Content Inventory. Security Awareness & Training PROGRAM PACKAGES E-LEARNING & GAMING VIDEOS & ANIMATIONS NEWSLETTERS & ARTWORK + ADDITIONS



Similar documents
SANS Securing The Human

SOMETHING PHISHY IS GOING ON!

National Cyber Security Month 2015: Daily Security Awareness Tips

Learn to protect yourself from Identity Theft. First National Bank can help.

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

Internet threats: steps to security for your small business

Malware & Botnets. Botnets

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Identity Theft Protection

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

NC DPH: Computer Security Basic Awareness Training

Small businesses: What you need to know about cyber security

10 Smart Ideas for. Keeping Data Safe. From Hackers

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Certified Secure Computer User

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Protect Yourself in the Cloud Age

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

[Company Name] HIPAA Security Awareness and Workforce Training Program Manual

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

10 Quick Tips to Mobile Security

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Web Protection for Your Business, Customers and Data

Cybersecurity Best Practices

Retail/Consumer Client. Internet Banking Awareness and Education Program

Cybercrime Prevention and Awareness

How-To Guide: Cyber Security. Content Provided by

PCI Data Security Standard 3.0

I m getting MFA, you re getting MFA, we re ALL getting MFA. Richard Biever (richard.biever@duke.edu) Chuck Kesler (chuck.kesler@duke.

PRIVACY + SECURITY TRAINING PROGRAM CATALOG

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Secure Your Mobile Workplace

Information Security It s Everyone s Responsibility

Network Security & Privacy Landscape

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF. Cheryl Granto Information Security Manager, UFIT Information Security

Introduction to Computer Security

SECURITY AWARENESS TRAINING. July 2015

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

How To Protect Your Information From Being Hacked By A Hacker

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Is security awareness a waste of time?

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Cyber Security. John Leek Chief Strategist

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Why you need. McAfee. Multi Acess PARTNER SERVICES

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

How to Spot and Combat a Phishing Attack Webinar

Training Employees to Recognise & Avoid Advanced Threats

Information Security Training. Jason Belford Jimmy Lummis

What are the common online dangers?

Using big data analytics to identify malicious content: a case study on spam s

Incident Response. Proactive Incident Management. Sean Curran Director

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Exactly the Same, but Different

HOW TO STAY SAFE. Smartphones

Know the Risks. Protect Yourself. Protect Your Business.

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Desktop and Laptop Security Policy

Cybersecurity: Protecting Your Business. March 11, 2015

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

NATIONAL CYBER SECURITY AWARENESS MONTH

Mobile Security & BYOD Policy

Transcription:

AwareGo.com +1.354.899.4370 In Partnership with The Company & Training Content Inventory 4Q 2015 E-LEARNING & GAMING VIDEOS & ANIMATIONS NEWSLETTERS & ARTWORK PROGRAM PACKAGES + ADDITIONS 2015 The Company TheSecurityAwarenessCompany.com +1.727.393.6600 All rights reserved. Prices subject to change.

E-LEARNING & GAMING All modules available in SCORM, AICC, TinCan, Intranet/HTML, Mobile. All modules have post-assessment quizzes available. All modules can include narration script. (Ask about languages.) Security Concepts (40 minutes) Top Ten (17 minutes) 3 Domains of Mobile (4.5 mins) BYOD (5 mins) Data Classification (6.5 mins) How to be a Human Firewall (15 mins) Laptop Security (5.5 mins) Malware (7 mins) Mobile Computing Basics (4 mins) Non-Technical Security (10 mins) Password Basics (7.5 mins) Passwords & User Authentication (17 mins) Phishing (6.5 mins) PII (15 mins) Privacy (4 mins) Proper Computer Disposal (5 mins) Secure Internet Behavior (5 mins) Security Triads (5 mins) Social Engineering (7 mins) WiFi (7 mins) DIY: Create Your Own Auto-advance or manual advance. Video-only versions available. Executive Help Desk / Call Center Security Physical Security Pretexting & Social Engineering OWASP: Secure Programming Don t see exactly what you want? Combine a variety of existing modules, games and videos to create your own custom awareness module. Need to add in company-specific policy information? Give us the script, let us create the slides! We can add specific videos, images, links, audio, and quiz questions. Please Note: Hourly production charges will apply for all custom work. Compliance FERPA (9 mins) FFIEC (13 mins) GLBA (9 mins) HIPAA (15 mins) PCI-DSS (15 mins) SarbOx (14 mins) Interactive Learning Data Classification How to Be a Human Firewall Phishing Basics Understanding & Protecting PII Trivia Games Family Feud Jeopardy Millionaire Pyramid Secret Mission Sports Themed: Skiing, Hockey, Baseball or Soccer Timed Trivia World Race or Space Race Auto-advance or manual advance. Video-only versions available. Coming 2016: EU Data Protection Directive FERC/NERC FISMA Insider Trading OFAC - Money Laundering Safe Harbor/Cross Border Data Transfer Workforce Safety Requires extensive user interaction. Acceptable Use Identifying Phishing Emails Social Engineering In Action 5-20 questions. Use your questions or ours. Features: SCORM compliant Music + sound effects Make awareness quizzing fun Optimized for Mobile Ask for a demo today! TheSecurityAwarenessCompany.com +1.727.393.6600 2

VIDEOS & ANIMATIONS All videos provided in default.mp4 format unless otherwise specified. Videos can be combined to create a custom SCORM module. Subtitles can be added to any video. (Ask about languages.) Security Express Under 4 mins, dynamic, fast-moving, informative & eye-catching. Engaging mix of images, music, text, & narration. Advanced Persistent Threats Backup Being a Human Firewall Beyond Phishing Cyber Crime Starts with You Data Breaches Data Breaches & You Data Classification Overview Data Loss & the Insider Dumpster Diving Email Spoofing Examples of Insider Jobs Examples of Phishing Firewalls Free WiFi Human Firewall & Data Classification Introduction to the Cloud Laptop Security Low-Tech Hacks to Steal Your ID MDM is Not Security Mobile Cyber Crime Mobile Security Overview Mouse-Overs Non-Technical Security Skills Password Security Phishing in Action Physical Security Threats PII & Compliance Pretexting: Fake Fraud Detection Pretexting: Fake Help Desk Privacy vs. Security Proper Hard Drive Disposal Road Apples Safe Surfing #1 Safe Surfing #2 Social Engineering Definition Social Media Social Media Data Mining Spam The CIA Triad The Domains Triad The Many Lives Triad TMI What Social Engineers Look Like What is ID Theft? Why? Public vs. Private Cloud Social Networking Dos and Don ts Staying Secure on the Road The Many Lives of PII For the C-Suite Onboarding & Offboarding Executive Awareness Leadership Top Ten Security Issues for Execs Help Desk Call Center Animated Security Express Funny, modern animation style. Silent Security Express No audio, just text & images. Perfect for break-room monitors! Phishing: Contest Winner Phishing From Bank Phishing From Facebook Phishing From Netflix Pretexting: Credit Card Pretexting: Employee Pretexting: Execs Pretexting: IT Help Desk Protecting PII HIPAA Compliance PCI Compliance A Day of Bad Passwords Making Strong Passwords Mobile Browser Attacks Physical Security Threats Types of Social Engineering Types of Malware Mulberry Sitcom Filmed in the style of The Office. Each episode under 8 mins. AwareGo Filmed, diverse cast of actors. All videos less than 2 minutes. Episode 1: Security Overview Intro Episode 2: Passwords I Episode 3: Passwords II Episode 4: Email I Episode 5: Email II Episode 6: Phishing Episode 7: Files & Physical Security Episode 8: Policy Episode 9: Social Engineering I Episode 10: Social Engineering II Episode 11: Browsing Episode 12: Conclusion While it is recommended that the entire series be used together, in chronological order, each episode can be licensed individually or in increments. Combined total runtime of the series is 77 minutes. Clean Desk Confidential Material Free WiFi HTTPS Inappropriate Emails Malicious Attachments Password Handling Passwords Phishing Pop Ups Printouts Removable Media Shoulder surfing Social engineering Friendship Social engineering USB key drop Spear Phishing Spyware Tailgating Unauthorized installs WiFi at home Ask for a demo today! TheSecurityAwarenessCompany.com +1.727.393.6600 3

NEWSLETTERS & ARTWORK Use PDF Newsletters as the foundation of your program. All art posters available as PDFs or JPGs (or both). Hang posters around the office. Use them in screensavers, email blasts & on the company intranet and mobile devices. Annual Newsletter Subscription Photographic Art Provided at default size 11 x 17. Monthly newsletters are a great way to consistently reinforce any message! Each month, our content is written by security professionals according to the following topic list. This allows the newsletter to remain up-to-date, while focusing on relevant topics that change monthly. 2015 Topic List Jan: The Many Lives of Security Feb: Social Media & Safe Surfing Mar: Identification & Authentication Apr: Phishing & Cyber Crime Update May: Understanding Cloud Computing Jun: Privacy, PII & ID Theft Jul: Nontechnical & Physical Security Aug: The A to Z of Sept: The Malware Menace Oct: Social Engineering Tactics Nov: Becoming a Human Firewall Dec: The Top 10 Best Security Practices 2016 Topic List: Jan: The 3 Domains of Security Feb: Secrets of Data Classification Mar: Personal & Home Security Apr: Spam, Scams & Hacking Social Media May: Healthy Living & Passwords Jun: The CIA Triad Jul: Mobile &the Cloud Aug: Insider Threats, APTs & Breaches Sep: Best Practices for Safe Surfing Oct: The Horror of Phishing & Malware Nov: Privacy, PII & ID Theft Dec: Nontechnical, Physical & Common Sense Security Be a Human Firewall Be Careful When Using WiFi Buckle Up Clean Up Your Act! Conscientious Facebook Posts Ctrl + Alt + Del Did You Follow Policy? Don t be Phishing Bait Did You Back Up? Downloading Apps HIPAA Penalties ID Theft Stats Know the Signs: Be Alert Know the Signs: Confused Know the Signs: No Thru Traffic Know the Signs: Report Incidents Know the Signs: Stop Know the Signs: Wrong Way Leopard Let s Get Physical Lion Losing Your Phone Lost Laptops and Mobile Devices Messy Desks are Security Risks Mobile Devices Left at Airports Navigate Internet Perils Never Share Passwords Owl Password Help Passwords Are Like Toothbrushes Passwords Are Like Underwear Phishing Emails Recognize/Protect PII Report Anything Unusual Report Strange Incidents Safe Surfing Shed and Shred Social Media Regulations Stolen Identity? Stop Think Connect Strong Passwords Think Before You Click (Malware) Trusting Delivery Man Watch Out for Shoulder Surfers What is the Cloud? What is Your Responsibility? When Did You Change Your Password? When in Doubt, Ask! Illustrated Art Provided at default size 11 x 17. Can be scaled to any size. Silhouettes Art Provided at default size 11 x 17. Can be scaled to any size. Do You Know Our Policies? Do You Think Before You Click? Do You Think Before Clicking? Security is a Responsibility Security is Your Responsibility Treat Passwords Like Underpants Keep a Clean Desk Devices Store Personal Data Social Engineers Target People Cloud = Another Computer Use Devices Safely Back Up Documents Badge Policy Confidential Documents Malware Man in the Middle Attack Phishing Scams Report Immediately Shred Sensitive Documents Smartphones Social Engineering Social Media Treat Passwords Like Toothbrushes USB Sticks WiFi Hot Spot Typography Art Provided at default size 11 x 17. Can be scaled to any size. Anatomy of Phishing Email Classic Security Triad (CIA) Human Firewall Password Security Triad Protecting PHI Security Domains Triad Security Lives Triad Custom Art Don t see exactly what you want? Tell us the messaging you need, the type of imagery you want used, and we can create something that perfectly meets your company-specific goals for your security awareness program. Hourly production charges will apply for all custom work. Ask for a demo today! TheSecurityAwarenessCompany.com +1.727.393.6600 4

PROGRAM PACKAGES Affordable options for organizations of all sizes. Starting prices include up to 100 users for annual unbranded internal electronic and physical distribution license. Basic: $1795 Choice: $2695 Quizmaster: $3195 Premium: $3495 Unlimited 1 module or game 12 Security Express videos 1 module or game 12 Security Express videos 4 modules and/or games 12 Security Express videos 6 modules and/or games Pick what you want, when you want it from our inventory for an entire year. Spread out your program using multiple formats, and have the freedom to use any of our content. Call for pricing. Just the News Options: $795 / $1195 / $1895 Just the News Basic: 12 Newsletters Just the News Plus: 12 Newsletters + 12 Pieces of Art Just the News Premium: 12 Newsletters + 12 Security Express Videos Security Express Packs 6 videos - $1195 12 videos - $1795 18 videos -$2395 24 videos - $2995 ALL current videos - $7995 Design Your Own Tell us what you need and we ll help make it fit your budget. Any number of videos, modules, posters, then add in a newsletter, deliver in multiple formats, add quizzes, games, LMS, languages, etc. What you want, when you want it! THEMATIC PACKAGES Affordable options for organizations of all sizes. Focus user training to fit your specific needs. Starting prices include up to 100 users for annual unbranded internal electronic and physical distribution license. No substitutions. Focus on Phishing Awareness: $2995 Focus On Phishing Digest + Annual Monthly Newsletter Subscription Focus on Personal Security: $2795 Focus On Personal Security Digest + Annual Monthly Newsletter Subscription Focus on HIPAA Compliance: $2495 Focus On HIPAA Compliance Digest + Annual Monthly Newsletter Subscription 2 Modules: Phishing Awareness Social Engineering 2 Modules: Top 10 SA Password Basics 2 Modules: Top 10 SA HIPAA Compliance 2 Interactive Modules: Phishing Phishing Identification 1 Game: Phishing Jeopardy 10 Security Express Videos Beyond Phishing Phishing: Contest Winner Email Spoofing Phishing: From Bank Examples of Phishing Phishing: From Facebook Mouse-Overs Phishing: From Netflix Phishing in Action Spam 4 Posters: Anatomy of Phishing Email Don t be Phishing Bait Phishing Emails Phishing Scams Call about other thematic packages such as social engineering. 2 Interactive Learning Modules: Human Firewall PII 8 Security Express Videos A Day of Bad Passwords Being a Human Firewall Cyber Crime Starts w/ You Low-Tech Hacks to Steal ID 8 Posters: Human Firewall Password Help Stolen Identity Safe Surfing Proper Hard Drive Disposal Social Media Data Mining The Many Lives Triad Phishing: Contest Winner Strong Passwords The Security Lives Triad Losing Your Phone Stop Think Connect Ask about similar packages such as mobile, professional, & exec. 2 Interactive Learning Modules: Data Classification PII 6 Security Express Videos Data Breaches Data Classification Email Spoofing 12 Posters HIPAA Penalties Protecting PHI Recognize & Protect PII Let s Get Physical Do Your Know Our Policies? Pretexting: Employee Pretexting: Execs Treat Passwords Like Underpants Human Firewall Anatomy of Phishing Email Don t be Phishing Bait Phishing Emails Phishing Scams Ask about similar compliance packages such as PCI & GLBA. Ask for a demo today! TheSecurityAwarenessCompany.com +1.727.393.6600 5

+ ADDITIONS Any effective security awareness program is complete must be flexible to meet your needs. SAC offers the greatest range of content and services anywhere. LMS Hosting Recommended for companies with less than 1,000 employees who do not have their own LMS Learning Management System and must measure compliance, mandatory training or regulatory requirements. Hosted in Amazon s AWS-EC2, reliability and security is assured (SSL-TLS). Tin Can, SCORM, AICC compliant. Branded with your company details, full reporting and metrics. SAML 2.0 upgrade available for SSO from your AD. ADA & JAWS compatible. SAML 2.0 Upgrade available. For larger installations (10,000 100,000+ users), we can provide labels, such as Location, Department, etc. for more in-depth reporting. Please ask for a demo. A comprehensive administration console is available to your organization, or we can manage it for you. Use our quizzing and assessments or we can use your ideas and make them interactive. We are here for you. Mobile Awareness Most SAC content can be delivered to your mobile devices. Newsletters are not practical, but pushing posters and videos in messages is popular with many of our clients. Courseware can be delivered to most Android devices with an optimized player app or an ipad app. iphones do not require an app. Just specify HTML5. OWASP Coming Winter 2015! This 3+ hour technical course was created by Dennis Groves, the co-founder of OWASP itself. His legendary contribution was the OWASP Guide, which has been downloaded over 2 million times. The guide is now a reference document in the PCI DSS standard, and the de-facto standard for securing web applications. The OWASP Top Ten Security Issues begins with the history of computer security networks and then application starting with the OSI. Then Dennis works through real-world applications of OWASP Top Ten (with historical context) and concludes with a discussion of threat modeling and how it relates to the OWASP Top Ten and the security of your organization. Branding: Have it your way Add your company ID (logo, mascot), Awareness Program name, Incident Response information to any of our content. Videos get customized intro and outros with logo & incident response information. Newsletters get a color coordinated custom masthead & incident response box on the cover, and a branded footer on the inside pages. Courseware, posters and other materials can all be branded with your mascots, logos, links and company specific details. Policy & Customization Many companies like to add specific policy information to our content. This is a standard process for us, in videos, courseware and newsletters. Custom artwork, posters and other content delivery paths are available. Organizational, industry or regulatory specific content can easily be added to courseware. Languages & Translation Translation is different than localization, and we strive, in conjunction with our global clients, to emphasize the communication of ideas rather than literal word-for-word translations. Some of our inventory is already available in up to 17 languages, and we can easily translate our modules, videos & posters to meet your needs. Translated audio is an option but keep in mind that it s more cost-effective to use subtitles in videos and translated read-along scripts for training than recording audio translations. The costs of voice talent, studio time, editing, and resynchronization can be higher than most budgets allow. Please Note: Newsletter is only available in English. Many clients take the newsletter also in DOC format for their internal translation/localization. Awareness Launch Video Many companies choose to have us build a launch video to introduce and reinforce their awareness program. Typically less than 4 minutes long, this video positions your company, its leadership and dedication to cybersecurity and awareness issues. In terms of styling: How about super crisp videos in HD with professional music, voice over and sound effects? Or perhaps a humorous animation, even using your mascots and branding ID? Or some combination of the two? Let us help. This is what we do better than anyone. Ask for a demo today! TheSecurityAwarenessCompany.com +1.727.393.6600 6