Manager Sacramento County Airport System Objectives Learn the model for successfully
Introduction to Using Video to Grow Your Dental Practice
Dental Practice Marketing Guide Introduction to Using Video to Grow Your Dental Practice By Vincent Messina CEO/Founder Otimo Sales and Marketing Hey there! Use video grow your dental practice Welcome
IT Security Management 100 Success Secrets
IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management
Communication Plan. Information Technology University of Tennessee, Chattanooga. Version 1 November 2015. Susan Lazenby Barbara Webb
Communication Plan Information Technology University of Tennessee, Chattanooga Susan Lazenby Barbara Webb Version 1 November 2015 Department 5805 615 McCallie Avenue Chattanooga, TN 37403 423-425-4000
7 Things Your Competitors Can Teach You about Marketing Your Cloud Backup Services
7 Things Your Competitors Can Teach You about Marketing Your Cloud Backup Services Have you looked at how your competitors are going to market? Outlined below are 7 things that your competitors are doing
Best Practices. for Social Media Marketing Success
10 Best Practices for Social Media Marketing Success In the evolving world of social media marketing, it can be hard for a time-starved small business or organization to keep pace and know what to do when
University of Arizona College of Engineering Marketing, Branding and Communications Plan
University of Arizona College of Engineering Marketing, Branding and Communications Plan PETE BROWN, COMMUNICATIONS DIRECTOR EMAIL: [email protected] TELEPHONE: 520.621.3754 KARINA BARRENTINE, MARKETING
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
Elearning: Building an Effective and Engaging Solution Online
PERSPECTIVES Elearning: Building an Effective and Engaging Solution Online There s a lot of buzz about elearning, and with good reason. When done effectively, organizations find it can reduce time away
Cisco IT Technology Tutorial Overview of ITIL at Cisco
Cisco IT Technology Tutorial Overview of ITIL at Cisco Ian Reddy, IT Manager David Lietzell, IT Program Manager May 2009 Produced by the Cisco on Cisco team within Cisco IT 2007 Cisco Systems, Inc. All
Internet Video Campaigns for NonProfits:
Internet Video Campaigns for NonProfits: How to Use the Power of Video and the Reach of the Internet to Grow Your Donor Base and Engage Your Community by Catie Foertsch Yes! MediaWorks In this new world
Snohomish County PUD. Service Management Journey. Chris Thorpe Tina Myren June 16, 2010
Snohomish County PUD Service Management Journey Chris Thorpe Tina Myren June 16, 2010 Topics Snohomish County PUD How We Started Our Approach Change Management ITSM Tool Top Ten Tips Who Is Snohomish County
How to take an ITI Course
How to take an ITI Course To take an ITI Course you must have a subscription to ITI Courses. Go to www.iticourses.com home page. International Training Institute 2009 www.iticourses.com 1 Log into your
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
509 467-0062 208 664-8958 humanix.com
Connecting businesses to people who bring the valuable talents, skills and advanced know-how to make sure any level job temporary or permanent gets done right. 509 467-0062 208 664-8958 humanix.com Onboarding
WELCOME TEAM CAPTAINS!
WELCOME TEAM CAPTAINS! Thank you for joining the online fundraiser for (org name)! This kit is designed to provide you with the tools you will need to make your team s experience fun, successful and rewarding.
The Strategic Plan of the American College of Clinical Pharmacy 1
The Strategic Plan of the American College of Clinical Pharmacy The Strategic Plan of the American College of Clinical Pharmacy (Endorsed by the ACCP Board of Regents on October 11, 2013) In 2013, the
Bull s-eye! Planning and Delivering a Winning Marketing Campaign
Association of Professional Genealogists Professional Management Conference Little Rock, Arkansas 2 September 2009 Bull s-eye! Planning and Delivering a Winning Marketing Campaign Heather Henderson [email protected]
Project Charter EMI Outreach July 25, 2011. OE Project Charter. 1.0 July 25, 2011 Draft w/ VC Denton comments included 1.1 11/02/2011 Proofed/edited
Project Charter EMI Outreach July 25, 2011 OE Project Charter Project Name: Energy Management: Marketing and Outreach Prepared by: Lisa McNeilly Date (MM/DD/YYYY): July 25, 2011 Project Charter Version
Compliance Education/Awareness Tools and Techniques. Author: Kathy Thomas, Associate Compliance Officer, Duke University Health System
Compliance Education/Awareness Tools and Techniques Author: Kathy Thomas, Associate Compliance Officer, Duke University Health System Introduction A focus group of Health Care Compliance Association (HCCA)
Results Based Performance Management System (RPMS) FREQUENTLY ASKED QUESTIONS (FAQs)
Results Based Performance Management System (RPMS) FREQUENTLY ASKED QUESTIONS (FAQs) 1. What is the Performance Management System? It is an organization-wide process to ensure that employees focus work
