Security and your Staff “ Information Assurance Training: An Essential Part of an Effective Security Strategy” March 22, 2005 Pamela Halpern Easy i, Inc.

Slides:



Advertisements
Similar presentations
Implementing a Behavior Based Safety Process at Rockwell Automation
Advertisements

A presentation for CIOs. What are the biggest challenges that face a modern CIO? (Lets list them…)
IBM Corporate Environmental Affairs and Product Safety
A BPM Framework for KPI-Driven Performance Management
1 Auditing in the Public Interest Records Management in the Victorian Public Sector Audit objective Audit had two objectives : The first objective was.
The Human Firewall Creating a security aware workforce APPLIED INFORMATION SERVICES Andrew Breakwell Business Development Director Compliance Division.
PROFILE Business Day offers outsourcing services in sales. We have extensive experience and expertise in the key to any business and.
The HIPAA specialists Partnership Discussion A Winning Partnership for HIPAA E-learning Solutions John Danaher HIPAA Summit V.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
W w w. f a c t i v a. c o m © 2002 Dow Jones Reuters Business Interactive LLC (trading as Factiva). All rights reserved. The Keys to Successful Strategic.
By Collin Smith COBIT Introduction By Collin Smith
1. Failure is when users do not feel they get what they paid for. 2. Failure is when the overall organization fails to adopt the solution.
IT Governance and Management
Health Informatics Series
B&O Committee May 2015 iTRAK - Change Management An Agency Adapting to Change.
By Saurabh Sardesai October 2014.
McGraw-Hill/Irwin © 2005 The McGraw-Hill Companies, Inc. All rights reserved Chapter The Future of Training and Development.
Training and assessing. A background to training and learning 1.
INACOL National Standards for Quality Online Teaching, Version 2.
Student Assessment Inventory for School Districts Inventory Planning Training.
SCC EHR Workshop for Contractors: Implementation Considerations May 25, 2011.
THE PRINCIPLES OF QUALITY MANAGEMENT. DEFINING QUALITY Good Appearance? High Price? The Best? Particular Specification? Not necessarily, but always: Fitness.
How can projects be controlled?
Charting a course PROCESS.
Internal Auditing and Outsourcing
Session No. 3 ICAO Safety Management Standards ICAO SMS Framework
Strategic Planning for EEO & HR Offices Dinah Cohen CAP Director Derek Shields CAP Program Manager EEOC Executive Leadership Conference – May 3-5, 2011.
The Vision Integration Platform Change Readiness Campaign Theme “Together to the Future”
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
From Forgotten Intranet to Successful Wiki: Best Practices for Implementing an Academic Library Staff Wiki University of Nevada, Las Vegas Kristen Costello.
 A project is “a unique endeavor to produce a set of deliverables within clearly specified time, cost and quality constraints”
2008 Adobe Systems Incorporated. All Rights Reserved. Developing an eLearning Strategy at a Nigerian University By Jerome Terpase Dooga, Christopher Tony.
Organization Mission Organizations That Use Evaluative Thinking Will Develop mission statements specific enough to provide a basis for goals and.
© 2003 IBM Corporation July 2004 Technology planning for not-for-profit organizations IBM volunteer name Title, organization.
2010 MBNQA WINNER: K & N MANAGEMENT – SMALL BUSINESS CATEGORY PRESENTED BY: MOORE, YAGER, TODD, PEAVY.
ISMMMO, Antalya April Internal Audit, Best Practices Özlem Aykaç, CIA,CCSA CAE Coca-Cola İçecek.
SOFTWARE AND VENDOR SELECTION
Commonwealth of Massachusetts Statewide Strategic IT Consolidation (ITC) Initiative ANF IT Consolidation Website Publishing / IA Working Group Kickoff.
Actions Set a clear aim for the performance of your eligibility system Define why your key audiences (governor, legislature, public) should support it.
“Helping business to build an inclusive workplace” A Proposal for Membership of UK Council for Access and Equality.
Developing people, growing organisations 1 Delivering change through effective governance Care & Repair Cymru Stephanie Bamford Thursday 20 September 2012.
Advertising, Sales, Marketing and Promotion: Integrating Compliance into Commercial Practices Kathleen Knight VP, Deputy General Counsel, Asst. Sec., Alcon.
Dolina Dowling December 2010 Presentations 2, 3 1
1 © 2004 Cisco Systems, Inc. All rights reserved. Case Study Cisco Unity Voice Messaging Deployment: Communications Strategy November.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
Holistic Approach to Security
MA. EXPORT CENTER COMPLIANCE EXPORT EXPO Presented by : Paul Divecchio –DiVecchio & Associates Phone: (617) , Fax: (508)
Measuring Results of Improvement Actions Márcio Rodrigues, Tallin, 13/01/2015.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Provided by Training, HR & OD Department Karen. Learning Management Systems January 2014.
EFFECTIVE COMMUNICATIONS LOUISE BREAREY – PRINCIPAL ADVISOR WORKSAFE NZ.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Managing programs that promote personal effectiveness.
Presentation to the Ad-hoc Joint Sub-Committee on Parliamentary Oversight and Accountability Wednesday 20 March 2002 PUBLIC SERVICE MONITORING AND EVALUATION.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
UNDERSTANDING INFORMATION MANAGEMENT (IM) WITHIN THE FEDERAL GOVERNMENT.
Introduction to SPA Trade Services PDA Work Flow Management Systems The Era of Change.
Implementing Security Education, Training, and Awareness Programs By: Joseph Flynn.
Effective Action Planning Strategies to Ensure Your Employee Survey Leads to Tangible Improvements Presented by: Matt Roddan ORC International’s Employee.
Projects, Events and Training
Governance and leadership roles for equality and diversity in Colleges
WaterHUB People Worksteam Update 10 July 2018.
By Jeff Burklo, Director
Strategic uses of Web Content Management Systems
SOFTWARE AND VENDOR SELECTION
Presentation transcript:

Security and your Staff “ Information Assurance Training: An Essential Part of an Effective Security Strategy” March 22, 2005 Pamela Halpern Easy i, Inc.

“Common sense is not so common.” - Voltaire ( )

The Human Element of Information Security Training “The best security awareness will provide the right messages to the right people at the right time, provide the tools to all to practice what has been learned and provide a mechanism to measure progress.” -- Gary Sheehan, Information Security Project Leader A survey of office workers at Liverpool Street Station found that 71% were willing to part with their password for a chocolate bar. -- Infosecurity Europe 2004 "This survey proves people are still not as aware as they could be about information security, this often comes down to poor training and procedures. Employers should make sure that their employees are aware of information security policies and that they are kept up-to-date. -- Claire Sellick, Event Director for Infosecurity Europe 2004

This Session  The Key Challenges to getting employee buy-in  Getting Started: Some Common Misconceptions  Issues to Consider  Key Principles for Making IS training truly effective

The Key Challenges  Systems alone are not enough  Overcoming complacency  Different target audiences  Delivering the program  Ongoing program  Cost-effective  Measuring the results  Demonstrating compliance

Developing training solutions - A double challenge Meeting the needs of:  The General Audience  Management

Bringing about meaningful behavioral change from information to understanding Awareness (I know it exists) Awareness (I know it exists) Understanding (I know what it is) Understanding (I know what it is) Value (I know why it is worthwhile) Value (I know why it is worthwhile) Ownership (I like it) Ownership (I like it) Commitment (I’ll do it) Commitment (I’ll do it) Communication (I’ll promote it) Communication (I’ll promote it) Development (I’ll help enhance it) Development (I’ll help enhance it) Enterprise Security Cycle  what is it?  why is it important?  how does it apply to me?

How do you get started?

These are the “no-no’s”!  Just publishing IS policies and procedures is NOT the solution  The IS Officer should NOT be responsible for ALL of the planning, development and implementation of an awareness program  Annual or one-off training will NOT work Common misconceptions about IS training Common misconceptions about IS training

Strategic planning  Who gets the training and how many?  What training they get  Where the training takes place  When the training takes place  How the training is delivered  Over the short, medium and long term  Aligned with corporate goals and objectives  Clear business case for all elements

Training Needs Analysis (TNA) and Scoping A written report on needs and scope of the project Your project team Other agreed key personnel In-house SMEs In consultation with: Security Officers Marketing/PR IT Support Compliance officer Business unit shareholders Understand the context for training Assess current levels of awareness Analyze the needs of the target audience – key groups Define objectives for training Define measures of success Define requirements: Content Delivery (Technical & Operational for each group) Management reporting What is the deliverable? Who does it?What should be done?

TNA - Key factors to be considered  Needs of technical vs. non-technical audience groups  Generic, customized or “created from scratch” content  Appropriate media and delivery channels  Cultural factors  Languages  Time scales  Support requirements Critical factors for success

TNA - Learning Technologies Audit  Current infrastructures  Desktop / bandwidth issues  Existing Learning Management System (LMS)?  Learning standards? (AICC/SCORM*)  Section 508 compliance? *SCORM: Shareable Content Object Reference Model * AICC: Aviation Industry CBT Committee

Creating the Team Involved in defining content requirements and reviewing customized content in early stages of project. Can also be involved in QA. Review and approve content Subject Matter Experts & Business Representatives Supplies details of your technical requirements at the outset of the project and will be available to provide support and assistance during installation. No ongoing requirement for this role unless significant changes are made to the configuration of your IT systems. Input with technical experts re systems requirements and installation Technical / Systems expert Involved in defining requirements and establishing working procedures in early stages of project. Involved in monitoring progress and co-coordinating your input on an ongoing basis. Develops the overall approach to the program Manages the relationship with various groups Key contact for ongoing program management Project Manager CommitmentTasksYour Roles

Needs Analysis Planning Design Development Implementation Evaluation Planning and Implementation Process

Critical factors for success Project planning  Develop an overall communications plan  e-learning is just one component  Communicate with and gain buy-in from senior management  Plan beyond initial training  Include technology and integration requirements  Clearly defined roles and responsibilities  Agreed realistic timescales and clear milestones  Regular reporting and reviews

Developing the “right” solution

What is best? What objectives have you set? What is the size of your organization? What resources do you have? What budget do you have? Can you get management buy-in? “a marketing campaign” This depends on you!

 Core training  Refresher training/awareness  Ongoing awareness/Internal Marketing An Awareness Campaign

Brand and value led Interactive and context led Engaging and innovative Tailored to customer needs

Refresher Training Posters

Interactive s Awareness materials Newsletters Refresher Training

Newsletters – vary the format of the message

A system for gathering, organizing and communicating information and knowledge that is: User-friendly Intuitive Flexible Ongoing Awareness Information Security Portal What should this mean in practice? Web Portals

Feedback and Measurement is Crucial

Feedback and Measurement Feedback and measurement are ESSENTIAL! Delivering awareness solutions via the intranet presents many options. These generally fit into two key categories: 1. Audit/tracking system 2. Learning Management System

Feedback and Measurement 1. Audit/tracking system  built into the main training program  provides information on the progress and performance of each user  may allow you to export information into other applications  generally provided free with the program purchased

Feedback and Measurement 2. Learning Management System  provides the infrastructure needed to track, record, schedule and deliver corporate wide learning  many different kinds of LMS – offering different types of functionality  allows you to manage the variety of training programs/resources available from one central point including, online learning, classroom training, registration, instructor availability etc…  can be very expensive! (may be included with courseware if it’s from same provider)

Feedback and Measurement How do you choose what’s right for your campaign?  Assess how feedback and measurement is currently undertaken for training in other business units – perhaps an LMS is already in place?  What requirements do you and your organization have – now and in the future?  Size of organization  Budget  AICC/SCORM Compliant

The medieval rule of parsimony, or principle of economy, frequently used by Occam came to be known as Occam's Razor. The rule states that plurality should not be assumed without necessity or, in modern English, keep it simple, stupid. Learning Management System

Nine Key Principles for effective IS training

Principle #1 Clarity of Ownership with Executive Buy-In  Clear and unequivocal ownership  Accommodates goals of all business lines  Avoids gaps between words and actions

Principle #2 Integrated Compliance  It’s hard to do compliance of any kind department by department  An integrated approach yields consistent, cost effective and comprehensive results

Principle #3 Less is always more  It’s about understanding, not just information  We can’t all be experts  Reference materials can be made available, as needed  Retention AND commitment plummet after 60 minutes

Principle #4 Value vs. Cost  Costs relate to scale  The real measure is the effectiveness of the outcome, not the cost per head  Security breaches are much more expensive!

Principle #5 The Right Combination of Spirit and Structure  Keep it light, humorous  But also reinforce personal responsibility and the corporate commitment to getting it right

Principle #6 Relevant Context Setting  Relevant, appropriate, realistic  Actual examples from archives or recent situations are best  The goal is understanding how it fits into their daily routines

Principle #7 Consistency  Messages should be consistent  Training and awareness should be delivered so that it fits within the organization’s culture

Principle #8 Technology Should Enable  And no more!  Be careful of adding too many bells and whistles  It’s better to avoid the possibility of technical glitches  The content is the key

Principle #9 Project Management  It’s the key ingredient  Get everyone on board with the plan  Allow time for testing, feedback and fine-tuning

Information Security Assurance Getting the message through

Questions? Pamela Halpern Easy i