0% found this document useful (0 votes)
421 views25 pages

The Complete Security Awareness Plan and Strategy Guide v2.0

Security Awareness

Uploaded by

Ichi Shin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
421 views25 pages

The Complete Security Awareness Plan and Strategy Guide v2.0

Security Awareness

Uploaded by

Ichi Shin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

THE COMPLETE SECURITY AWARENESS

PLAN AND
STRATEGY
GUIDE
END CYBER RISK
S EOCMUPRLI E
C NTGE CSLEO
CUUD
R I ITNYF AWA
R A S TRREUNCETSU
S RGEU I D E

01 06
CHOOSING YOUR EFFECTIVELY DELIVERING

TABLE OF MISSION STATEMENT

4
TRAINING

14

CONTENTS
02 07
DEFINING ROLES UNDERSTANDING
AND RESPONSIBILITIES TYPES OF TRAINING

5 16

03 08
ESTABLISHING AN IMPLEMENTING
ADVISORY BOARD AWARENESS INITIATIVES

7 20

04 09
IDENTIFYING KEY REPORTING AND
USERS AND ROLES PERFORMANCE METRICS

8 22

05 10
BUILDING YOUR BUILDING A THRIVING
TRAINING PROGRAM

13 24

© 2020
2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 2
C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

EXECUTIVE SUMMARY
This guide provides you with actionable guidance and strategy for
establishing and maturing your security awareness program. The insights The 15-20 minutes you

in this guide are based on real-life experiences from the experts who spend reviewing this
document will save you
created the security awareness programs for The Walt Disney Company,
dozens of hours
Sony Pictures Entertainment, Activision Blizzard, and other leading firms.
on things like having to

Security awareness is a highly important individual user. We’re doing it to get users to
continually restate
function and will have by default, high make better security decisions. Makes sense, the importance of a
visibility and impact across the company. It right? formal security awareness
is one of very few programs that regularly
interacts with employees, and this fact is
A crucial element to the success of your program, securing budget,
program involves establishing a series of
something to always keep in mind. and avoiding confusion
goals and initiatives that gain approval from
Clearly defining and communicating your a small, internal committee. In this guide, about why your program
security awareness goals and initiatives is the we’ve outlined goals we feel have the greatest isn’t working, among other
lifeline of your program. Programs that don’t impact and have proven successful across
unwelcome activities.
engage with your employees or don’t connect multiple organizations, each with their own
with the unique culture of your company will unique needs.
quickly fail. Think of it as “security marketing.”
You’ll want to define the purpose of your
We’re trying to do the same thing as consumer
program. Being able to state this clearly and
brands: influence a person’s decision-making
simply will come in handy over time, trust us.
process by effectively communicating the
On the next page is a soft example of what we
value of the program to the organization and
suggest.

© 2020
2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 3
C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

CHOOSING YOUR Program Mission Statements


MISSION At its foundation, the goal of the security awareness program is to
change behavior through education. In order to achieve the desired

STATEMENT changes, select a mission statement that reflects the outcome you
aim to achieve. Some options include:

01 Nurture a culture of security

02 Create a secure-minded workforce

03 Strengthen the human element of security

04 Communicate the correct security behavior

05 Avoid the front-page headlines in the news

Selecting your mission statement is the first step in building a security


awareness program that will identify risky habits and replace them with
secure ones and instruct users on how to recognize the signs of an attack and
how to react to an attack. This is a long-term, custom program designed to
meet compliance and legal requirements as well as change behavior.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 4


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

Manager, Security Awareness


DEFINING
Ideally, the security awareness program should be managed by a dedicated
ROLES & individual, focused on building and maturing the role and initiatives of the
program. This should be a senior-level management role, or equivalent, within the
RESPONSIBILITIES information security or risk teams.
Historically, successful roles similar to this pull from the creative, right-brain world,
and combine that with an aptitude for, if not prior experience in, security awareness.

Select someone with soft people skills, high emotional intelligence, and powerful
communication abilities. You likely have enough technical resources and SMEs
for this role already, however creativity and effective communication are typically
harder to teach.

The security awareness manager’s biggest responsibility is to use their influence and
Now that we have stated the mission of the
leadership to execute a multi-faceted program that permeates through all areas of
program, you’ll want to define who does the organization. They need to be a bridge builder between the technical and the
what within the program. Roles, titles, and non-technical aspects of the program, as well as those that represent such roles.

responsibilities around a security awareness What’s more, they need to be a talented educator and motivator. An essential
component of the position is to get employees to recognize and understand how
program are going to be very different from
they specifically contribute to the security of the organization, as well as how
company to company. security and proper cyber hygiene is directly tied to the organization’s success.

Recognizing this fact will help you build a culture Because of the nature of traditional security awareness solutions, the security
awareness manager may spend most of their time in an administrative role. They
of security with less resistance. Here are the
will have a full plate building out campaigns, as well as reviewing and editing
essential roles required for an effective program: content and phishing simulations. Alternatively, they can hire an administrator
to oversee the execution of the program, or instead choose a solution that can
manage all the administration tasks of the awareness program.

Some organizations may choose a DIY approach for creating and sharing content
among their employees. This approach should be reserved only for those
with someone who is an experienced teacher, security expert, and program
administrator all rolled into one. Because it takes talent in all three areas to run an
effective security awareness program helps people change their behavior.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 5


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

CISO CEO
It is critical that senior leadership across all stakeholder departments The CEO plays an essential role by endorsing the goals of the program as
acknowledge the importance of the role and provide appropriate support. well as the methods you plan to use in your program. For their part, the CEO
When possible, the security awareness manager should have a direct line should always be kept informed of the program’s performance by the CISO
of communication with the most senior information security leadership, or corporate communications manager.
typically the CISO, CTO, or CIO.
The CISO needs to champion leadership roles and values of the program.
The CISO can provide input and guidance regarding executive board
Corporate Communications: The Ongoing Relationship
concerns and, in turn, represent the goals of the program to senior All mass communications should be coordinated and approved by your
leadership. They should gain buy-in of the executive board to provide top- communications department. This includes messages to large groups,
down, unified support for the security awareness program. company-wide distributions, and any content being delivered to “all
company.”

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 6


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

ESTABLISHING AN Advisory Board



ADVISORY
BOARD
The advisory board should consist of various members from the information
security department as well as some key stakeholders from other departments.

The role of the advisory board is to assist the security awareness manager
with planning, executing, and maintaining a successful and engaging program.
Committee members should be considered from among the following positions:

Do you know how companies get big things


to happen internally? They have planning InfoSec Stakeholders IT Legal Risk
committees, and steering committees, and IR, vulnerability Email, architecture, Corporate
management, helpdesk, etc. communications,
board members. The purpose of these groups is
governance, privacy human resources,
to help establish the program’s goals and make marketing
sure every stakeholder is represented. These
committees are powerful tools, so we suggest
establishing one right from the start. When
created with purpose, it will become a key
factor in your program’s success.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 7


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

Who to Train

IDENTIFYING KEY Once you create your list of groups of people to train, answer the
following questions:
USERS &
ROLES Why does this group need to be trained?

How does the training need to be administered?

What does this group need to learn?

Are there any unique requirements for this group?


Once you’ve established an advisory board,
Try to identify specific types of roles or users who, in addition to
you can move forward with your overall plan
receiving required training, may need a custom course of training,
and begin to identify your key users and roles delivery method, or additional topics.
across the company who will need advanced In the upcoming pages, we offer a generalized look at the four most
training in addition to the training most common groups of employees to consider as you map out your security
awareness journey:
learners will receive.

It’s important to know who makes up your


environment, so you can provide knowledge
appropriately. Good security awareness policy
doesn’t need to be too complicated and can
be developed at a high-level.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 8


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

01 Full-Time Employees
Full-time employees typically work 30 hours or Why?
more per week. These employees are not limited
Often full-time employees are used to assess a baseline of knowledge
by contractual or legal regulations, such as
and behavior expectation across the company. This helps address
contractors and consultants, and typically receive the most common risks in an organization and provides the quickest
compensation benefits and payment directly from compliance completion. This is as close to “check-the-box” compliance
the company. Full-time employees must complete as it comes.
compliance-related trainings per policy.
However, full-time employees must be treated as much more than a
baseline requirement. After all, they are likely to have more access to
data and an inner working knowledge of the organization itself. Thus,
they may overly trust and allow fellow employees to take shortcuts,
circumventing security practices or policies.
And, keep in mind, they may also be the most likely to resist change.
This can include new forms of training, such as the security awareness
Unique Requirements program you plan to implement.

Full-time employees tend to be set in


their ways and are often more resistant How?

to change. Getting this group to adopt Ongoing required online and live training, phishing training, and new-
hire orientation.
new behaviors requires frequent and
effective communication. Clearly state
What?
the purpose of training and end benefit to
Ongoing security awareness education, keeping security defenses, best
the organization as well as the individual
practices, and cyber hygiene top of mind. Security policy highlights,
employee. data classification, acceptable use policy, what is an incident and how to
report it, regulatory requirements (PCI, SOX, HIPAA, etc.).

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 9


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

02 Privileged Users
This includes any user whether that be a full-time Why?
employee, contractor, or consultant, with privileged
These users require technical training based on their role and
or elevated access to any IT resources, customer
must acknowledge and always consider the power and associated
relationship management (CRM) platforms
risk of their access. Non-full-time employees must provide
that hold prospect and customer personal data, confirmation of completed training from their source company
electronic health record (EHR) systems, or payment prior to accessing the network.
processing tools. Common examples include system
Social engineers frequently target and impersonate privileged
administrators, database administrators, network
users in phishing attacks. This is because of privileged users’
engineers, developers, helpdesk, payroll, human
access to data, their information about processes, and their ability
resources, accounts payable, and accounts receivable.
to approve and or make changes within organizational systems.

How?

Unique Requirements Ongoing, online and live training, course certification, onboarding
requirements.
Involve an ambassador from each
technical group for the development and What?
delivery of technical, specialized security Password practices and management, security considerations
training and role-based requirements. for the software development lifecycle (SDLC), role/industry
Equip each ambassador with an appropriate, phishing training.

understanding of where the program


is succeeding as well as any areas for
improvement that they are in a position to
support.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 10


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

03 C-Level Executives and


Their Support Staff
Why?
C-level executive roles and their support staff, These individuals represent a high risk to the company due to daily access
such as administrative staff and assistants, to highly sensitive information, international travel, and sometimes a habit
represent a unique risk as access may be of making and following their own rules.
connected at the hip. Often, executive level Often C-level executives use their authority to exempt themselves from
access is delegated to support staff. Training both security awareness training. This is NOT recommended. Leaders shouldn’t
roles with a custom program that addresses their develop a reputation of disregarding security practices and policies.
unique level of risk provides significant value.
They are often the most imitated position in an organization and the
majority of a social engineer’s efforts are successful when they convince
another employee to go outside normal policies and make exceptions. If a
Unique Requirements privileged user has established a firm reputation for abiding and upholding
Executives most likely require in-person, custom training. policies and procedures and promotes the security awareness trainings,
Leverage executive assistants to help train and guide targeted employees will have higher confidence in turning down and
their bosses. The assistants should be the first to receive reporting an impersonation attack when it takes place.
training, as they usually provide clear insight into the
habits and behaviors of their bosses. How?
Assistants frequently execute on many tasks asked of Ongoing online and live, in-person sessions with a custom white-glove feel.
the executives. And an assistant may have authority to Direct meetings and reports from the CISO to the CEO monthly.
request payments and perform other requests or actions
without any checks and balances, making them an equally
What?
attractive target as their executive boss.
Training that is curated for specific behaviors and concerns of the role,
As a result, executive assistants need to be closely
company culture, and job requirements. Emphasize and educate executives
trained on identifying phishing attacks and know that
on the key role they play in top down promotion of the security awareness
social engineers will always attempt to impersonate their
program. Educate executives on the few key metrics they need to have
executive bosses to trick and victimize them directly.
insight. And, importantly, educate the executive on the responsibility they
have in the event of security incidents.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 11


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

04 Contractors and
Temporary Staff
Why?
HR, IT, interns, consultants, and other external, These groups represent a high risk to the company because of
non-full-time employees working within the limited training. Often these users have elevated or privileged
network, with access to the same data as network access as full-time employees yet are not mandated
employees. Some may be assigned company email by the same training requirements due to contractual, legal
addresses; others may be provisioned segmented limitations. Nonetheless, contractors should be treated the
network access. same as their full-time peers from a risk perspective and receive
appropriate training based on role and access.

How?
Onboarding process, ongoing online training, and continual annual
verification of knowledge and certifications via the sourcing
vendor. There should also be a formalized offboarding process/
Unique Requirements training to ensure there are no loose ends when a temporary
employee leaves.
This group most likely requires custom
training during the onboarding period.
What?
Legal team should provide guidance
Password practices and management, Security considerations
on possible limitations regarding such
for the software development lifecycle (SDLC), and role/industry
training, but have a definitive support appropriate program.
structure for providing training as written
into contracts.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 12


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

What to Train

BUILDING Focus on a small number of topics and behaviors that represent the
greatest risk to your organization. Identify these risks by meeting
YOUR with senior Infosec leadership, reviewing past incidents caused by
employees, and evaluating industry reports, including the Verizon
TRAINING Database Incident Report (DBIR). In addition, several topics may
be required for compliance or regulatory requirements. Traditional
cybersecurity awareness training includes:

Policies Remote Working


Reporting Wi-Fi
Now that you’ve identified who you need Phishing Security Passwords
to train, determining what to train them Social Engineering Online Security
on becomes slightly easier. Typically, this Ransomware Physical Security
includes topics you’d expect to be included
Mobile Devices Privacy
as part of security awareness training but
should also include topics specific to your
Social Media Policy Security Culture
culture and roles.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 13


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

EFFECTIVELY
DELIVERING
How to Train
TRAINING –

Execution Strategies for Your Security Awareness Program:

You want to engage people. If users don’t listen or aren’t motivated


to change their behaviors, your program will fail. That’s why it is
important to engage with your audience on two levels:

Now that you know who you want to train—and


on what topics—you can now pinpoint the best
methods for delivery. Part of a solid strategy
Organizational Individual
involves determining your information security
communication plan and how it will cohabitate
with the other goals.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 14


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

01 Organizational
This addresses the company culture. Develop a plan and Work directly with the teams and leaders to identify opportunities to
approach in conjunction with senior management and corporate strengthen support for security awareness and secure behaviors and
communications that reflects full, top-down support of the security habits. Think all-hands meetings, CEO involvement, HR involvement—
awareness program initiatives and goals. written into employee contracts and job descriptions as performance
expectations.

02 Individual
Develop an internal marketing campaign announcing and training Many security awareness solutions have gamification features or in
employees about what to expect from the training program. Modern other words, point trackers that aide in knowing which employees
marketing has revealed it typically takes people hearing something are taking the lead in the program. It is important to utilize this data
7 times before they remember. to offer friendly contests and rewards for the employees who are
doing a great job in the program!
Don’t expect you can begin a security awareness program by just
sending employees the first training session. They won’t know what Another motivating factor for employees to actively participate in a
it is, what to do with it and they will have no idea why they should security awareness program is by giving them an understanding that
even care about it. they are also at risk outside of work.
Instead, spend a few weeks leading up to the launch of the program The intent will be to empower users with the ability to make smart,
announcing it in many different channels. Send emails, announce security-driven decisions in their personal lives that nurture secure
during meetings – especially company all hands or executive habits; along with the tools and resources to maintain secure
announcements, put up posters, use collaboration tools, e.g., Slack behaviors at work.
or Microsoft Teams, and include an announcement about it any
Giving them ways to protect their family is always a big win. Anytime
place there are regular employee communications.
an employee understands how a risk could affect them personally
It’s also important to consider ongoing positive reinforcement and helps them to see the value in whole-hearted participation.
rewards for employees participating in the program.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 15


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

UNDERSTANDING
TYPES OF
TRAINING Here are the types of trainings we’ve seen included in
successful programs:

01 Compliance Training
Many compliance training topics are required annually.
Most organizations will have a few different types This is often presented as interactive online training.
of training they need to deliver through their The goal of the compliance training is to both set the
expectations for user behavior and processes within an
security awareness program.
organization as well as ensure standards are met.
This is good to acknowledge early in the process. Compliance topics typically revolve around mandated requirements
Identifying those trainings and putting circles that often fall under the human resources umbrella, such as sexual
around them will be helpful as your program plan harassment prevention training, and—as a result—need to be tracked
or administered by HR. Plus, completion and/or infringement upon
begins to take shape and you start considering these compliance topics must be enforced by HR policies.
maturity and phases. Many other compliance topics may overlap into your ongoing
security awareness program, such as payment card industry (PCI)
compliance. But just because you must check a box and provide
compliance training from a legal or auditing standpoint, that doesn’t
replace the need for ongoing security awareness training. Stopping
a potential breach is far more impactful than simply fulfilling a
compliance requirement.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 16


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

02 Ongoing Security Awareness Training


The importance of re-engaging with employees on a regular basis – at least twice a month – ensures employees will
keep security threats, best practices, and cyber hygiene top of mind.

Scientific data supports providing training on at least a bi-weekly For a complete look at how to implement microlearning as part
cadence. According to the Ebbinghaus Forgetting Curve, which of your security awareness strategy, read our white paper: The
demonstrates how information is lost over time when there is no Valuable Role of Microlearning in Cybersecurity. There you will find
attempt to retain new information, people forget 80% of what they in-depth guidance on creating content that supports the essential
learn within a month. functions of an awareness program.
Conversely, the Ebbinghaus Forgetting Curve also shows that if The key for the administrator of any ongoing program is to stay
people engage with education on a specific topic more than once updated in the selecting and scheduling of content campaigns. Many
a month, they retain 200% more information and accurately react administrators will seek out a fully managed security awareness
28% faster than those who learn by other methods. solution to leave the content and its management in the hands of a
trusted vendor, freeing themselves up to be a security awareness
The frequency of training is only part of the equation. The length of
leader rather than functioning solely as program administrator.
lessons also contributes to a program’s success. The ideal length of
a learning session as identified by MIT researchers is three minutes However, it’s important not to get
or less. This forces content coverage to be succinct and focus only wowed by vendors who offer gigantic
on the most critical information. With a consistently short duration, libraries of long-form content instead
viewers know that sessions won’t waste their time or be overly of new and fresh microlearning
taxing, which builds trust and ultimately increases engagement. lessons. When long-form trainings ONGOING
Driving a culture of ongoing learning through scheduled intervals
get outdated, they quickly become a THREATS
drain on employee time and hinder
of re-engagement, and providing short learning sessions are two of
six key principles of microlearning. A retention-focused approach
their ability to stay motivated and REQUIRE
to learning that presents information in a similar format to how the
participate in the program. ONGOING
brain already functions, microlearning ensures people remember
what they’re taught and can recall the information exactly when
SOLUTIONS
they need it.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 17


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

Users retain 200% Still, not all vendors are the same. Some may have extensive libraries that initially look impressive, but
when given a closer look, the lessons don’t support your program’s goals, meet the learning needs of your
more information users, or provide content that is up to date with the evolving threat landscape.

when educated on a When evaluating vendors, asking the following questions can help you make an informed decision:

specific topic more


that once a month. Do you offer short-form video content that is What percentage of your available course
three minutes or less? catalog is short-form content (vs. long-form)?

Do you utilize scientifically supported learning Does your library include lessons focused on
methodologies in the development of content? educating my users on new and emerging
threats?
If yes, what learning techniques do you use,
and how do they help my users learn and If yes, can you provide recent examples of
retain information? lessons you’ve created on new and emerging
threats?
How frequently are new lessons added to your
content library? Do you provide ongoing tracking, measuring,
and performance reporting on the program?
How do you deploy your training (e.g., LMS or
eLearning portal, directly to user’s inbox)?

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 18


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

03 Phishing Training
Phishing simulations should be included with any ongoing awareness program, and always treated as an educational
tool. Many organizations begin their phishing simulation efforts with education in mind but somehow lose their way
and become overly focused on all the bells and whistles of their phishing simulation tools. Often, they cross a line
between trying to educate employees and... trying to trick them.

This may cause employees to develop animosity toward the entire Along these lines, it is also important to educate employees on how
training program. And once the simulation program focuses on to report suspicious emails. Many different tools can be used to
tricking employees to catch and punish them, the bridge is burned. safely handle potentially dangerous emails. A tool that is readily
Also, if you take a sarcastic tone or shame people who do click on available to many organizations through Outlook and Google
a simulation, employees will begin to avoid the security awareness Workspace is a “report phishing” button that ensures proper and
program at all costs and not react properly when they received a simple reporting.
simulated email.
New Hires and Contractors
Instead, phishing simulations should be used as educational tools
All new employees and contractors should be required to complete
and employees’ engagement with them should elicit a “no shame”
an introduction to the organization’s security practices during
respectful tone. Sending monthly phishing simulations tied directly
employee onboarding, as well as be immediately enrolled in the
to on-the-spot training that teaches them how to properly identify
ongoing security awareness program.
whether an email is a phishing attempt or if it can be trusted is
the best way to build a good relationship between employees and
phishing simulations.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 19


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

IMPLEMENTING Major Awareness Initiatives



AWARENESS You can reinforce key behaviors using various methods throughout
SOLUTIONS the year. These methods also help reach the different sub-cultures
throughout the organization. These initiatives consist of the following:

01 Cybersecurity Coaches
This group of volunteer employees act as liaisons within their
department or broader team. Appoint people who have a reputation
in the organization as cyber experts, a passion for developing a
culture of security, and are patient teachers.
The goal is to empower already security-minded users with the tools
and resources they need to spread and strengthen efforts of the
company security awareness program.

02 Executive Assistant Network


This group consists primarily of executive assistants, but also
Reinforce key behaviors by using includes senior-level executives.

varying methods of training throughout Like ambassadors, this group can help promote the program
organization-wide. Emails that come from the office of the CEO or
the year to help reach different sub- their assistant have a much higher open rate by employees, resulting
in greater attention when needing to make key announcements to
cultures within the organization.
employees.
Building a successful culture can only
happen when it is practiced regularly.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 20


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

03 Tracking Execution 04 National Cybersecurity 03 Newsletters


This process engages senior management Awareness Month (NCSAM) Newsletters require significant energy and
throughout your company to candidly discuss October is now globally recognized as access to editorial and creative resources,
any security concerns or needs unique to their Cybersecurity Awareness Month. This creates which you may or may not have. With the
footprint. Results from these discussions help the opportunity to connect and engage with our effort required to curate and develop content,
inform you of previously unknown security users throughout the entire month. Activities newsletters yield low performance returns on
risks and behaviors. This becomes a powerful can include learning sessions, online scavenger time invested. Instead of building something
assessment of your current environment as hunts, external speakers, and a keynote event new, focus on utilizing existing communication
it gives you materials and ways to focus on typically highlight events designed to take channels and piggy-back on existing internal
reinforcement and potential training module advantage of this special focus. marketing and communications activities.
candidates.
In the first year or two of implementing However, if you really feel compelled to do one,
Senior management may not have an exact your security awareness program, use send out a quarterly newsletter to InfoSec and
understanding of the step-by-step actions cybersecurity month as a ‘level-up’ event. Take senior leadership only—a general audience
employees take while performing their jobs. So, the opportunity to leverage special resources won’t read it. Topics should focus on current
this should be a multi-layered effort. and events available from other vendors and strategies, results from initiatives, and projects
organizations to raise the security awareness on the horizon.
Leadership can receive their ideas on paper, but
it’s also important to have peer-led discovery program of your organization.
meetings where peoples can speak freely, As your company’s security culture begins
and anonymously, if necessary, and pull the to mature, turn Cybersecurity Awareness
curtain back on practices that might, in fact, be Month into its own holiday season. Fill it full of
dangerous for your organization. If you want prizes after you utilize points trackers for your
to have employees expose weaknesses and employees and push your ongoing security
vulnerabilities, you must create a no shame, no awareness efforts to lead up to this month.
blame culture that welcomes the exposition of
potential pitfalls.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 21


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

REPORTING Assessments And Scoring



& PERFORMANCE You will need to measure the effectiveness of your security awareness
METRICS training program in educating your users and changing their behaviors.
We recommend the following methods to gauge its success:

01 Compliance Training Metrics


Think of this as your completion rates in terms of how many users
completed the compliance training and regulatory requirements across
the company. If you need to provide reports or documentation to any
regulatory entities, be sure to understand what format they need the
information in and then keep your records updated for reporting purposes.

02 Ongoing Security Awareness Education


The education portion of your security awareness program should have
several key measurement capabilities.

Participation and Completion—It is important to know if employees are


participating and completing the content they are assigned.

Quizzes—Asking employees questions and gauging their understanding


of certain topics is more than just a neat stat for the reports. It further
challenges them to quickly recall information which helps to transfer
more of what they are learning to long-term memory.

Gamification and Leaderboard—Creating a points scale for


participation, quiz scores, and other behavior trackers will give a
security awareness program the ability to attribute motivators, friendly
competition, as well as accountability.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 22


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

03 Phishing Simulations 04 Live Trainings 05 Incident Response


A phishing training program includes lots of Live trainings are unique and can provide An effective security awareness program creates
metrics. Be careful not to allow the phishing interesting windows into your culture. Keeping enough relevant data directly to the IR teams to
metrics to become the core metric for the track of the number of trainings delivered, enable those teams to become efficient. Tracking
program. It is but one of many important number of unique teams participating, and efficiency can demonstrate to senior leadership
reporting numbers representing an overall number of attendees. Even being a small part an additional way in which the program adds
effort of the program. of an in-person company event promotes a value. An important statistic involves “reduced
positive security awareness culture. time to respond” to phishing threats, because the
The prioritized metrics in your phishing
users themselves are doing the reporting.
simulation programs should help you assess Employees hear directly from the security
improvement toward what should be your awareness manager or CISO about the program
ultimate goal, which is to educate your is a valuable use of time. Not sure what to
employees. Many people lose sight of this when present on? You can take time to highlight an 06 NCSAM
utilizing a phishing simulation tool. employee who reported a phishing email that National Cybersecurity Awareness Month is
saved the company from potential headaches, a behemoth. However, planning ahead of time
Phishing simulations should be directly linked
take the opportunity to announce or reinforce and with intention can offer multitudes of
to specific teaching moments that not only let
an upcoming security awareness training, or great metrics—things like hours spent learning,
employees know where they went wrong, but
have leadership endorse the need for ongoing events attended, participants in contests, etc
also explain what to watch out for every single
training participation.
time they receive an email to determine if it can
be trusted. Much like marketing programs it is then
It is important to track clicks, completion
important to track registrations, attendance,
and participation based on how much or how
07 Surveys
of follow-up education, and ongoing Sending out an annual anonymous security
little promoting was done.
improvements in individual performance on awareness survey to measure individual’s
things like reporting suspicious emails and not understanding of organizational policies and
clicking on simulated phishing links. measure their beliefs and attitudes toward
information security can provide you with
valuable insight.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 23


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

BUILDING Key Building Blocks



A THRIVING
PROGRAM Keep it simple.
Ongoing Training: Microlearning lessons, twice a month.

Phishing Simulations: Once a month.

Compliance Trainings: New-hires and annually thereafter

Maintain a positive, empowering message: Always

What’s really impactful about implementing a


So, plan big and keep the execution simple.
sound strategy is that you will build a continuous
During year two, highlight maturing year-one goals, and add one or two
positive learning curve and give your entire
new programs—like ambassadors and live training, or even role-based
organization a program they can all understand, training efforts. You can forecast and show how your program matures
support, and promote. each year. Doing so is executive team gold.

Above all else, remember that you, and your entire program are in
place to educate and elevate employees. Don’t get so consumed by
administering your program that you forget about your people. Find
ways to automate your program so you can spend more time leading
your people.

© 2021 ARCT IC WOL F NETWORKS, INC. ALL RIGHTS RESERVED. | PUB L IC 24


C O M P L E T E S E C U R I T Y AWA R E N E S S G U I D E

END CYBER RISK


Interested in learning about the ABOUT
ABOUT
future of security awareness? ARCTIC
ARCTICWOLF
WOLF
Arctic Wolf® is the market leader in security
You’re invited to embark on a Managed Security Awareness Journey.
operations. Using the cloud-native Arctic
This free time traveling tour will show what it’s like to become an Arctic Wolf Managed Wolf® Platform, highly trained Concierge
Security Awareness customer. Security® experts work as an extension of
You’ll participate in microlearning sessions, find out what your Concierge Security Team your team to help end cyber risk. We make it
can do for you, and discover how an ongoing program can change your company culture fast and easy for organizations of any size
Experience a tour of Managed Security Awareness today! to stand up world-class security operations
that continually guard against attacks in an
efficient and sustainable way.

GET STARTED NOW For more information about Arctic Wolf,


visit arcticwolf.com.

SOC2 TYPE II CERTIFIED CONTACT US


arcticwolf.com
1.888.272.8429
AW_G_ Complete_Cybersecurity_Awareness_Plan_1121
[email protected]

© 2 0 2 1 ARC T I C WO LF NETWORKS, INC. A LL RIGHTS RE SE RV E D.    |    PUBL IC 25


A RC T I C WO LF I S A T RADE MA RK OF ARCTIC WOLF NE TWORKS, IN C . , R EG IS T ER ED IN T H E U. S . A N D EL S EW H ER E.

You might also like