Unlock Develop a Security Awareness and Training Program That Empowers End Users
Get Instant Access
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.
Develop a Security Awareness and Training Program That Empowers End Users
Turn end users into your organization’s secret security weapon.
- The fast evolution of the cybersecurity landscape requires security training and awareness programs that are frequently updated and improved.
- Security and awareness training programs often fail to engage end users. Lack of engagement can lead to low levels of knowledge retention.
- Irrelevant or outdated training content does not properly prepare your end users to effectively defend the organization against security threats.
Our Advice
Critical Insight
- One-time, annual training is no longer sufficient for creating an effective security awareness and training program.
- By presenting security as a personal and individualized issue, you can make this new personal focus a driver for your organizational security awareness and training program.
Impact and Result
- Create a training program that delivers smaller amounts of information on a more frequent basis to minimize effort, reduce end-user training fatigue, and improve content relevance.
- Evaluate and improve your security awareness and training program continuously to keep its content up-to-date. Leverage end-user feedback to ensure content remains relevant to those who receive it.
Develop a Security Awareness and Training Program That Empowers End Users Research & Tools
Start here – read the Executive Brief
Read our concise Executive Brief to find out why you should develop a security awareness and training program that empowers end users, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.
1. Develop your training program
Create or mature a security awareness and training program that is tailored to your organization.
2. Design an effective training delivery plan
Explore methods of training delivery and select the most effective solutions.
About Info-Tech
Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.
We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.
What Is a Blueprint?
A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.
Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.
Need Extra Help?
Speak With An Analyst
Get the help you need in this 2-phase advisory process. You'll receive 4 touchpoints with our researchers, all included in your membership.
Guided Implementation 1: Develop your training program
- Call 1: Build a development plan for your training program.
- Call 2: Learn best practices for the execution of development initiatives.
Guided Implementation 2: Design an effective training delivery plan
- Call 1: Identify possible delivery methods.
- Call 2: Create a training schedule.
Authors
Filipe De Souza
Ian Mulholland
Contributors
- Sky Sharma, CIO
- Adrien de Beaupré, Certified Instructor and Penetration Tester, SANS Institute
- Robert Hawk, Information Security Expert, xMatters, Inc.
- Steven Woodward, CEO, Cloud Perspectives
- Riddhi Patel, Information Security Analyst, National Life Group
- Blair Panasiuk, Manager of IT Operations, Dynalife
- Erich Salie, Information Security Officer
- David Shipley, Director of Strategic Initiatives, University of New Brunswick
- Paul Daley, Sr. Analyst for Security Management, Risk and Audit, Toronto District School Board
- Glen Maxfield, IT Security Manager, Workers Compensation Board of Manitoba
Related Content: Security Strategy & Budgeting
Search Code: 76236
Last Revised: November 27, 2019
TAGS:
training, awareness, Microlearning, cybersecurity, people, malware, culture, security threat, risk, compliance, delivery, reporting, Live Learning, onboarding, gamification, security awareness and training policy and procedures, security awareness training and education, security awareness and training documents and posters, security awareness training ideas, whiteboard, video, whiteboard seriesBook an Appointment
IT Research & Advisory Services
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.