Download presentation
Presentation is loading. Please wait.
Published byJeffry Copeland Modified over 6 years ago
1
Successful Security Means “Employee Involvement”
2
Key Ingredients Understanding Training Small & Memorable Everybody
Signs There Are Consequences Understanding: Everyone with access needs to understand why security is important and what their role is. Training: All Employee’s and especially New Employee’s must understand corporate security policy and sign a copy indicating they understand and will comply. Small & Memorable: Security Policy documents should be broken down into small memorable pieces (none longer than one page). This includes all forms of access and controls (passwords, tokens, keycards, acceptable usage) Everybody Signs: All employee’s must be required to sign-off on the security policy. Buy-in comes from signing your name. Consequences: The teeth of any security policy are the “consequences” of not complying. They must be clear and straightforward. If you do x, y will happen. Continually Request Input: Communication, Communication, Communication, what seems logical at the beginning may have undesirable results in practice. Practical process must be evolutionary. Neighborhood Watch: Everyone must be looking out for people, or things that are out of the ordinary, or just don’t belong. Continually Request Input “Neighborhood Watch” Mentality
3
Key Ingredient Notes Understanding: Everyone with access needs to understand why security is important and what their role is. Training: All Employee’s and especially New Employee’s must understand corporate security policy and sign a copy indicating they understand and will comply. Small & Memorable: Security Policy documents should be broken down into small memorable pieces (none longer than one page). This includes all forms of access and controls (passwords, tokens, keycards, acceptable usage) Everybody Signs: All employee’s must be required to sign-off on the security policy. Buy-in comes from signing your name. Consequences: The teeth of any security policy are the “consequences” of not complying. They must be clear and straightforward. If you do x, y will happen. Continually Request Input: Communication, Communication, Communication, what seems logical at the beginning may have undesirable results in practice. Practical process must be evolutionary. Neighborhood Watch: Everyone must be looking out for people, or things that are out of the ordinary, or just don’t belong.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.