Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.



Similar documents
Social Engineering & How to Counteract Advanced Attacks. Ralph Massaro, VP of Sales Wombat Security Technologies, Inc.

Training Employees to Recognise & Avoid Advanced Threats

TEN COMMANDMENTS OF EFFECTIVE SECURITY AWARENESS TRAINING

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks

Advanced Threat Protection with Dell SecureWorks Security Services

Cybersecurity Awareness for Executives

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

Technical Testing. Network Testing DATA SHEET

How to Justify Your Security Assessment Budget

THE THREE Es OF MODERN SECURITY FOR PHISHING

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Jumpstarting Your Security Awareness Program

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

SANS Top 20 Critical Controls for Effective Cyber Defense

Carbon Black and Palo Alto Networks

Is security awareness a waste of time?

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices

2011 Forrester Research, Inc. Reproduction Prohibited

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices

Obtaining Enterprise Cybersituational

Into the cybersecurity breach

Protecting against cyber threats and security breaches

Cybersecurity Awareness. Part 1

Fighting Advanced Threats

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

Managing IT Security with Penetration Testing

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Things To Do After You ve Been Hacked

McAfee Phishing Quiz. Partner Enablement Guide

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Cisco Security Optimization Service

The Social Media Plan

NATIONAL CYBER SECURITY AWARENESS MONTH

Continuous Network Monitoring

A Primer on Cyber Threat Intelligence

ESKISP Manage security testing

Gaining the upper hand in today s cyber security battle

How To Test For Security On A Network Without Being Hacked

Click to edit Master title style

CONSULTING IMAGE PLACEHOLDER

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

What is Penetration Testing?

Defending Against Data Beaches: Internal Controls for Cybersecurity

Procuring Penetration Testing Services

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Application Security in the Software Development Lifecycle

Sytorus Information Security Assessment Overview

How-To Guide: Cyber Security. Content Provided by

Onboarding Your Guide to Retaining Your New Employees

Best Practices to Improve Breach Readiness

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

How to Spot and Combat a Phishing Attack Webinar

93% of large organisations and 76% of small businesses

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through trust

Cyber Security Management

KEY STEPS FOLLOWING A DATA BREACH

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Big 4 Information Security Forum

2015 Information Security Awareness Catalogue

Cybersecurity The role of Internal Audit

FERPA: Data & Transport Security Best Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Corporate Incident Response. Why You Can t Afford to Ignore It

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

defense through discovery

Developing Secure Software in the Age of Advanced Persistent Threats

Enterprise Cybersecurity: Building an Effective Defense

Training Programs for Enterprise-Wide Change

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Transcription:

Developing a Successful Security Awareness Training Program Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.

Agenda The human element of cyber security Building your case Building a security awareness program Best practices for training effectiveness

How Large is the Problem? 91% of targeted attacks involve spear-phishing emails (1) 29% of breaches in 2012 leveraged social tactics (2) 31% of mobile users received a text from someone they didn t know requesting that they click a link or dial an unknown number (3) 1 Trend Micro, November 2012 2 Verizon Data Breach Investigations Report 2013 3 Cloudmark, September 2012

Increasingly Sophisticated Attacks Spear-phishing targeting specific groups or individuals Leveraging of information about your organization, group or you Mobility adding new challenges Traditional red flags missing Email subpoena from the US District Court in San Diego with your name, company and phone number, and your lawyers name, company & phone number

Human Defenses Must be Strengthened The end user is the target Exploits human weakness The end user is the problem Technology can t solve the issues Countermeasures must be taken

Humans are the Weakest Link Overlooking the human element is most common mistake in computer security 1 PWC Information Security Breaches Survey (April 2012) 2 Deloitte Global Security Survey (Feb 2009) 93% of large organizations had a security breach(1) 82% of large organizations had staff driven incidents(1) 47% had employees lose or leak confidential information(1) 86% of companies cite humans as their greatest vulnerability(2)

Technology Alone Won t Work Tempting to just buy software or hardware that promises to solve these problems However, attackers are very resourceful, constantly looking to circumvent your defenses Security controls are lagging behind technology adoption Technology alone can t motivate people Human error is involved in more than 95% of the security incidents investigated in 2013 IBM Security Services 2014 Cyber Security Intelligence Index

Training has a Big Role to Play Lack of understanding of risks Wide range of scenarios Required knowledge is vast & growing Delivery methods must be compelling Security is a secondary task Root cause is often a failure to invest in educating staff about security risks PWC Information Security Breaches Survey (April 2012)

Building a Strong Security Awareness Program Goals Getting started Key activities Strategies for success

Security Awareness Goals Education Compliance Cost reduction Risk reduction Protecting company & customer data Protect brand reputation

Getting Started Make a plan Know your audience Focus on your organization s goals Measure from the start Gain support

How do you make your case? Develop a budget based on your plan Target your desired behavior(s) Set expectations and goals Request budget & executive support Leverage internal & external supporters

Strategies for Success - Marketing Think of yourself as a marketer The 4Ps : Product, place, positioning, price Drive impressions Reach people through different media Test and adjust strategy based on what is working Gather and analyze data

Strategies for Success - Support Gain support throughout the organization Executive management, peers, key stakeholders Encourage and even praise engagement Share successes (and failures) Lack of support can kill efforts Blocked activities Slipped schedules Reallocated funding

Align education approach with goals Fit to company culture Prioritize content based on need Leverage continuous improvement Multiple communication methods Training content - Emails/newsletters Websites/portals - Posters Giveaways Align with different audiences New employee onboarding - Ongoing education Knowledge refresh - Remediation education

Lessons Learned Don t wait until you have a breach Organizational support & executive buy-in speeds approvals Create an internal awareness steering group (support group) Include assessments to measure knowledge and susceptibility Vary the educational material/campaigns Include in-person activities into your plan Brush up on marketing & communications Test with a small group to get started

Continuous Training Methodology Assessment Across All or Some Topics Analyze & Repeat Education Scheduled Training for Everyone Simulated Attacks Email, Smish, Memory Device

Social Engineering Assessments Links education & assessments Assesses vulnerability and keeps users vigilant in their defense Motivates users to take training Possible attacks email phishing memory device SMS/text message

Definition of Effective Training Present concepts and procedures together Bite-sized lessons Learn by doing Story-based environment Create teachable moments Provide immediate feedback Use conversational content Collect valuable data

From Simple to Increasingly Realistic

End Users are Trainable Mock Phishing Attack Email storage & Email account issues Over 80% Reduction in Less than 45 Days Training Modules Repeat Just In Time Training 35% Failure 1 st Campaign 6% Failure 2 nd Campaign Auto-Training Enrollment Email Security and URL Training

90% Increase in Training Penetration Mock Phishing Attack Social media invite & Password update 69% Less Susceptible in 54 Days Training Modules Repeat Just In Time Training 35% Failure 1 st Campaign 11% Failure 2 nd Campaign Auto-Training Enrollment Email Security and URL Training

Education Works, When Done Right Your end users are the target Direct correlation between strong awareness program and reduced attacks Continuous security education leveraging learning science principles for best results Security education can have a positive ROI with only a 10% reduction in susceptibility to attack Companies who deploy awareness training reduce staff-related security breaches by 50%(1) (1) PricewaterhouseCoopers 2012 Information Security Breaches Survey

For more information contact: info@wombatsecurity.com +1-412-621-1484