A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’

Slides:



Advertisements
Similar presentations
Board Governance: A Key to Quality Organizations
Advertisements

WV High Quality Standards for Schools
Microsoft Operations Framework (MOF) 4.0
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 4: Effective Integration.
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Campus Improvement Plans
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Overarching Roles of Critical Partners In A Project 9:30 – 10:00 Rob Curlee, FMO Joseph Dominque, OCISO Mike Perry, EA.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
IT Governance and Management
IT Planning.
Orientation to Performance and Quality Improvement Plan
By Saurabh Sardesai October 2014.
Procurement Transformation State of North Carolina
Federal IT Security Professional - Manager FITSP-M Module 1.
Core Performance Measures FY 2015
1 IT Security Awareness, Training and Education Trends Dan Costello Policy Analyst OMB.
Community Planning Training 1-1. Community Plan Implementation Training 1- Community Planning Training 1-3.
Emerging Latino Communities Initiative Webinar Series 2011 June 22, 2011 Presenter: Janet Hernandez, Capacity-Building Coordinator.
Control environment and control activities. Day II Session III and IV.
Effectively applying ISO9001:2000 clauses 5 and 8
Learning with a Purpose: Learning Management Systems Patti Holub, Director District Initiatives and Special Projects Miguel Guhlin, Director Instructional.
Project Human Resource Management
A SOUND INVESTMENT IN SUCCESSFUL VR OUTCOMES FINANCIAL MANAGEMENT FINANCIAL MANAGEMENT.
1 Module 4: Designing Performance Indicators for Environmental Compliance and Enforcement Programs.
Chapter 6 Training and Development in Sport Organizations.
Training of Process Facilitators Training of Process Facilitators.
District Workforce Module Preview This PowerPoint provides a sample of the District Workforce Module PowerPoint. The actual Overview PowerPoint is 62 slides.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Donald R. Rainey, Sr., CPPB/VCO Director, Office of General Services Virginia Department of Social Services.
Human Resource Development for the Central Pollution Control Board National Comprehensive Training Needs Assessment CPCB-InWEnt-GTZ/ASEM Concept for the.
Federal Information System Security Educators Association
FewSomeAll. Multi-Tiered System of Supports A Comprehensive Framework for Implementing the California Common Core State Standards Professional Learning.
Federal IT Security Professional - Auditor
Certificate IV in Project Management Introduction to Project Management Course Number Qualification Code BSB41507.
Department of the Interior CPIC Forum Department of the Interior CPIC Forum Capital Planning and Investment Control (CPIC) Revisions to the Construction.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Systems Accreditation Berkeley County School District School Facilitator Training October 7, 2014 Dr. Rodney Thompson Superintendent.
ANNOOR ISLAMIC SCHOOL AdvancEd Survey PURPOSE AND DIRECTION.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
Environmental Officer Course Introduction Fort Wainwright, Alaska Environmental Officer Course 2011 Name//office/phone/ address UNCLASSIFIED 12/24/2015.
1 expect the best Briefing to the IT Project Review Committee December 8, 2004 ITIB Recommended Technology Investment Projects (RTIP)
FISSEA Conference 2004 Developing Role-based Learning Activities U.S. Department of State.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
PRESENTATION TO THE PORTFOLIO COMMITTEE ON HIGHER EDUCATION AND TRAINING NSFAS ANNUAL PERFORMANCE PLAN 2013/14 24 APRIL
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Implementing Program Management Standards at Duke Energy.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Board Assessment Governing Board Online Training Module.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Security Policy Development for Management By Peter McCarthy.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
The International Society for Quality in Health Care (ISQua) – Guidelines.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Module 9: Transition and Exit Strategy ASEAN Training of Trainers (TOT) on Disaster Recovery.
Project Human Resource Management
Accountability and Internal Controls – Best Practices
Research Program Strategic Plan
By Jeff Burklo, Director
Performance Management Training
Cynthia Curry, Director National AEM Center
Presentation transcript:

A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’ Association (FISSEA) Executive Board Member Security Orientation Annual Security Training Security Awareness Role-Based Training

Office of IT Strategic Plan IT Security Policy Training Program Training Plan Stakeholder Meetings Vision Mission Goals Security Training Program Success Training Strategic Plan  Meetings  Working Groups  Communities of Practices  Committees  Goals and objectives  Milestones to achieve  Performance indicators  Goals and objectives  Milestones to achieve  Performance indicators  Define authority  Assign responsibility  Guide resource allocation  Define parameters  Determine logistics  Identify resources  Acquire resources  Execute Program  Evaluate Program Organizational acceptance and integration of IT security policies, procedures, and practices within an organization’s existing lines of business rules and practices.

TRAINING STATEGIC PLAN Mission, Vision, Goals and Objectives MISSION: The mission is to ensure that a comprehensive, effective, and measurable training program is fully implemented and evaluated and aligned with Office of IT Security’s business objectives and strategic goals. VISION: To achieve and effective and efficient Training Program that is integrated at all levels within the Department/Agency and in compliance with all security-related statutes, regulations and Federal laws. STRATEGIC GOALS: GOAL 1: Design, develop, and implement a fully-integrated security training program. GOAL 2: Comply with Federal Information Security Directives GOAL 3: Ensure security training program is evaluated to determine transfer of learning and return on investment (ROI) A Strategic Plan guides the process to creating the training Plan which leads to establishing or maintaining a training program.

Strategic Plan objectives guide the process to creating a Training Plan which leads to establishing or maintaining a Training Program. OBJECTIVE: Awareness Provide security awareness activities to all employees within the Department/Agency OBJECTIVE: Awareness Provide security awareness activities to all employees within the Department/Agency OBJECTIVE: Orientation Identify all new hires and provide security orientation “60-days prior to employee’s use of IT systems” OBJECTIVE: Orientation Identify all new hires and provide security orientation “60-days prior to employee’s use of IT systems” OBJECTIVE: Role-Based (Specific) Training Identify all employees with significant security responsibilities to provide security training in functional specialties OBJECTIVE: Role-Based (Specific) Training Identify all employees with significant security responsibilities to provide security training in functional specialties OBJECTIVE: Annual Refresher Training Identify all IT end-users and provide security awareness training “annually” OBJECTIVE: Annual Refresher Training Identify all IT end-users and provide security awareness training “annually” TRAINING STRATEGIC PLAN GOAL 1: Design, develop and implement a fully integrated training program GOAL 2: Comply with Federal IT security directives and mandates GOAL 3: Ensure training program is evaluated TRAINING STRATEGIC PLAN GOAL 1: Design, develop and implement a fully integrated training program GOAL 2: Comply with Federal IT security directives and mandates GOAL 3: Ensure training program is evaluated

A Strategic Plan guides the process to creating the Training Plan which leads to a Training Program. Training Strategic Plan AWARENESS Provide security awareness activities to all employees within the Department/Agency ORIENTATION Provide security orientation “60 days prior to employee’s use of IT systems” REFRESHER TRAINING Provide security awareness training “annually” ROLE-BASED TRAINING Provide role-specific training in functional specialties Training Plan [Needs Analysis] 1. Title 2. Purpose 3. Target Audience 4. Learning Objectives 5. Budget Allocation 6. Training Delivery Method 7. Delivery Timeframes 8. Proposed Additional Resources 9. Evaluation and Measurement

Developing a Training Plan can be considered the Analysis (and Design) phase of what instructional designers/training specialists call the ADDIE model Analysis Development Design ImplementationSummative Evaluation Formative Evaluation McGriff (2000) Instructional Systems, College of Education, Penn State University Define what is to be learned

A Training Plan determines the learner profile, description of possible constraints and needs Training Plan [Outline] 1. Title: Security Basics and Literacy (Orientation) 2. Purpose: To provide basic security concepts to new hires 60 days upon use of an IT system 3. Target Audience: All new hires [120 employees a year] 4. Learning Objectives (Beginning) At the end of this course, given the materials, discussions and activities, the participants will be able to: understand our enterprise and critical infrastructure, prevent and reduce common threats, practice safeguards and countermeasures and protect our information technology assets. 5. Budget Allocation: Are funds available for Security Basics and Literacy? [Yes/No] 6. Training Delivery Method: Instructor-Led Training 7. Delivery Timeframes: Minutes 8. Proposed Additional Resources: What resources are available to design, develop and deliver the course? Developed by Program Analyst 9. Evaluation and Measurement: Reaction (Attitude Survey)

The Kirkpatrick Model of evaluation utilizes four levels of evaluation: Reaction, Learning, Behavior and ROI Level 4 Level 3 Level 2 Level 1 BUSINESS IMPACT/ROI – compares the cost of the training with benefits BEHAVIOR - transfer of learning is the extent to which a change in behavior LEARNING- extent to which participant’s attitudes change, improve knowledge and increase skills REACTION – feedback of attitude and feeling towards training

Developing the Training Plan by identifying training criteria Training Plan [Analysis] 1. Title: Annual Security Awareness Training 2. Purpose: Provide security awareness training to “produce relevant and needed security skills and competencies” 3. Target Audience: All IT end-users [100 – 100,000 + employees] 4. Learning Objectives: At the end of this course, given scenarios and activities, the participants will be able to: identify threats and vulnerabilities to computer systems, introduce computer security policies, describe appropriate computer security practices, review the role of the security organization and inform users of their responsibilities 5. Budget Allocation: Are funds available for Security Awareness Training [Yes/No] 6. Training Delivery Method: Computer-Based Training [Web-based Training] 7. Delivery Timeframes: Minutes 8. Proposed Additional Resources: What resources are available to design, develop and deliver the course? Developed by Contractor 9. Evaluation and Measurement: Reaction (Level 1) and Learning (Level 2)

The Kirkpatrick Model of evaluation utilizes four levels of evaluation: Reaction, Learning, Behavior and ROI Level 4 Level 3 Level 2 Level 1 BUSINESS IMPACT/ROI – compares the cost of the training with benefits BEHAVIOR - transfer of learning is the extent to which a change in behavior LEARNING - extent to which participant’s attitudes change, improve knowledge and increase skills REACTION – feedback of attitude and feeling towards training

To determine the needs for role-based training we reference NIST SP IT Security Training Matrix IT SECURITY TRAINING MATRIX FUNCTIONAL SPECIALTIES TRAINING AREAS A MANAGE B ACQUIRE C DESIGN & DEVELOP D IMPLEMENT & OPERATE E REVIEW & EVALUTE F USE G OTHER 1. LAW & REGULATIONS1A1B1C1D1E1F 2. SECURITY PROGRAM 2.1 PLANNING2.1 A2.1 B2.1 C2.1 D2.1 E 2.2 MANAGEMENT2.2 A 2.2 B2.2 C2.2 D2.2 E 3. SYSTEM LIFE CYCLE SECURITY 3.1 INITIATION3.1 A3.1 B3.1 C 3.1 E3.1 F 3.2 DEVELOPMENT3.2 A3.2 B3.2 C3.2 D3.2 E3.2 F 3.3 TEST & EVALUATION 3.3 C3.3 D3.3 E3.3 F 3.4 IMPLEMENTATION3.4 A 3.4 C3.4 D3.4 E3.4 F 3.5 OPERATIONS3.5 A 3.5 C3.5 D3.5 E3.5 F 3.6 TERMINATION3.6 A 3.6 C3.6 D3.6 E 4. OTHER

Continue to identify the training criteria for role-based training: IT Security Management: Manage Training Plan [Analysis] 1. Title: IT Security Management [2.2 A] 2. Purpose: Provide role-based training in functional specialties to understand and implement a security program that meets organizational needs 3. Target Audience: CIO, Information Resource Manager, IT Security Specialist/Manager, Program Manager 4. Learning Objectives: At the conclusion of this module, individuals will be able to: -Monitor organizational activities to ensure compliance with the existing IT security program -Review organizational IT security plans to ensure they appropriately address the security requirements of each system -Interpret patterns of non-compliance to determine their impact on levels of risk and/or overall effectiveness of the IT security program and, on that basis, modify or augment the program as appropriate 5. Budget Allocation: Are funds available for Security Awareness Training [Yes/No] 6. Training Delivery Method: Instructor-Led; Web-based; Computer-Based; Blended 7. Delivery Timeframes: Minutes 8. Proposed Additional Resources: What resources are available to design, develop and deliver the course? Developed by Contractor 9. Evaluation and Measurement: Reaction (L1), Learning (L2), Behavior (L3), ROI (L4)

To determine the needs for role-based training we reference NIST SP IT Security Training Matrix IT SECURITY TRAINING MATRIX FUNCTIONAL SPECIALTIES TRAINING AREAS A MANAGE B ACQUIRE C DESIGN & DEVELOP D IMPLEMENT & OPERATE E REVIEW & EVALUTE F USE G OTHER 1. LAW & REGULATIONS1A1B1C1D1E1F 2. SECURITY PROGRAM 2.1 PLANNING2.1 A2.1 B2.1 C2.1 D2.1 E 2.2 MANAGEMENT 2.2 A 2.2 B 2.2 C2.2 D2.2 E 3. SYSTEM LIFE CYCLE SECURITY 3.1 INITIATION3.1 A3.1 B3.1 C 3.1 E3.1 F 3.2 DEVELOPMENT3.2 A3.2 B3.2 C3.2 D3.2 E3.2 F 3.3 TEST & EVALUATION 3.3 C3.3 D3.3 E3.3 F 3.4 IMPLEMENTATION3.4 A 3.4 C3.4 D3.4 E3.4 F 3.5 OPERATIONS3.5 A 3.5 C3.5 D3.5 E3.5 F 3.6 TERMINATION3.6 A 3.6 C3.6 D3.6 E 4. OTHER

Continue to identify the training criteria for role-based training: IT Security Management: Acquire Training Plan [Analysis] 1. Title: IT Security Management [2.2 B] Acquisition 2. Purpose: Provide role-based training in functional specialties to gain a sufficient understanding of IT security and the acquisition process to incorporate IT security program requirements into acquisition work 3. Target Audience: Contracting Officer, COTR, Information Resource Manager, IT Specialist/Manager, IT Invest Review Board Members 4. Learning Objectives: At the conclusion of this module, individuals will be able to: -Identify areas within the acquisition process where IT security work steps are required. -Develop security work steps for inclusion in the acquisition process -Evaluate procurement activities to ensure the IT security work steps are being effectively performed 5. Budget Allocation: Are funds available for Security Awareness Training [Yes/No] 6. Training Delivery Method: Instructor-Led; Web-based; Computer-Based; Blended 7. Delivery Timeframes: Minutes 8. Proposed Additional Resources: What resources are available to design, develop and deliver the course? Developed by Contractor 9. Evaluation and Measurement: Reaction (L1), Learning (L2), Behavior (L3), ROI (L4)

The Kirkpatrick Model of evaluation utilizes four levels of evaluation: Reaction, Learning, Behavior and ROI Level 4 Level 3 Level 2 Level 1 BUSINESS IMPACT/ROI – compares the cost of the training with benefits BEHAVIOR - transfer of learning is the extent to which a change in behavior LEARNING - extent to which participant’s attitudes change, improve knowledge and increase skills REACTION – feedback of attitude and feeling towards training

Developing a Training Plan can be considered the Analysis (and Design) phase of what Instructional designers or training specialists call the ADDIE model Analysis Development Design ImplementationSummative Evaluation Formative Evaluation McGriff (2000) Instructional Systems, College of Education, Penn State University Define what is to be learned Determine the effectiveness of the instruction Plan instruction Execute instruction Develop instructional materials

TRAINING AUDIENCE MATRIX Target Audience Training Type CIOIT Specialist Program ManagerCOTR End- Users New Hires ORIENTATION TRAINING X AWARENESS TRAINING X ROLE-BASED TRAINING Security Management Courses Managing a Security Organization XXX Integrating Security into Acquisition Lifecycle XXX Create a a series of Matrixes to determine trends to guide decision- making : Training Audience Matrix

BUDGET ALLOCATION MATRIX Are Resources Available for this Course Training Type YesNoMaybe Security Orientation X Awareness Training X Role-based Training Security Management Courses Managing a Security Organization X Integrating Security into Acquisition Lifecycle ` X Create a a series of Matrixes to determine trends to guide decision- making : Budget Allocation, Training Delivery, Delivery Timeframe, Additional Resources, and Evaluation and Measurement

Training Delivery Matrix What type of training will be used? Training Type ILTWBTCBTBlended Security OrientationX Awareness Training X Role-based Training Security Management Courses Managing a Security Organization X Integrating Security into Acquisition Lifecycle ` X Create a a series of Matrixes to determine trends to guide decision- making : Budget Allocation, Training Delivery, Delivery Timeframe, Additional Resources, and Evaluation and Measurement

Office of IT Strategic Plan IT Security Policy Training Program Training Plan Stakeholder Meetings Vision Mission Goals Security Training Program Success Training Strategic Plan After accessing the security training needs determine what is the most effective approach in acquiring resources, executing and evaluating the Training Program Determine what resources you have to accomplish the Training Strategic Plan vision, mission, goals Who can develop training based on needs? What can we do to develop the most effective security training with the resources we have?