The Human Firewall Creating a security aware workforce APPLIED INFORMATION SERVICES Andrew Breakwell Business Development Director Compliance Division.

Slides:



Advertisements
Similar presentations
External Quality Assessments Frequently Occurring Findings Observed by The IIA QA Teams.
Advertisements

Five -Year Strategic Title I School Plan. Session Objectives Review the five year components utilizing the rubric Organize actions steps to meet the requirements.
DaZee Hotels (Management & Allied Services)
UMC for Consulting & Services. UMC UMC for Consulting & Services UMC Profile UMC Profile UMC Range of Consulting Services UMC Range of Consulting Services.
Strategic Value of the HR Function Presentation by
HR Manager – HR Business Partners Role Description
Vocational Rehabilitation QUEST BRAIN INJURY SERVICES Fleur Colohan Vocational Instructor Elaine Armstrong Head of Brain Injury Services.
Presentation and discussion April 15, 2013
THE WORLD BANK Lessons Learned during the use of Global Investment Promotion Benchmarking in Indonesia March 28, 2011 Greg A. Elms Senior Private Sector.
Return On Investment Integrated Monitoring and Evaluation Framework.
Lecture 11 Information Systems Training (Chapter 11)
The Analyst as a Project Manager
PHAB's Approach to Internal and External Evaluation Jessica Kronstadt | Director of Research and Evaluation | November 18, 2014 APHA 2014 Annual Meeting.
Unit Slides by UK Versity.  Unit aims:  This unit aims to help the learner with an opportunity to develop their project management and research skills.
Training Programme – Introduction Training Programme – Introduction Estimated cost of a three year assignment = $ 1 MILLION (Source: Brewster 2001) Done.
Family Outreach and Response Program Strategic Plan September 26 th, 2012.
LMS AND ELEARNING IWA HR SIG THURSDAY 14 NOVEMBER 2013.
SCC EHR Workshop for Contractors: Implementation Considerations May 25, 2011.
Chapter 2 Strategic Training
Training Programme – Introduction Training Programme – Introduction Estimated cost of a three year assignment = $ 1 MILLION (Source: Brewster 2001) Done.
Effectively applying ISO9001:2000 clauses 5 and 8
The Future for BRC Global Standard Food Safety David Brackston Senior Technical Service Manager BRC.
Performance Audit Fraud management in local government Report 19: David Toma Manager 24 July 2015.
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Shared Services Workshop Break-out Session Summaries July 7, 2015.
ISMMMO, Antalya April Internal Audit, Best Practices Özlem Aykaç, CIA,CCSA CAE Coca-Cola İçecek.
School’s Cool in Kindergarten for the Kindergarten Teacher School’s Cool Makes a Difference!
Copyright © IRI, Confidential and proprietary. Expanding Your Training Outlook with E-Learning IRI eSuite See - Act – Win.
Security and your Staff “ Information Assurance Training: An Essential Part of an Effective Security Strategy” March 22, 2005 Pamela Halpern Easy i, Inc.
BBA 229 Training and Development Lecture 2 Strategic Training
Measuring the Impact of Coaching ….now we have gone to all this effort ….has it made any difference? Rick Woodward Director, Learning & Development.
Too expensive Too complicated Too time consuming.
Actions Set a clear aim for the performance of your eligibility system Define why your key audiences (governor, legislature, public) should support it.
Alexander Brookes Associates Limited Olutomi Adeyemi, PhD Director – Alexander Brookes.
The Need for Security Awareness Programs. Agenda 1)The Need for Security Awareness Programs 2)Security Awareness as a Product 3)Phase 1 – Identify Target.
December 14, 2011/Office of the NIH CIO Operational Analysis – What Does It Mean To The Project Manager? NIH Project Management Community of Excellence.
Contract & Commercial Management - the seller side Christian Sandbeck 20 nd October 2009.
BPK Strategic Planning: Briefing for Denpasar Regional Office Leadership Team Craig Anderson Ahmed Fajarprana August 11-12, 2005.
Paul Hardiman and Rob Brown SMMT IF Planning and organising an audit.
Nuclear Security Culture William Tobey Workshop on Strengthening the Culture of Nuclear Safety and Security, Sao Paulo, Brazil August 25-26, 2014.
Developing a Sustainable Procurement Policy and Strategy EAUC – EAF Programme.
Implementing an Effective Global Anti-Bribery Program Implementing an Effective Global Anti-Bribery Program Elaine Murphy, MBA Director Health Care Compliance.
Assessment of Student Learning in General Education AAHE/NCA 2003 Assessment Workshop Omaha, Nebraska ● June 2003.
Change Management Fundamentals – The 20% you need to know which will make you know more than 80% of your colleagues.
Enterprise Service Management (ESM) An Approach for Adopting and Adapting Best Practice Programs to Manage, Secure and Improve an Organizations Information.
IYF’s experience leveraging partnerships for youth development WB Y2Y Conference Session 4: Leveraging Partnerships: The Role of Various Stakeholders October.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
Provided by Training, HR & OD Department Karen. Learning Management Systems January 2014.
Kathy Corbiere Service Delivery and Performance Commission
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
MicroLoan Foundation: Creating balanced staff incentives Daniella Hawkins, Social Performance Manager.
Quality Assurance. Define Quality (product & service) Exceeds the requirements of the customer. General excellence of standard or level. A product which.
Derby City Council and the University of Derby Corporate – a Partnership approach to meet the challenge Pam Hadfield – Specialist Adviser, DCC Angela Crawford.
A Professional Development Series from the CDC’s Division of Population Health School Health Branch Professional Development 101: The Basics – Part 1.
Leading Nottingham Programme update to ACOS 7 September 2010 Angela Probert Director of HR and Organisational Transformation Contributions from Lisa Sharples.
How Good are you at Managing your Processes? Operational Excellence.
1 Dr. Ali Mistarihi Employee Training & Development.
CHANGE MANAGEMENT - PART 2 MODULE 7
Information Security in Laurier Grant Li Wilfrid Laurier University.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Easy i Holdings Limited Terry Hancock, Chief Executive Officer SAI Global Limited ASX Code: SAI ABN: June 2005.
Review of Social Marketing South East Region Presentation to Department of Health South East 5 August 2009 Hannah Corbett (South East.
The benefits of skills-based hiring
Communication Plan PPT Template
Georgia’s Tiered System of Supports for Students Karen Suddeth, Project Director Carole Carr, Communications & Visibility Specialist
Define Your IT Strategy
Presentation transcript:

The Human Firewall Creating a security aware workforce APPLIED INFORMATION SERVICES Andrew Breakwell Business Development Director Compliance Division

2 Agenda  Establishing the Need  Common pitfalls  Planning  Delivery  Evaluation and Metrics

3 Corporate overview  Governance, Risk and Compliance (GRC) specialists for more than 16 years  Focus on improving staff awareness, knowledge and understanding  Providers of:  Information newsfeeds and alerts  Learning content and services  Risk management and auditing systems  Part of SAI Global, ASX quoted, c950 employees  Offices in Europe, North America and Australasia  Global client base – specialists in large scale, international deployments  4,000,000+ end users, resources in 20+ languages

4 Establishing the Need “Most security breaches occur at ground floor level, through employees making errors or inadvertently revealing information. It is ironic therefore that so many organizations do not have a comprehensive awareness program in place... perhaps missing the obvious and focusing upon the rather more stimulating high-tech threat instead.” ISO News

5 Establishing the Need Deloitte 2007 Global Security Survey ‘79 percent of participants cite the human factor as the root cause of information security failures’ CSI Computer Crime and Security Survey 2007 ‘The average annual loss reported in this year’s survey shot up to $350,424 from $168,000 the previous year’ ENISA: IS Awareness Initiatives – Current practice and the measurements of success 2007 ‘… information security is seen as a high or very high priority in four fifths of respondents.’ ‘War stories’

6 Common pitfalls  Lack of senior management support  Adopting a ‘one size fits all’ approach – mismatch between content and target audience  Not connecting the program to a Needs Assessment  Objectives and outcomes poorly defined  Training ‘fatigue’  Poor communication and planning  Developing a limited program based on specific budget target (not the one you want)  Lack of in-house expertise – not involving other experts  Assuming it’s a one-time initiative – not an ongoing process  Lack of evaluation and measurement  BORING…! Lack of engaging and relevant content

7 Planning  Needs assessment

8 Planning Needs Assessment  WHO gets the training  WHAT training they get  HOW the training is delivered  WHERE the training takes place  WHEN the training takes place  Over the short, medium and long term  Aligned with corporate goals and objectives  Clear business case for all elements  Clearly defined measurement criteria - benchmarking

9 Planning  Needs assessment  Identify audience – not a ‘one size fits all’ approach

10 Planning Identify audience  Full time/Part time?  New hires, trainees?  Senior management or management-role?  Specific departments or job ‘families’ (e.g. HR, IT, Security)?  Based on job or role (e.g. employees handling large amounts of data, remote workers)?  Specific technology users (e.g. employees with laptops)?  Specific location (e.g. country or region, manufacturing site, branch offices)?  PLUS customers, suppliers?

11 Planning  Needs assessment  Identify audience – not a ‘one size fits all’ approach  Set objectives and timescales  Collaborate  Communicate and market  What’s available?  Establish the team – identify project owner  Identify resource and budget needs  Express funding needs  Assign a Program Manager

12 Delivery Develop course content  Core training  Senior management training

13 Delivery Core training – to include content for senior managers  E-learning for IT users  Reduced delivery costs  Reduced training time  Flexibility and convenience  Engaging and interactive  Self-paced and non-threatening  Consistent content and delivery  Ease of updating  Accurate measurement and control  Tailored content – ‘off-the-shelf’ or bespoke  Workshops  PowerPoints  Handouts  Trainers Notes  ‘Train the Trainer’ sessions

14 Delivery E-learning – engaging content

15 Delivery Develop course content  Core training  Senior management training  New starter training  Refresher training  Specialist training  Assessment testing

16 Delivery Assessment testing

17 Delivery Develop course content  Core training  Senior management training  New starter training  Refresher training  Specialist training  Assessment testing  Ongoing awareness activity

18 Delivery Ongoing awareness activity Interactive s Marketing materials Posters Newsletters Cartoons Giveaways Video ‘Moments’

19 Delivery  Develop course content  Confirm technology requirements and test  Establish tracking and reporting criteria  Plan and communicate implementation timetable  Schedule launch and pre-launch activity  Ensure clear ownership of project  Analyse effectiveness of training using metrics

20 Evaluation and metrics  Benchmarking prior to training  Completion rates (against previous training?)  Total target audience  By sector  By job role  Three further levels  Reaction level – measuring ‘attitudes’ i.e. through evaluation questionnaires, structured interviews etc  Immediate level – measuring users’ ‘knowledge’ i.e. through pre- and post-training assessment tests  Functional level – measuring ‘behavioural’ change i.e. through observation of business processes and indicators, i.e. helpdesk calls, security breaches and incidents  Return on investment

The Human Firewall Creating a security aware workforce APPLIED INFORMATION SERVICES Andrew Breakwell Business Development Director Compliance Division