The Complete Security Awareness Plan and Strategy Guide v2.0
The Complete Security Awareness Plan and Strategy Guide v2.0
PLAN AND
STRATEGY
GUIDE
END CYBER RISK
S EOCMUPRLI E
C NTGE CSLEO
CUUD
R I ITNYF AWA
R A S TRREUNCETSU
S RGEU I D E
01 06
CHOOSING YOUR EFFECTIVELY DELIVERING
4
TRAINING
14
CONTENTS
02 07
DEFINING ROLES UNDERSTANDING
AND RESPONSIBILITIES TYPES OF TRAINING
5 16
03 08
ESTABLISHING AN IMPLEMENTING
ADVISORY BOARD AWARENESS INITIATIVES
7 20
04 09
IDENTIFYING KEY REPORTING AND
USERS AND ROLES PERFORMANCE METRICS
8 22
05 10
BUILDING YOUR BUILDING A THRIVING
TRAINING PROGRAM
13 24
© 2020
2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 2
C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E
EXECUTIVE SUMMARY
This guide provides you with actionable guidance and strategy for
establishing and maturing your security awareness program. The insights The 15-20 minutes you
in this guide are based on real-life experiences from the experts who spend reviewing this
document will save you
created the security awareness programs for The Walt Disney Company,
dozens of hours
Sony Pictures Entertainment, Activision Blizzard, and other leading firms.
on things like having to
Security awareness is a highly important individual user. We’re doing it to get users to
continually restate
function and will have by default, high make better security decisions. Makes sense, the importance of a
visibility and impact across the company. It right? formal security awareness
is one of very few programs that regularly
interacts with employees, and this fact is
A crucial element to the success of your program, securing budget,
program involves establishing a series of
something to always keep in mind. and avoiding confusion
goals and initiatives that gain approval from
Clearly defining and communicating your a small, internal committee. In this guide, about why your program
security awareness goals and initiatives is the we’ve outlined goals we feel have the greatest isn’t working, among other
lifeline of your program. Programs that don’t impact and have proven successful across
unwelcome activities.
engage with your employees or don’t connect multiple organizations, each with their own
with the unique culture of your company will unique needs.
quickly fail. Think of it as “security marketing.”
You’ll want to define the purpose of your
We’re trying to do the same thing as consumer
program. Being able to state this clearly and
brands: influence a person’s decision-making
simply will come in handy over time, trust us.
process by effectively communicating the
On the next page is a soft example of what we
value of the program to the organization and
suggest.
© 2020
2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 3
C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E
STATEMENT changes, select a mission statement that reflects the outcome you
aim to achieve. Some options include:
Select someone with soft people skills, high emotional intelligence, and powerful
communication abilities. You likely have enough technical resources and SMEs
for this role already, however creativity and effective communication are typically
harder to teach.
The security awareness manager’s biggest responsibility is to use their influence and
Now that we have stated the mission of the
leadership to execute a multi-faceted program that permeates through all areas of
program, you’ll want to define who does the organization. They need to be a bridge builder between the technical and the
what within the program. Roles, titles, and non-technical aspects of the program, as well as those that represent such roles.
responsibilities around a security awareness What’s more, they need to be a talented educator and motivator. An essential
component of the position is to get employees to recognize and understand how
program are going to be very different from
they specifically contribute to the security of the organization, as well as how
company to company. security and proper cyber hygiene is directly tied to the organization’s success.
Recognizing this fact will help you build a culture Because of the nature of traditional security awareness solutions, the security
awareness manager may spend most of their time in an administrative role. They
of security with less resistance. Here are the
will have a full plate building out campaigns, as well as reviewing and editing
essential roles required for an effective program: content and phishing simulations. Alternatively, they can hire an administrator
to oversee the execution of the program, or instead choose a solution that can
manage all the administration tasks of the awareness program.
Some organizations may choose a DIY approach for creating and sharing content
among their employees. This approach should be reserved only for those
with someone who is an experienced teacher, security expert, and program
administrator all rolled into one. Because it takes talent in all three areas to run an
effective security awareness program helps people change their behavior.
CISO CEO
It is critical that senior leadership across all stakeholder departments The CEO plays an essential role by endorsing the goals of the program as
acknowledge the importance of the role and provide appropriate support. well as the methods you plan to use in your program. For their part, the CEO
When possible, the security awareness manager should have a direct line should always be kept informed of the program’s performance by the CISO
of communication with the most senior information security leadership, or corporate communications manager.
typically the CISO, CTO, or CIO.
The CISO needs to champion leadership roles and values of the program.
The CISO can provide input and guidance regarding executive board
Corporate Communications: The Ongoing Relationship
concerns and, in turn, represent the goals of the program to senior All mass communications should be coordinated and approved by your
leadership. They should gain buy-in of the executive board to provide top- communications department. This includes messages to large groups,
down, unified support for the security awareness program. company-wide distributions, and any content being delivered to “all
company.”
The role of the advisory board is to assist the security awareness manager
with planning, executing, and maintaining a successful and engaging program.
Committee members should be considered from among the following positions:
Who to Train
–
IDENTIFYING KEY Once you create your list of groups of people to train, answer the
following questions:
USERS &
ROLES Why does this group need to be trained?
01 Full-Time Employees
Full-time employees typically work 30 hours or Why?
more per week. These employees are not limited
Often full-time employees are used to assess a baseline of knowledge
by contractual or legal regulations, such as
and behavior expectation across the company. This helps address
contractors and consultants, and typically receive the most common risks in an organization and provides the quickest
compensation benefits and payment directly from compliance completion. This is as close to “check-the-box” compliance
the company. Full-time employees must complete as it comes.
compliance-related trainings per policy.
However, full-time employees must be treated as much more than a
baseline requirement. After all, they are likely to have more access to
data and an inner working knowledge of the organization itself. Thus,
they may overly trust and allow fellow employees to take shortcuts,
circumventing security practices or policies.
And, keep in mind, they may also be the most likely to resist change.
This can include new forms of training, such as the security awareness
Unique Requirements program you plan to implement.
to change. Getting this group to adopt Ongoing required online and live training, phishing training, and new-
hire orientation.
new behaviors requires frequent and
effective communication. Clearly state
What?
the purpose of training and end benefit to
Ongoing security awareness education, keeping security defenses, best
the organization as well as the individual
practices, and cyber hygiene top of mind. Security policy highlights,
employee. data classification, acceptable use policy, what is an incident and how to
report it, regulatory requirements (PCI, SOX, HIPAA, etc.).
02 Privileged Users
This includes any user whether that be a full-time Why?
employee, contractor, or consultant, with privileged
These users require technical training based on their role and
or elevated access to any IT resources, customer
must acknowledge and always consider the power and associated
relationship management (CRM) platforms
risk of their access. Non-full-time employees must provide
that hold prospect and customer personal data, confirmation of completed training from their source company
electronic health record (EHR) systems, or payment prior to accessing the network.
processing tools. Common examples include system
Social engineers frequently target and impersonate privileged
administrators, database administrators, network
users in phishing attacks. This is because of privileged users’
engineers, developers, helpdesk, payroll, human
access to data, their information about processes, and their ability
resources, accounts payable, and accounts receivable.
to approve and or make changes within organizational systems.
How?
Unique Requirements Ongoing, online and live training, course certification, onboarding
requirements.
Involve an ambassador from each
technical group for the development and What?
delivery of technical, specialized security Password practices and management, security considerations
training and role-based requirements. for the software development lifecycle (SDLC), role/industry
Equip each ambassador with an appropriate, phishing training.
04 Contractors and
Temporary Staff
Why?
HR, IT, interns, consultants, and other external, These groups represent a high risk to the company because of
non-full-time employees working within the limited training. Often these users have elevated or privileged
network, with access to the same data as network access as full-time employees yet are not mandated
employees. Some may be assigned company email by the same training requirements due to contractual, legal
addresses; others may be provisioned segmented limitations. Nonetheless, contractors should be treated the
network access. same as their full-time peers from a risk perspective and receive
appropriate training based on role and access.
How?
Onboarding process, ongoing online training, and continual annual
verification of knowledge and certifications via the sourcing
vendor. There should also be a formalized offboarding process/
Unique Requirements training to ensure there are no loose ends when a temporary
employee leaves.
This group most likely requires custom
training during the onboarding period.
What?
Legal team should provide guidance
Password practices and management, Security considerations
on possible limitations regarding such
for the software development lifecycle (SDLC), and role/industry
training, but have a definitive support appropriate program.
structure for providing training as written
into contracts.
What to Train
–
BUILDING Focus on a small number of topics and behaviors that represent the
greatest risk to your organization. Identify these risks by meeting
YOUR with senior Infosec leadership, reviewing past incidents caused by
employees, and evaluating industry reports, including the Verizon
TRAINING Database Incident Report (DBIR). In addition, several topics may
be required for compliance or regulatory requirements. Traditional
cybersecurity awareness training includes:
EFFECTIVELY
DELIVERING
How to Train
TRAINING –
01 Organizational
This addresses the company culture. Develop a plan and Work directly with the teams and leaders to identify opportunities to
approach in conjunction with senior management and corporate strengthen support for security awareness and secure behaviors and
communications that reflects full, top-down support of the security habits. Think all-hands meetings, CEO involvement, HR involvement—
awareness program initiatives and goals. written into employee contracts and job descriptions as performance
expectations.
02 Individual
Develop an internal marketing campaign announcing and training Many security awareness solutions have gamification features or in
employees about what to expect from the training program. Modern other words, point trackers that aide in knowing which employees
marketing has revealed it typically takes people hearing something are taking the lead in the program. It is important to utilize this data
7 times before they remember. to offer friendly contests and rewards for the employees who are
doing a great job in the program!
Don’t expect you can begin a security awareness program by just
sending employees the first training session. They won’t know what Another motivating factor for employees to actively participate in a
it is, what to do with it and they will have no idea why they should security awareness program is by giving them an understanding that
even care about it. they are also at risk outside of work.
Instead, spend a few weeks leading up to the launch of the program The intent will be to empower users with the ability to make smart,
announcing it in many different channels. Send emails, announce security-driven decisions in their personal lives that nurture secure
during meetings – especially company all hands or executive habits; along with the tools and resources to maintain secure
announcements, put up posters, use collaboration tools, e.g., Slack behaviors at work.
or Microsoft Teams, and include an announcement about it any
Giving them ways to protect their family is always a big win. Anytime
place there are regular employee communications.
an employee understands how a risk could affect them personally
It’s also important to consider ongoing positive reinforcement and helps them to see the value in whole-hearted participation.
rewards for employees participating in the program.
UNDERSTANDING
TYPES OF
TRAINING Here are the types of trainings we’ve seen included in
successful programs:
01 Compliance Training
Many compliance training topics are required annually.
Most organizations will have a few different types This is often presented as interactive online training.
of training they need to deliver through their The goal of the compliance training is to both set the
expectations for user behavior and processes within an
security awareness program.
organization as well as ensure standards are met.
This is good to acknowledge early in the process. Compliance topics typically revolve around mandated requirements
Identifying those trainings and putting circles that often fall under the human resources umbrella, such as sexual
around them will be helpful as your program plan harassment prevention training, and—as a result—need to be tracked
or administered by HR. Plus, completion and/or infringement upon
begins to take shape and you start considering these compliance topics must be enforced by HR policies.
maturity and phases. Many other compliance topics may overlap into your ongoing
security awareness program, such as payment card industry (PCI)
compliance. But just because you must check a box and provide
compliance training from a legal or auditing standpoint, that doesn’t
replace the need for ongoing security awareness training. Stopping
a potential breach is far more impactful than simply fulfilling a
compliance requirement.
Scientific data supports providing training on at least a bi-weekly For a complete look at how to implement microlearning as part
cadence. According to the Ebbinghaus Forgetting Curve, which of your security awareness strategy, read our white paper: The
demonstrates how information is lost over time when there is no Valuable Role of Microlearning in Cybersecurity. There you will find
attempt to retain new information, people forget 80% of what they in-depth guidance on creating content that supports the essential
learn within a month. functions of an awareness program.
Conversely, the Ebbinghaus Forgetting Curve also shows that if The key for the administrator of any ongoing program is to stay
people engage with education on a specific topic more than once updated in the selecting and scheduling of content campaigns. Many
a month, they retain 200% more information and accurately react administrators will seek out a fully managed security awareness
28% faster than those who learn by other methods. solution to leave the content and its management in the hands of a
trusted vendor, freeing themselves up to be a security awareness
The frequency of training is only part of the equation. The length of
leader rather than functioning solely as program administrator.
lessons also contributes to a program’s success. The ideal length of
a learning session as identified by MIT researchers is three minutes However, it’s important not to get
or less. This forces content coverage to be succinct and focus only wowed by vendors who offer gigantic
on the most critical information. With a consistently short duration, libraries of long-form content instead
viewers know that sessions won’t waste their time or be overly of new and fresh microlearning
taxing, which builds trust and ultimately increases engagement. lessons. When long-form trainings ONGOING
Driving a culture of ongoing learning through scheduled intervals
get outdated, they quickly become a THREATS
drain on employee time and hinder
of re-engagement, and providing short learning sessions are two of
six key principles of microlearning. A retention-focused approach
their ability to stay motivated and REQUIRE
to learning that presents information in a similar format to how the
participate in the program. ONGOING
brain already functions, microlearning ensures people remember
what they’re taught and can recall the information exactly when
SOLUTIONS
they need it.
Users retain 200% Still, not all vendors are the same. Some may have extensive libraries that initially look impressive, but
when given a closer look, the lessons don’t support your program’s goals, meet the learning needs of your
more information users, or provide content that is up to date with the evolving threat landscape.
when educated on a When evaluating vendors, asking the following questions can help you make an informed decision:
Do you utilize scientifically supported learning Does your library include lessons focused on
methodologies in the development of content? educating my users on new and emerging
threats?
If yes, what learning techniques do you use,
and how do they help my users learn and If yes, can you provide recent examples of
retain information? lessons you’ve created on new and emerging
threats?
How frequently are new lessons added to your
content library? Do you provide ongoing tracking, measuring,
and performance reporting on the program?
How do you deploy your training (e.g., LMS or
eLearning portal, directly to user’s inbox)?
03 Phishing Training
Phishing simulations should be included with any ongoing awareness program, and always treated as an educational
tool. Many organizations begin their phishing simulation efforts with education in mind but somehow lose their way
and become overly focused on all the bells and whistles of their phishing simulation tools. Often, they cross a line
between trying to educate employees and... trying to trick them.
This may cause employees to develop animosity toward the entire Along these lines, it is also important to educate employees on how
training program. And once the simulation program focuses on to report suspicious emails. Many different tools can be used to
tricking employees to catch and punish them, the bridge is burned. safely handle potentially dangerous emails. A tool that is readily
Also, if you take a sarcastic tone or shame people who do click on available to many organizations through Outlook and Google
a simulation, employees will begin to avoid the security awareness Workspace is a “report phishing” button that ensures proper and
program at all costs and not react properly when they received a simple reporting.
simulated email.
New Hires and Contractors
Instead, phishing simulations should be used as educational tools
All new employees and contractors should be required to complete
and employees’ engagement with them should elicit a “no shame”
an introduction to the organization’s security practices during
respectful tone. Sending monthly phishing simulations tied directly
employee onboarding, as well as be immediately enrolled in the
to on-the-spot training that teaches them how to properly identify
ongoing security awareness program.
whether an email is a phishing attempt or if it can be trusted is
the best way to build a good relationship between employees and
phishing simulations.
01 Cybersecurity Coaches
This group of volunteer employees act as liaisons within their
department or broader team. Appoint people who have a reputation
in the organization as cyber experts, a passion for developing a
culture of security, and are patient teachers.
The goal is to empower already security-minded users with the tools
and resources they need to spread and strengthen efforts of the
company security awareness program.
varying methods of training throughout Like ambassadors, this group can help promote the program
organization-wide. Emails that come from the office of the CEO or
the year to help reach different sub- their assistant have a much higher open rate by employees, resulting
in greater attention when needing to make key announcements to
cultures within the organization.
employees.
Building a successful culture can only
happen when it is practiced regularly.
Above all else, remember that you, and your entire program are in
place to educate and elevate employees. Don’t get so consumed by
administering your program that you forget about your people. Find
ways to automate your program so you can spend more time leading
your people.