Creating a No Phishing Zone Group Discussion Written Project Russell Eubanks & Tsega Thompson SANS Technology Institute- Candidate for Master of Science.

Slides:



Advertisements
Similar presentations
Writing an NCATE/IRA Program Report
Advertisements

GK-12 Annual Reports Who What, Where, When How Results.
A GUIDE TO CREATING QUALITY ONLINE LEARNING DOING DISTANCE EDUCATION WELL.
Construction Crafts Quality Network 11 November Formalising and Standardising the Delivery and Assessment of PDA Non-Specialist Units.
SHELLY POTTS, PH.D. UNIVERSITY OFFICE OF EVALUATION AND EDUCATIONAL EFFECTIVENESS ARIZONA STATE UNIVERSITY Quality Assurance Mechanisms.
Staff Training Type your subject here. Welcome and Introduction Welcome the staff members to the session. State the subject of the session. Describe the.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
Effective Practices Webinar Series: “Stubs, Stats and Starts” Jennifer Radick, MS, CRC, Goodwill Keystone Area Elaine Trinkl, Goodwill Keystone Area September.
 Assessment in the natural environment  Recognize and reinforce multiple modes of communication.  Train communication partners.
FAMU ASSESSMENT PLAN PhD Degree Program in Entomology Dr. Lambert Kanga / CESTA.
 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Chapter 15 Implementing and Validating the Quality System.
Safety Management Strategies for Extended Care Facilities.
Georgia Interoperability Network Training Project Overview Mark Hodges Georgia Tech Research Institute.
Purdue University Academic Advising Assessment Team CODO-IN Survey January 20, 2012.
OVERVIEW May 26, Overview Automate the performance management and compensation processes Integrate employee data between
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 4 Tom Olzak, MBA, CISSP.
IES e-PATT Grant e-PATT: Parents and Teachers Together.
Best Practices in DNP Education: An E-Portfolio System to Archive, Organize, and Evaluate Evidence of Learning AACN Doctoral Education Conference.
OHT 16.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The objectives of training and certification The training and certification.
J.B. Speed School of Engineering University of Louisville Kentucky Energy Efficiency Program for Schools KEEPS Energy Management Toolkit Step 1 Make the.
Implementing ISO 9001 Our project plan Copyright ©2008 The 9000 Store.
GEtServices Contingent Staff Training For Suppliers.
Driving Customers to E-Service Ben Stephens Service Strategies SSPA 2003 San Diego Conference
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Welcome to the Champ Software Topical Webinar Series! How to Use Nightingale Notes for Emergency Preparedness. Please remember to place your phone on mute.
SCSC 311 Information Systems: hardware and software.
Welcome to the San Bernardino County Coach Quarterly Meeting.
Implementing The LS/CMI in Scotland Quality Assurance & The Learning Evaluation Ian McIntosh; Quality Assurance Lead.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
An Orientation: General Psychology Online. The Course Menu Shown on the far left is the menu used to navigate our Psychology course.
© 2007 Pearson Education Managing Quality Integrating the Supply Chain S. Thomas Foster Chapter 16 Implementing and Validating the Quality System.
Orientation and Summer Institutes Implementer’s Forum October 2005 Susan Barrett PBIS Maryland.
Chapter 7 Learning Objectives 1.Discuss how to link training programs to organizational needs. 2.Explain how to assess the need for training. 3.Explain.
School Development Implementation and Monitoring “Building a Learning Community”
Proposed Professional Master’s Degree Overview and Discussion College of Engineering, Advisory Council Meeting March 1, 2010 Laurie Larson, Extended University.
Individual Education Plans.
Unit 8: Implementation, Part II Seminar Wednesday pm ET.
Action Research Action. Pre-Assess (if appropriate) ► Before enacting your plan, gather data and information about the population you are teaching. ►
Assessment, Visibility and Exploitation of non/in- formally acquired competencies of EXperienced EMPLOyees in Enterprises Dr. Aykut Engin March 2011,
Staff development for technology- enhanced learning and assessment an institutional overview Carol Russell.
Blackboard Learn 9.1 Communicating with Students © 2010 Blackboard Inc. All rights reserved.
AET 545 Week 3 Learning Team E-Learning Platform Evaluation Matrix and Rationale Investigate, individually, three e-learning platforms to share with the.
Build an Enterprise IT Security Training Program
An Update on FERPA and Student Privacy
Information Security Awareness Campaign
E-Learning Advisory Group Meeting
Participatory Toolbox
Module 5 HAIL Research This module provides an overview of how researchers will collect data with both Independent Living Specialist(ILS) and consumers.
Program Evaluation.
CCl Expert Team on Education and Training
BECOMING AN EXPERT IN SURVEY DESIGN By Ghania Zgheib EDIT 732
Your session will begin shortly
Performance Management Workday Module
Recruitment and Onboarding
CMGT 445 MASTER Perfect Education/ cmgt445master.com.
VQManager Your e-portfolio.
IS4550 Security Policies and Implementation
Vicki Stokes School of Education 02/10/17
Objectives 1. An overall understanding of how appropriate human resources can be provided for the organization 2. An appreciation for the relationship.
Information Security Awareness Campaign
Keeping your data, money & reputation safe
Your session will begin shortly
Building Organizational Capacity: An evaluation of
Employee Cybersecurity Program
SLO Assessment and Program Review
TRM Reporting Training – Yasmine
2019/2020 Staff Performance Evaluation Cycle Goals – Employee Presentation Tony Yardley, Human Resources.
Presentation transcript:

Creating a No Phishing Zone Group Discussion Written Project Russell Eubanks & Tsega Thompson SANS Technology Institute- Candidate for Master of Science Degree

Overview Phishing vs. Spear Phishing Purpose of Training Program ◦ Pre Assessment User Awareness  Mandatory Webinar ◦ Post Assessment Evaluation  Series of simulated phishing attacks  Mandatory Quiz SANS Technology Institute- Candidate for Master of Science Degree

Testing Simulated Phishing Tests ◦ with link to update employee profile. ◦ with compensation report attached. ◦ with subject “Top Secret”. ◦ suggesting organizational changes. ◦ urging staff members to submit a fortune. Mandatory Employee Quiz ◦ Present phishing attacks and non-attacks to see if employees can identify each. SANS Technology Institute- Candidate for Master of Science Degree

Program Implementation Four week program ◦ Days 1-3: Mandatory Webinar ◦ Days 4-18: Simulated Phishing Tests ◦ Days 6-23: Data Collection & Analysis ◦ Day 24: Mandatory Quiz / Reinforcement Day ◦ Day 25-26: Putting it all together ◦ Day 26: Report Card Day SANS Technology Institute- Candidate for Master of Science Degree

Measuring Success At each level of the program fewer employees will be vulnerable to phishing attacks. Track employees who respond to attacks. Results will be populated in a table for further analysis. Progress will be measured. SANS Technology Institute- Candidate for Master of Science Degree

Example

Summary Social engineering attacks are geared towards exploiting employees. Our best defense is to arm them with the knowledge needed to recognize and report these attacks. SANS Technology Institute- Candidate for Master of Science Degree