• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Question 1

September 21, 2023 by David Lanter 27 Comments

How do you go about developing a security education training and awareness program?

Filed Under: Unit 05: Creating a Security Aware Organization Tagged With:

Reader Interactions

Comments

  1. Hashem Alsharif says

    September 23, 2023 at 7:27 pm

    When creating a security education training and awareness program, there are multiple factors to keep in mind. One of the most important things is realizing that threats to an organization could happen through an internal employee. By understanding this, you must center the program to directly refer to each and every individual person, whether it be a student, employee, or member of the group. First, you must have a brand for the product, and make it something that helps with grabbing the attention of the user. The second step is that you need to create a list of topics that need to be addressed. This may change depending on what company you’re working with as they could have different demands. Once you have an elaborate list of what to address, you need to have a system for designing and collecting metrics. This is to keep track of who goes on the learning program and who doesn’t. To tie the last step back to step 1, make sure to give the program a theme as it helps the program look more professional.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      September 24, 2023 at 6:18 pm

      Approaching employee security training and awareness education as a system of many different input factors is important to deriving the most value in addressing and securing the risk of the weakest link in an organisation.

      Log in to Reply
    • Celinemary Turner says

      September 25, 2023 at 10:04 pm

      You are very right. Recognizing that internal threats can come from employees is crucial. Tailoring your security program to each individual’s role and responsibilities within the organization is a great approach.

      Log in to Reply
  2. Nicholas Nirenberg says

    September 24, 2023 at 12:17 pm

    To develop a security education training and awareness program you must split up the training to cater to each individual group of people for it to be most effective. This training can be split up depending on if it’s intended for those with certain clearances, job roles, history, or anything else that may be helpful in grouping people for the purpose of giving them the most effective and informative training. Arguably the most important thing to remember about a training program once the different groups of people have been established is that most people simply won’t care about the information presented to them unless you can show how it can directly impact them. For example, a program shown to those in sales with sensitive financial information may be shown a presentation on why it is important to protect exact sales figures from being leaked to competitors. They most likely already understand this but will be much more likely to take it seriously if they are informed of the potential impacts of a breach and how it will directly impact them.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      September 24, 2023 at 6:21 pm

      This custom-based awareness program is encouraged for organisations although, it could present higher costs and require more management of the presentation and delivery to the target audience.

      Log in to Reply
    • Hashem Alsharif says

      September 26, 2023 at 10:26 pm

      I completely agree with everything you said. It’s very important that we know how to customize each lesson for every group in the way that best fits them. To cut corners, some organizations might do one single course for everyone but as you mentioned, if the group watching doesn’t see how it’s important to them, they won’t make an effort to pay attention. This does bring forth another question though. What is customization? what are the factors that make something customized? how much research do we need to do on our end before determining something is specially tailored for a group?

      Log in to Reply
  3. Bo Wang says

    September 24, 2023 at 12:18 pm

    Identify who needs security awareness training and how deep it should be. When facing the grass-roots staff, we can make a 15-minute small class to let them understand and know the basic knowledge and awareness of information security. For management staff, further training is required, as they have a higher authority than junior staff, and they need to fully understand the safety rules associated with their positions.

    Log in to Reply
    • Eyup Aslanbay says

      September 24, 2023 at 7:12 pm

      You made an important point, but I believe we first need to assess the current situation and define the goals. This will help us implement a security awareness training program.

      Log in to Reply
  4. Edge Kroll says

    September 24, 2023 at 4:22 pm

    Developing a security education, training, and awareness program begins with understanding your organization’s needs and risks. First, conduct a comprehensive assessment of your organization, identifying critical assets, potential threats, and existing vulnerabilities. Define training objectives aligned with your organization’s security goals, and be sure to tailor the content to different employee roles and levels of expertise.
    Furthermore, a successful program doesn’t end with training. It requires ongoing efforts to reinforce awareness and skills. Things like phishing simulations to test employees’ ability to recognize and respond to threats. Provide employees with access to resources and support, including cybersecurity policies and reporting mechanisms. Continuously measure and assess the program’s effectiveness, using metrics like training completion rates, phishing simulation results, and employee feedback to make necessary adjustments. Lastly, continually gather feedback from employees in order to continually improve and adapt the program to emerging threats and challenges.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      September 24, 2023 at 6:22 pm

      This presents a holistic approach to the employee education and security awareness program which aims at delivering and deriving value from the process within an organisation.

      Log in to Reply
    • Celinemary Turner says

      September 25, 2023 at 5:13 pm

      your approach encompasses the essential elements of a successful security education, training, and awareness program. i quite agreed that conducting a thorough assessment of an organization is the foundation of any effective security program. Also phishing simulations are valuable tools for assessing and improving employees’ ability to recognize and respond to threats.

      Log in to Reply
    • Yannick Rugamba says

      September 26, 2023 at 11:46 pm

      I’ve read your analysis, on security training. It’s really thorough and well organized. One thing to consider is placing an emphasis on the element. Although systems and protocols are vital it’s often mistakes or oversights that result in breaches. Maybe you could underscore the significance of cultivating a security culture within the company? It’s not about training. Also, about mindset.

      Log in to Reply
  5. Ooreofeoluwa Koyejo says

    September 24, 2023 at 4:45 pm

    To develop a security education, training, and awareness program, it is important to understand that the goal of the program is to promote a culture of cybersecurity within an organization. The program is formulated to help employees understand their roles and responsibilities in safeguarding sensitive data and systems defined by the organization.

    Following these steps as a guide, an effective awareness program can be developed.
    – Identify the goals and objectives aligned with the organizational strategy.
    – Prioritize the security topics as program content to align with input from related and relevant such as risk assessment and security controls.
    – Align the program with legal and regulatory requirements as well as security standards and frameworks.
    – Input from security policies and procedures
    – Document the performance metrics for the effectiveness of the awareness program
    – Continual improvement of the program to current and emerging threats and technologies
    – Documentation and reporting
    – Choose the most effective delivery methods for your audience.
    – Adequate funding and resource allocation to support the execution of the security education training and awareness program.

    Log in to Reply
    • Eyup Aslanbay says

      September 24, 2023 at 7:20 pm

      A great plan for building strong security education training awareness program in a company! This program adjusts to new threats and makes sure everyone’s ready to act. Setting clear goals, following laws, and picking the best ways to teach are key.

      Log in to Reply
  6. Eyup Aslanbay says

    September 24, 2023 at 7:01 pm

    Organizations should teach their employees how to keep information safe. A good program can help stop mistakes that lead to security problems. Developing a security education training and awareness program is important for organizations to ensure that employees understand their roles and responsibilities in protecting sensitive information and assets.

    Companies should check their current situation. So, I need to see what security issues they have now and look at past problems. We need to decide our goals. We clearly need to state what we aim to achieve with the security education training and awareness program. I try to define short term and long-term goals.
    I also need to check workers about their security know how. After that we must identify who need training. We should segment the workers based on their roles, responsibilities, and access to information. After these steps, we need to
    • Create learning content,
    • Pick the best way to teach,
    • Keep reminding everyone,
    • Update often,
    • Check it works,
    • Obtain top management support,
    • Ensure compliance,

    Log in to Reply
    • Jon Stillwagon says

      September 26, 2023 at 3:01 pm

      Hey Eyup, determining the goals of the organization to conduct a training and awareness program is something I did not think of. It makes sense why it should be done that way and it could make the organization more successful when they start accomplishing their objectives.

      Log in to Reply
  7. Jon Stillwagon says

    September 24, 2023 at 8:13 pm

    The way I would start by developing my security education training and awareness program is to have the security education be tailored to the individual’s role in the company. The training specifically should be broken up into sections based on their role and experience. Just to reduce the amount of workers in the training so it can deliver a concise message to a smaller group rather than a larger one. The awareness program would be a seminar that would be delivered to the company or each department. The training and awareness program would be developed in a way to has real-world scenarios that the company could face so they would know how to handle it. Instead of a boring seminar where the information is just being delivered to the workers, I would make it fun and interactive in a way that gets the organization engaged. Acting out the scenario that was developed could prove to be an interactive and memorable way to deliver the message to the audience so they could apply it to their job.

    Log in to Reply
    • Nicholas Nirenberg says

      September 26, 2023 at 12:44 pm

      I pretty much had the same idea as you where training must be individualized to an employees role. I didn’t mention that their experience is also an important factor because it would be a waste of time and resources to provide basic training to decades long employees every year. I also like your last point about using realistic training scenarios which could be more engaging than a boring and forgettable presentation.

      Log in to Reply
    • Edge Kroll says

      September 26, 2023 at 5:59 pm

      I think the idea of training with real-world scenarios is a great idea. Not only because of the practicality of it, but also in my opinion it would be a much more engaging way to learn. Allowing employees to actually work through and issue themselves (with assistance if needed of course) will teach them far more than a presentation and an explanation of how to solve a problem.

      Log in to Reply
  8. Akiyah says

    September 24, 2023 at 8:20 pm

    I would follow the steps below when developing a security education training and awareness program

    Identify Stakeholders:
       *Reach out to key stakeholders including the security team, IT department, and business leaders to form a braintrust. This group will review the latest risk analysis and discuss high-level security concerns.

     Create Content:
       *Identify relevant content by collaborating with stakeholders. Focus on key security topics and determine the target audience. While the program should reach all employees, specific security areas may apply more to certain roles.

    Choose Delivery Methods:
       *Evaluate and select appropriate delivery methods for training and awareness campaigns based on the needs of your organization and workforce.

    Launch Awareness Campaigns:
       *Utilize security awareness posters and other communication tools to ensure that information is consistently visible to employees.

     Add Fun Elements:
       *Consider adding incentives to make the program engaging. For example, offer rewards such as a free lunch or entry into a contest for the first 10 people who complete required security training. A prize like an iPad could serve as motivation.

    A well-rounded security education, training, and awareness program can enhance the overall cybersecurity posture of your organization while engaging and educating employees effectively.

    Log in to Reply
    • Celinemary Turner says

      September 25, 2023 at 4:57 pm

      Your outlined are quite comprehensive and well-structured. However, it’s also important to include representatives from various departments and levels of the organization to get a holistic perspective. Additionally, involving legal and compliance teams can help ensure that the training meets regulatory requirements.

      Log in to Reply
    • Bo Wang says

      September 26, 2023 at 9:04 pm

      I support the point of adding some interesting elements, which makes safety education more attractive to people.

      Log in to Reply
  9. Celinemary Turner says

    September 24, 2023 at 9:46 pm

    Developing a security education training and awareness program is crucial for an organization to mitigate cybersecurity risks. A security awareness program ensures that everyone in an organization has the necessary knowledge and understanding of security best practices. This program involves some key components: Communication, Checklist, and Content.
     Communication: The management must constantly communicate to all employees that security is essential to running the business through emails or presentations.
     Checklist: A checklist needs to be created to outline the specific action that needs to be taken in various scenarios. This may include:
    1. what to do when a new hire starts and when the employee leaves.
    2. specify how often employees need to be reminded about security protocols.
    3. An action to take during a security incident.
    4. How to communicate with customers in case of a breach.

     Content: A comprehensive security handbook that provides guidelines and best practices for different organizational roles should be made available to employees. Also training programs can be developed to educate employees on security awareness.

    By implementing these components effectively, an organization can enhance cybersecurity awareness among their workforce, reducing potential risks associated with human error or negligence in handling sensitive information

    Log in to Reply
    • Jon Stillwagon says

      September 26, 2023 at 3:06 pm

      Hello Celinemary, you make a valid point about having a security handbook because that could come in handy when facing a dilemma that was not prepared for. It could also be used to educate the employees and further their knowledge when it comes to everyday tasks so they could follow the process instinctively.

      Log in to Reply
  10. Yannick Rugamba says

    September 26, 2023 at 10:43 pm

    There are educational platforms that offer a wide range of courses often at affordable prices example UDEMY. Moreover, tech companies often provide their training resources especially when it comes to their products. Surprisingly platforms, like YouTube also have a wealth of content that offers insights into aspects of cybersecurity. Even formal institutions such as government agencies offer structured resources. The professional community is filled with experts whose knowledges like a treasure trove and workshops and mentorship sessions are opportunities for exchanging knowledge. Engaging tools, like cybersecurity simulations can further enhance our understanding. Considering the changing nature of cybersecurity, it is crucial to stay updated by exploring resources in order to gain a comprehensive understanding.

    Log in to Reply
    • Yannick Rugamba says

      September 26, 2023 at 10:46 pm

      Please disregard this answer its for question 2.

      Log in to Reply
  11. Yannick Rugamba says

    September 26, 2023 at 10:45 pm

    To establish a cybersecurity training program, begin by gaining an understanding of your organization’s objectives. Prioritize security subjects while considering any obligations. Determine the method to educate your team whether through online courses or, in person workshops. Continuously update the training materials to stay ahead of emerging threats and regularly evaluate the effectiveness of the program. Remember, the goal is to foster a security culture where everyone’s knowledgeable, about safeguarding information. Allocate resources maintain documentation and consistently strive for enhancement. Think of it as cultivating a community in your workplace that prioritizes security awareness!

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in