Creating a Successful Security Awareness Training Program

Presented by

Larry Cates and Suzanne Gorman

About this talk

Organizations historically have relied on their Cybersecurity, IT and their Networking teams to purchase technologies to provide defense-in-depth protection for their organizations. While this is necessary, most organizations never think that their biggest risk is actually their untrained employees. With the onslaught of phishing, malware, ransomware attacks and Business Email Compromise or CEO Fraud, we are at a critical point that each and every organization needs to have a successful training program in place to properly educate their employees on how to identify social engineering attempts, or they are almost guaranteed to fall short of its security objectives and they will become a victim of cybercrime, and in many cases this can be a very expensive lesson to be learned. Ninety percent of security breaches are caused by Human Error. A successful security awareness training program will not only educate your employees. A successful program will also empower them to make changes to their behavior and embrace a security minded culture, securing themselves and in turn, securing your organization. But how can organizations take the next step beyond training when changing human behavior is such a complex process. Traditional security awareness programs are not enough—you need to develop Security-Minded Employees and make it part of the corporate culture. In this webinar, Larry Cates, President and CEO, and Suzanne Gorman, Vice President, Information Security and Risk Management Evangelist with Global Learning Systems will discuss: ● Setting objectives to make your program successful ● Biggest risks to any organization ● Elements of a Successful Security Awareness Program ● Quantifying Your Success
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (332)
Subscribers (34378)
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.